Columns & Departments
IP News
Federal Circuit: Application by PTAB of Broadest Reasonable Interpretation Standard in Claim Construction Upheld Under the AIA
Features
When Your Data Goes Viral
As discussed in Part One of this article, a data breach can jeopardize a company's confidential information such as client records, trade secrets, privileged legal information, or employee records. Although many associate data breaches with hackers or cyberattacks, human error, such as a mistake in computer coding or losing a company laptop, also results in significant breaches.
Features
2016 Budget Targets Retirement
Last month, the Obama Administration's Fiscal Year 2016 Budget was published, along with the Department of Treasury's Greenbook, a detailed explanation of the President's proposed budget. Because the proposed legislation must pass a Republican led Congress, the President's budget may be "aspirational." It is a good indicator of the tools the Administration is prepared to use to fund its wish list.
Features
Raising the Stakes
The government has become increasingly aggressive in pursuing criminal claims not only against corporations, but also against in-house counsel and compliance personnel, for conduct once treated almost exclusively as civil.
Features
Federal Judge Rules For Defendant in Porn Copyright Case
An anonymous <i>pro se</i> defendant has beaten copyright infringement claims brought against him in federal court by a maker of pornographic videos. The defendant's victory runs counter to the result in a similar case in front of a different Eastern District judge.
Features
How to Obtain Social Media Data For Defending Lawsuits
Obtaining social media user content under most circumstances is extremely difficult ' unless you use the correct strategy. Simply sending discovery requests without a basic understanding of the information available is a fool's errand. It is pivotal that a practitioner who wants to conduct formal discovery of social media user content understand how each site stores and communicates its data.
Features
Disputes over Noise Levels from Live Performances
Noise complaints have long been an occupational hazard for venue operators, musicians and concert promoters. The surge in the electronic dance music scene has added to the number of complaints. What might be enjoyable entertainment to one person may sound like a thunderous racket to another.
Features
Law Firms Aren't Immune to Cybersecurity Risks
Although law firms have managed to remain off the list of the year's biggest data breach victims, firms watching cybersecurity trends most closely are feeling increasingly uneasy about their own security posture.
Features
After Anthem, Diagnosing the Health of Data Security
Companies have begun to experience attempts to breach their databases on a frequent basis, and have had to become hypervigilant about protecting their networks against hackers. But once every couple of months, the bad guys get through the defense systems in a big and highly publicized way, showcasing data disaster for company and customers. This was the case in early February when Anthem Inc., the second-largest health insurance company in the U.S., announced it had been hacked.
Features
Parents May Be Liable for Child's Activity on Facebook
It's 10 p.m. Do you know what your children are posting online?
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›
- The Unlicensed Real Estate Broker in New York: BewareThe U.S. District Court for the Northern District of New York recently determined that because New York prohibits unlicensed real estate brokers from pursuing payment in its courts for services rendered, a plaintiff who performed real estate work for a client who then did not pay had no standing to sue.Read More ›