Features
Fact or Fiction: Trial Counsel Should Author Patent Opinions
When patent issues arise, clients often need both trial counsel and opinions of counsel. Opinions are primarily needed for: 1) advice on how to avoid infringement; 2) assessment of liability risks and potential outcomes of infringement lawsuits; and 3) protection against a finding that any infringement was willful. Trial counsel are needed when a patent infringement suit is threatened, imminent, or instituted. This article discusses the advantages of employing the same attorney or law firm as both opinion counsel and trial counsel. It explains why disqualification of counsel is not as much of a concern as some commentators emphasize. Finally, it analyzes the issues surrounding attorney-client privilege and work-product protection and concludes that the dangers are minimal with experienced trial counsel.
Features
Product Review: ProLaw
After considerable analysis of our firm's existing software and case management practices, we went shopping. We chose tradeshows like the ABA Techshow to familiarize ourselves with software options. Anyone who's ever attended a tradeshow knows how overwhelming the vendor presentations can be, and how after a while all products appear to blend in one's mind. It's inevitable, given the amount of information every vendor attempts to convey in each short, intense demo session. We solved that by picking up demo disks wherever possible, and then looking them over in the comfort of our own offices once we'd returned. ProLaw stood out for many reasons, including its ability to integrate all firm practice management functions under one database - something nobody else at the time was doing well, if at all.
Features
E-mail and Records Management in the Legal Environment
Law firms have historically recognized the need to keep all legal matters in some kind of permanent file. Therefore, the position of "record manager" is well known. However, the definition of a "record" has expanded in scope to encompass all computer-generated documents. Importantly, that now includes e-mail and e-mail attachments. This article will explore the differences between records and documents, the unique challenge e-mail represents and issues to be aware of when setting up a cutting edge records management system.
<b><i>Practice Tip</b></i>Security on the Desktop
Information security has come to play an extremely vital role in today's business environment. Whether you are a solo practitioner or an IT Director of an AmLaw 100 or 200 firm, how can you best protect your company's data from being compromised? Anyone who experienced the "Slammer Worm" attack last January or the "So Big Worm" this past August knows the astonishing speed these viruses spread across the Internet. Hundreds of thousands of networks were affected within hours of each of those outbreaks. What is even more disconcerting is that in the case of the Slammer Worm, the attack exploited a well-known vulnerability in SQL Server; one which Microsoft had already fixed in a patch six months earlier. For mid- to large-size firms, a security policy is of paramount importance in order to ensure that the most appropriate security measures have been implemented with an acceptable level of competency and consistency throughout the organization. Physical desktop security, password best practices, virus protection, software installation and e-mail best practices are a few of the subjects that would form the core of the security policy document.
Features
Post Mortem of the Reverse Doctrine of Equivalents
The Federal Circuit in <i>Tate Access Floors,Inc. v. Interface Architectural,</i> 279 F.3d 1357, 1368 (2002), announced the death of the Reverse Doctrine of Equivalents (RDOE). The Supreme Court created the RDOE as an equitable release valve for accused devices that literally infringe claims. The RDOE applies "where a device is so far changed in principle from a patented article that it performs the same or a similar function in a substantially different way, but nevertheless falls within the literal words of the claim." <i>Graver Tank & Manufacturing Co. v. Linde Air Products Co.,</i> 339 U.S. 605, 608-609 (1950); <i>see also Boyden Power-Brake Co. v. Westinghouse,</i> 170 U.S. 537 (1898). In such a case, the RDOE "may be used to restrict the claim and defeat the patentee's action for infringement." <i>Graver Tank,</i> 399 U.S. at 609.
Viewpoint: Class Actions, Reform, and the Impact on Franchisors
Since the 1960s, consumer advocates have used the tool of the class action to shepherd and win redress for those who have relatively small claims, but don't have the practical means to pursue their own individual lawsuits. The honorable intention is to notify and help vulnerable or unsophisticated plaintiffs who may not even realize they have been swindled. Class actions have won significant refunds for HMO customers, credit card and utility customers, and, of course, aided victims negligently exposed to toxic substances.
Features
Structuring a Refranchising Program
There are several things that a franchisor can do in structuring its refranchising program to reduce the likelihood of disputes and litigation. This article discusses the presale market identification and internal due diligence and initial marketing process that culminates in the execution of a letter of intent ("LOI").
Features
Lender Liability and Its Application to Franchising
Lender liability law states that lenders must treat their borrowers fairly and, when they don't, they can be subject to borrower litigation under a variety of legal actions. Franchise relationships have seen their own share of lender liability claims. Franchisees must borrow to acquire assets, franchise agreements, and leasehold interests relating to franchise operations. Thus, franchisees, like all business borrowers, must be aware of their legal rights and legal issues that may arise during the lending relationship.
News Briefs
Highlights of the latest franchising news from across the country.
Court Watch
Highlights of the latest franchising cases from across the country.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- The Cost of Making PartnerMaking partner isn't cheap, and the cost is more than just the years of hard work and stress that associates put in as they reach for the brass ring.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›