Features
DE Supreme Court Eases Social Media Authentication
Social media postings can be submitted as trial evidence as long as the party introducing the evidence can demonstrate to the judge that a jury could reasonably conclude the postings are authentic, the Delaware Supreme Court has ruled.
Features
Statistical Sampling
The focus on proportionality in high-profile cases such as <i>Apple v. Samsung</i>, coupled with the recent proposed amendments to the Federal Rules of Civil Procedure are driving attorneys to reevaluate the methods by which they uncover crucial electronic evidence for a case.
Features
Best Practices for Comprehensive Searchability
Most law firms now proudly proclaim that they have implemented efficient and secure document management systems, systems in which they have invested significant dollars and even more in "sweat equity." The end goal of these systems is to ensure that all documents are stored securely, and perhaps more importantly, can be found quickly and easily.
Features
Content Owners' Pursuit of Secondary Infringement Claims
Secondary liability can be imposed on an ISP or distributor of a product used to commit infringement based upon claims of contributory infringement, inducement infringement or vicarious infringement. The contributory and inducement claims both focus on a defendant's contribution to the infringement and require that the defendant knows that direct infringement is occurring. These related claims, which provide independent ways to attack secondary infringement, differ in important respects.
Features
Pushing the Technology Envelope in and Out of the Courtroom
Technological advancements have dramatically improved the speed, capabilities and, in most cases, the cost-effectiveness in which deposition, discovery and pre-trial services are provided. Companies that have embraced the latest developments in jury research and selection technology ' particularly social media monitoring tools ' are best situated to thrive in the current environment.
Columns & Departments
IP News
Supreme Court Overturns Burden-Shift in Non-Infringement Judgment <br>Federal Circuit Clarifies Rules for Patent Term Extension<br>Federal Circuit Confirms That All Members of a Priority Chain Must Recite Full Lineage
Features
A Victory for Forum-Selection Clauses
A recent Supreme Court decision overturns both the United States District Court for the District of Western Texas and the U.S. Court of Appeals for the Fifth Circuit.
Columns & Departments
The Leasing Hotline
Analysis of a key case.
Features
<i>Soul Men</i> Ruling Shows Shift To Transformative Use Test
Celebrities often turn to the Lanham Act and state right of publicity laws to protect against exploitation of their name, image or voice in connection with the promotion of products or services. The U.S. Court of Appeals for the Sixth Circuit recently considered both Lanham Act and right of publicity claims in an action that pitted a Grammy winning musical artist against a major motion picture studio over the alleged use of the musician's likeness in a movie.
Features
Is the Internet a Safer Place for Content Owners?
Many battles have been fought in courtrooms across the United States over the unauthorized Internet sharing of copyrighted books, music, movies and television shows. These include disputes over increasingly more sophisticated software products and websites that appear designed to respond to the latest court rulings over the scope of the DMCA "safe harbor" protections and the elements required to establish secondary copyright infringement liability.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- The Cost of Making PartnerMaking partner isn't cheap, and the cost is more than just the years of hard work and stress that associates put in as they reach for the brass ring.Read More ›