Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Litigation

Features

DE Supreme Court Eases Social Media Authentication Image

DE Supreme Court Eases Social Media Authentication

Jeff Mordock

Social media postings can be submitted as trial evidence as long as the party introducing the evidence can demonstrate to the judge that a jury could reasonably conclude the postings are authentic, the Delaware Supreme Court has ruled.

Features

Statistical Sampling Image

Statistical Sampling

Howard Edson & Dean Gaida

The focus on proportionality in high-profile cases such as <i>Apple v. Samsung</i>, coupled with the recent proposed amendments to the Federal Rules of Civil Procedure are driving attorneys to reevaluate the methods by which they uncover crucial electronic evidence for a case.

Features

Best Practices for Comprehensive Searchability Image

Best Practices for Comprehensive Searchability

Dean Sappey

Most law firms now proudly proclaim that they have implemented efficient and secure document management systems, systems in which they have invested significant dollars and even more in "sweat equity." The end goal of these systems is to ensure that all documents are stored securely, and perhaps more importantly, can be found quickly and easily.

Features

Content Owners' Pursuit of Secondary Infringement Claims Image

Content Owners' Pursuit of Secondary Infringement Claims

Alan R. Friedman

Secondary liability can be imposed on an ISP or distributor of a product used to commit infringement based upon claims of contributory infringement, inducement infringement or vicarious infringement. The contributory and inducement claims both focus on a defendant's contribution to the infringement and require that the defendant knows that direct infringement is occurring. These related claims, which provide independent ways to attack secondary infringement, differ in important respects.

Features

Pushing the Technology Envelope in and Out of the Courtroom Image

Pushing the Technology Envelope in and Out of the Courtroom

Peter Hecht

Technological advancements have dramatically improved the speed, capabilities and, in most cases, the cost-effectiveness in which deposition, discovery and pre-trial services are provided. Companies that have embraced the latest developments in jury research and selection technology ' particularly social media monitoring tools ' are best situated to thrive in the current environment.

Columns & Departments

IP News Image

IP News

Howard J. Shire & Wyatt Delfino

Supreme Court Overturns Burden-Shift in Non-Infringement Judgment <br>Federal Circuit Clarifies Rules for Patent Term Extension<br>Federal Circuit Confirms That All Members of a Priority Chain Must Recite Full Lineage

Features

A Victory for Forum-Selection Clauses Image

A Victory for Forum-Selection Clauses

Lewis J. Cohn & John T. Precobb

A recent Supreme Court decision overturns both the United States District Court for the District of Western Texas and the U.S. Court of Appeals for the Fifth Circuit.

Columns & Departments

The Leasing Hotline Image

The Leasing Hotline

ALM Staff & Law Journal Newsletters

Analysis of a key case.

Features

<i>Soul Men</i> Ruling Shows Shift To Transformative Use Test Image

<i>Soul Men</i> Ruling Shows Shift To Transformative Use Test

Keola R. Whittaker

Celebrities often turn to the Lanham Act and state right of publicity laws to protect against exploitation of their name, image or voice in connection with the promotion of products or services. The U.S. Court of Appeals for the Sixth Circuit recently considered both Lanham Act and right of publicity claims in an action that pitted a Grammy winning musical artist against a major motion picture studio over the alleged use of the musician's likeness in a movie.

Features

Is the Internet a Safer Place for Content Owners? Image

Is the Internet a Safer Place for Content Owners?

Alan R. Friedman

Many battles have been fought in courtrooms across the United States over the unauthorized Internet sharing of copyrighted books, music, movies and television shows. These include disputes over increasingly more sophisticated software products and websites that appear designed to respond to the latest court rulings over the scope of the DMCA "safe harbor" protections and the elements required to establish secondary copyright infringement liability.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›