Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Commentary: How the Music Industry Can Learn from Cable When It Comes to ISPs and Infringement Image

Commentary: How the Music Industry Can Learn from Cable When It Comes to ISPs and Infringement

Keith Hauprich

In the last two decades, the music industry and, more specifically, songwriters, producers and recording artists have been losing the value of their efforts to online piracy. Perhaps a business-to-business solution can be found between the music industry and cable providers.

Features

Opportunities, Risks and Strategies In the Metaverse Image

Opportunities, Risks and Strategies In the Metaverse

Brandon Leahy and Chloe Delehanty 

While it is still unknown how the metaverse will take shape lawyers advising brands should familiarize themselves with the opportunities it presents, the risks involved, and strategies to consider for enhancing and protecting a client's brand.

Features

The Legal Difficulties of Blockchain Domain Names Image

The Legal Difficulties of Blockchain Domain Names

Jonathan Bick

Blockchain domain names, a new set of domain names, are ripe for cryptocurrency legal abuse and generally not susceptible to traditional legal amelioration. A combination of legal, business and technological approaches is best used to address blockchain domain name legal difficulties.

Features

First Dark Web Insider Trading Case Shows Government Active In Policing Tech Image

First Dark Web Insider Trading Case Shows Government Active In Policing Tech

Ian McGinley

In a first of its kind prosecution, the Southern District of New York brought an insider trading case against defendant for selling inside information on the Dark Web. The SEC also brought a civil regulatory action against the defendant for the same conduct. In a rare move, however, SDNY and SEC charged this same conduct under different insider trading statutes. This difference underscores the legal complexities involved when the origin of inside information in the digital world is unknown.

Features

Keep Terms of Service and Privacy Notices Separate Image

Keep Terms of Service and Privacy Notices Separate

Shawn Helms, David Saunders & David Sorenson

This article examines why terms of service and privacy notices should work in conjunction with one another, but also why it is not advisable to incorporate privacy notices into online terms of service.

Features

Comic Legends' Estates Say Pandora Streamed Routines Without License Image

Comic Legends' Estates Say Pandora Streamed Routines Without License

Thomas Kjellberg & Robert W. Clarida

In dual lawsuits, the estates of Robin Williams and George Carlin accuse Pandora Media of willfully infringing the legendary comedians' registered copyrights in their "spoken word compositions" — their standup routines — by streaming the sound recordings that embody those routines without a license to use these works.

Features

Legal Tech: Are Websites A Forgotten Source of Evidence? Image

Legal Tech: Are Websites A Forgotten Source of Evidence?

Glenn Barden

It's fascinating how quickly the industry has shifted from the days when e-discovery teams would spend weeks digitalizing and coding vellum, microfiche and paper documents to where we are today with dynamic and varied processes to deal with a plethora of electronic sources. Among these are websites, which can provide deep insights in discovery, but have been largely forgotten as a source of evidence.

Features

Brands In the Metaverse: Opportunities, Risks and Strategies Image

Brands In the Metaverse: Opportunities, Risks and Strategies

Brandon Leahy and Chloe Delehanty 

While it is still unknown how the metaverse will take shape, lawyers advising brands should familiarize themselves with the opportunities it presents, the risks involved, and strategies to consider for enhancing and protecting a client's brand.

Features

Inside Cryptocurrency Pump-and-Dump Schemes Image

Inside Cryptocurrency Pump-and-Dump Schemes

Jonathan Bick

Since the inception of cryptocurrency as a widely traded asset, there has been increasing opportunity to make money through market manipulation, specifically through classic pump-and-dump and related fraudulent schemes, and more specifically CPDs.

Features

How to Protect a Website's Legal Identity Image

How to Protect a Website's Legal Identity

Jonathan Bick

Internet site legal identity theft is becoming increasingly more sophisticated and common. If successful, a third party can use the theft of a legal identity to secure confidential information, harm marketing brand value, diminish good will and steal customers. Internet sites may employ legal, business, and technological means to protect their legal identities.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES