Features
When Your Data Goes Viral
As discussed in Part One of this article, a data breach can jeopardize a company's confidential information such as client records, trade secrets, privileged legal information, or employee records. Although many associate data breaches with hackers or cyberattacks, human error, such as a mistake in computer coding or losing a company laptop, also results in significant breaches.
Features
With Highly Anticipated Copyright Decision, The AutoHop Litigation Is Coming to a Close
In 2012, DISH Network announced two novel product offerings that would result in considerable backlash from the four major broadcast television networks and set in motion a three-year, wide-ranging, multi-front battle with the networks. As the dust now begins to settle, the copyright litigation has resulted in important precedents that will help define the boundaries under the Copyright Act for the multi-channel programming distribution industry.
Features
The New Hybrid Standard for Appellate Review in Claim Construction
The Federal Circuit has long maintained that it is entitled to review a claim construction decision <i>de novo</i>, without deference to the district court. Over the years, this approach has led to a notably high reversal rate of district court claim construction decisions. This "two bites at the apple" approach remained controversial, and on Jan. 20, 2015, the Supreme Court rejected this blanket policy of <i>de novo</i> review in favor of a hybrid approach.
Features
2016 Budget Targets Retirement
Last month, the Obama Administration's Fiscal Year 2016 Budget was published, along with the Department of Treasury's Greenbook, a detailed explanation of the President's proposed budget. Because the proposed legislation must pass a Republican led Congress, the President's budget may be "aspirational." It is a good indicator of the tools the Administration is prepared to use to fund its wish list.
Features
Lawyer, Code Thyself
Chances are you don't need to be convinced of the merits of learning to program or, in the parlance of today's startup culture, learning "to code." You already understand not only the professional opportunities it opens but also how it empowers you to solve your own problems. As software disrupts industry after industry, the winners will be either those writing the code or those who understand enough about coding to organize others to do it.
Features
Federal Judge Rules For Defendant in Porn Copyright Case
An anonymous <i>pro se</i> defendant has beaten copyright infringement claims brought against him in federal court by a maker of pornographic videos. The defendant's victory runs counter to the result in a similar case in front of a different Eastern District judge.
Features
Disputes over Noise Levels from Live Performances
Noise complaints have long been an occupational hazard for venue operators, musicians and concert promoters. The surge in the electronic dance music scene has added to the number of complaints. What might be enjoyable entertainment to one person may sound like a thunderous racket to another.
Features
Addressing Value Challenges With Collaborative Workspaces
Today's law firms face unprecedented challenges in a highly competitive and rapidly evolving marketplace. Corporate clients, under intense pressure to cut costs and increase efficiency within their own organizations, are no longer willing to simply pay an hourly rate for services rendered in good faith. They are unapologetic in demanding increased accountability and demonstrable value from the legal teams who represent them.
Features
Law Firms Aren't Immune to Cybersecurity Risks
Although law firms have managed to remain off the list of the year's biggest data breach victims, firms watching cybersecurity trends most closely are feeling increasingly uneasy about their own security posture.
Features
After Anthem, Diagnosing the Health of Data Security
Companies have begun to experience attempts to breach their databases on a frequent basis, and have had to become hypervigilant about protecting their networks against hackers. But once every couple of months, the bad guys get through the defense systems in a big and highly publicized way, showcasing data disaster for company and customers. This was the case in early February when Anthem Inc., the second-largest health insurance company in the U.S., announced it had been hacked.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Players On the MoveA look at moves among attorneys, law firms, companies and other players in entertainment law.Read More ›
- An Overview of Recovering Trademark Infringement DamagesThis article discusses recovering damages for trademark infringement and various strategies for establishing those damages.Read More ›
- Removing Restrictive CovenantsIn Rockwell v. Despart, the Third Department recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Unlicensed Real Estate Broker in New York: BewareThe U.S. District Court for the Northern District of New York recently determined that because New York prohibits unlicensed real estate brokers from pursuing payment in its courts for services rendered, a plaintiff who performed real estate work for a client who then did not pay had no standing to sue.Read More ›