Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

Criminal Subpoenas for Online Data Image

Criminal Subpoenas for Online Data

Ben Barnett & Rebecca Kahan Waldman

Never before has so much personal data been available anywhere but also completely outside the immediate control of the person who created it. Companies like Google and Facebook are the entities responding to government search warrants and subpoenas for individuals' personal information. Federal courts continue to struggle ' and sharply disagree ' over the scope of Fourth Amendment protections for this data.

Features

<i><b>Online Extra:</i></b>Facebook Fights to Snuff Out Privacy Suit Image

<i><b>Online Extra:</i></b>Facebook Fights to Snuff Out Privacy Suit

Ross Todd

U.S. District Judge Phyllis Hamilton was set last month to be the latest jurist in the Northern District of California to grapple with how decades-old federal wiretapping laws apply to today's technology.

Features

Interpreting China's New Trademark Law Image

Interpreting China's New Trademark Law

Xiang Gao

Despite China's quotas on film and TV program imports, and the country's aggressive content restrictions, the U.S. entertainment industry continues to look at the world's second largest economy as essential for expanding the international audience for U.S. productions. With that in mind, this article examines the first major amendments to China's trademark law in more than 20 years.

Features

Courts Conflict on Anonymous, Allegedly Defamatory Online Speech Image

Courts Conflict on Anonymous, Allegedly Defamatory Online Speech

Richard Raysman & Peter Brown

Anyone spending 10 minutes on the Internet reading content is often assaulted by angry and coarse language supporting frequently outrageous opinions. The First Amendment concepts of free speech have reached either new highs or discouraging lows when dealing with opinions and blogs on the Internet. In this unrestricted environment, can individuals or businesses protect their reputations?

Features

Evolution of the Patent Infringement Safe Harbor Image

Evolution of the Patent Infringement Safe Harbor

Sarah A. Bennington & Anthony M. Insogna

Since its enactment in 1984, the scope of the "safe harbor" provision of the patent code has been in flux. The provision is intended to exempt from infringement certain acts related to the development of drugs and medical devices that are subject to FDA regulatory approval, to enable competitors to immediately enter the market upon patent expiration. However, the contours and boundaries of the safe harbor have been a consistent source of controversy in the courts.

Features

Collecting Social Security Numbers Image

Collecting Social Security Numbers

Nicole Pszczolkowski & L. Elise Dieterich

In the first half of 2014, at least 96 significant data breaches were reported, compromising more than 2.2 million records. Of these breaches, at least 46 involved records that may have contained Social Security Numbers (SSNs). What the affected businesses may not know is that the mere collection of SSNs may have put them in violation of state laws, in addition to the liability they may now face for having failed to protect the SSN information.

Features

CFPB Gets Real About Bitcoin Risks Image

CFPB Gets Real About Bitcoin Risks

Andrew Ramonas

Consumers should be cautious when using bitcoin and alert the U.S. Consumer Financial Protection Bureau (CFPB) to any problems with the virtual money, the agency said last month after a government watchdog this summer urged the CFPB to engage more on the currency.

Features

Valuation of a Law Firm and a Law Practice Image

Valuation of a Law Firm and a Law Practice

James D. Cotterman

Lawyers leaving a law practice have an economic interest in monetizing their career-long investment in building a client portfolio and a referral network. How each lawyer has accomplished this depends on his or her particular practice, market and style. But while the means may vary, the results are the same ' access to clients who have legal needs. And this is the value the acquirers wish to capture.

Features

The DNA of an In-House Corporate e-Discovery Project Manager Image

The DNA of an In-House Corporate e-Discovery Project Manager

Jared Coseglia

What is the DNA of an in-house e-discovery project manager ' and how can you become one, whether you are a lawyer or a technician? Let's define an in-house e-discovery project manager, examine in-house corporate hiring trends and endeavor to understand what the corporate appetite is for grooming talent or, conversely, for hiring experienced e-discovery professionals.

Features

Is It a 'Cyberattack' or a 'Data-Breach Incident'? Image

Is It a 'Cyberattack' or a 'Data-Breach Incident'?

Mark Mermelstein, Antony Kim & Robert Uriarte

This article goes beyond the nuts and bolts of how to respond to a data-breach incident, and offers some lessons learned from the frontlines of the cybersecurity war to help companies successfully navigate the legal and public-relations minefield that ensues.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES