Features
Privacy v. Data Security
The year 2005 really marked the beginning of the "era of data breaches," and with it, the "era of data breach lawsuits." In its place, what is now commonplace in the wake of major data breaches ' class action "privacy" litigation on behalf of data subjects, seeking millions of dollars in damages, under a dizzying array of legal theories.
Features
Can an Applicant With a Criminal History Buy a Franchise?
The character of a franchise prospect seems relevant. Franchisors want trustworthy participants in the franchise system. A credit report and a criminal history search seem reasonable to screen out undesirables. Roughly one in four adults has some criminal history that would show up on a search, and some of these crimes have since been decriminalized. Using searches of criminal histories and credit reports can also be racially discriminatory.
Features
Sup. Ct. To Clarify <i>Fogerty</i> Copyright Attorney Fees Factors
For the second time in three years, the U.S. Supreme Court is poised to consider important questions under the Copyright Act at the behest of Supap Kirtsaeng, a tenacious Thai math professor. In 2013, the Supreme Court handed Kirtsaeng an important victory in a litigation brought against him by a major publisher, holding that a copyrighted work published and purchased abroad may be resold in the United States without the permission of the copyright holder.
Features
The Advice-of-Counsel Defense and the Corporate Employee: A Loss of Balance
Ordinarily, a defendant who wishes to assert the defense of advice of counsel must unlock the door that shields his privileged communications with counsel and divulge those communications to his adversary. But when the defendant is a corporate employee who claims to have relied on advice from the corporation's attorney, the employee may not be able to unlock that door.
Features
The NJ Franchise Practices Act and the Legacy of 'Instructional Systems'
The New Jersey Franchise Practices Act is a powerful tool for those businesses that qualify for its protections. Under the NJFPA, a franchisor cannot terminate a franchisee without good cause, even where doing so would be perfectly acceptable under the parties' contract. The NJFPA also prohibits a franchisor from imposing "unreasonable standards of performance" on a franchisee.
Features
Top Security Intrusion Trends the Legal Community Should Watch
Lawyers are increasingly expected to understand the implications of cybersecurity when providing advice relating to a long list of matters. Legal counsel, as trusted neutral advisors, are uniquely qualified to help navigate risk considerations and bridge customer deliverables and workforce expectations with adequate security and shifting legal requirements. As a result, it is important that lawyers understand the latest trends in cyber intrusions.
Features
<b><i>Online Extra:</b></i> FDIC Chimes In on Cybersecurity
The Federal Deposit Insurance Corporation is the latest entity to release a framework for cybersecurity.
Features
Milestone Reached in UK Bribery and Corruption Enforcement
An application brought by the UK's Serious Fraud Office (SFO) for a so-called Deferred Prosecution Agreement (DPA) was approved in court in London on Nov. 30, 2015, marking a historic milestone for UK bribery and corruption enforcement as this was the first time that a DPA has been adopted.
Features
2015 Tax Legislation: Extenders Plus More
2015 was an eventful year for tax legislation for law firms, their clients and their employees. In addition to the extenders package, that has become an annual tradition in Congress, there were some other significant tax bills that passed over the summer.
Features
Mobile App Developer Agreements
Many companies that have had disputes with developers have been surprised to discover that the agreements signed, often without input from legal, failed to hold developers to measurable standards, give the company ongoing interest in deliverables, or provide meaningful remedies to problems that arise.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Role and Responsibilities of Practice Group LeadersIdeally, the objective of defining the role and responsibilities of Practice Group Leaders should be to establish just enough structure and accountability within their respective practice group to maximize the economic potential of the firm, while institutionalizing the principles of leadership and teamwork.Read More ›
- Big Law Banks On Contingency Fees to Maximize ProfitabilityIn a quest to maximize profitability, Am Law 200 law firms have grown their share of business tied to contingency fees, a gamble that has paid off for some firms in recent years.Read More ›
- How the U.S.-China Trade War Effects IP StrategyThe trade war between the United States and China has had far-reaching effects on international trade and the global economy. The dispute is slowly developing into a battle of attrition, without any immediate resolution on the horizon despite ongoing trade talks. As businesses change the way they operate in response to this unpredictable trade environment, counsel should consider the risks and potential impacts on corporate IP strategy.Read More ›