Columns & Departments
IP News
Federal Circuit: Application by PTAB of Broadest Reasonable Interpretation Standard in Claim Construction Upheld Under the AIA
Features
When Your Data Goes Viral
As discussed in Part One of this article, a data breach can jeopardize a company's confidential information such as client records, trade secrets, privileged legal information, or employee records. Although many associate data breaches with hackers or cyberattacks, human error, such as a mistake in computer coding or losing a company laptop, also results in significant breaches.
Features
2016 Budget Targets Retirement
Last month, the Obama Administration's Fiscal Year 2016 Budget was published, along with the Department of Treasury's Greenbook, a detailed explanation of the President's proposed budget. Because the proposed legislation must pass a Republican led Congress, the President's budget may be "aspirational." It is a good indicator of the tools the Administration is prepared to use to fund its wish list.
Features
Raising the Stakes
The government has become increasingly aggressive in pursuing criminal claims not only against corporations, but also against in-house counsel and compliance personnel, for conduct once treated almost exclusively as civil.
Features
Federal Judge Rules For Defendant in Porn Copyright Case
An anonymous <i>pro se</i> defendant has beaten copyright infringement claims brought against him in federal court by a maker of pornographic videos. The defendant's victory runs counter to the result in a similar case in front of a different Eastern District judge.
Features
How to Obtain Social Media Data For Defending Lawsuits
Obtaining social media user content under most circumstances is extremely difficult ' unless you use the correct strategy. Simply sending discovery requests without a basic understanding of the information available is a fool's errand. It is pivotal that a practitioner who wants to conduct formal discovery of social media user content understand how each site stores and communicates its data.
Features
Disputes over Noise Levels from Live Performances
Noise complaints have long been an occupational hazard for venue operators, musicians and concert promoters. The surge in the electronic dance music scene has added to the number of complaints. What might be enjoyable entertainment to one person may sound like a thunderous racket to another.
Features
Law Firms Aren't Immune to Cybersecurity Risks
Although law firms have managed to remain off the list of the year's biggest data breach victims, firms watching cybersecurity trends most closely are feeling increasingly uneasy about their own security posture.
Features
After Anthem, Diagnosing the Health of Data Security
Companies have begun to experience attempts to breach their databases on a frequent basis, and have had to become hypervigilant about protecting their networks against hackers. But once every couple of months, the bad guys get through the defense systems in a big and highly publicized way, showcasing data disaster for company and customers. This was the case in early February when Anthem Inc., the second-largest health insurance company in the U.S., announced it had been hacked.
Features
Parents May Be Liable for Child's Activity on Facebook
It's 10 p.m. Do you know what your children are posting online?
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- How Secure Is the AI System Your Law Firm Is Using?In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Big Law Banks On Contingency Fees to Maximize ProfitabilityIn a quest to maximize profitability, Am Law 200 law firms have grown their share of business tied to contingency fees, a gamble that has paid off for some firms in recent years.Read More ›
- Role and Responsibilities of Practice Group LeadersIdeally, the objective of defining the role and responsibilities of Practice Group Leaders should be to establish just enough structure and accountability within their respective practice group to maximize the economic potential of the firm, while institutionalizing the principles of leadership and teamwork.Read More ›