Features
Criminal Subpoenas for Online Data
Never before has so much personal data been available anywhere but also completely outside the immediate control of the person who created it. Companies like Google and Facebook are the entities responding to government search warrants and subpoenas for individuals' personal information. Federal courts continue to struggle ' and sharply disagree ' over the scope of Fourth Amendment protections for this data.
Features
<i><b>Online Extra:</i></b>Facebook Fights to Snuff Out Privacy Suit
U.S. District Judge Phyllis Hamilton was set last month to be the latest jurist in the Northern District of California to grapple with how decades-old federal wiretapping laws apply to today's technology.
Features
Interpreting China's New Trademark Law
Despite China's quotas on film and TV program imports, and the country's aggressive content restrictions, the U.S. entertainment industry continues to look at the world's second largest economy as essential for expanding the international audience for U.S. productions. With that in mind, this article examines the first major amendments to China's trademark law in more than 20 years.
Features
Courts Conflict on Anonymous, Allegedly Defamatory Online Speech
Anyone spending 10 minutes on the Internet reading content is often assaulted by angry and coarse language supporting frequently outrageous opinions. The First Amendment concepts of free speech have reached either new highs or discouraging lows when dealing with opinions and blogs on the Internet. In this unrestricted environment, can individuals or businesses protect their reputations?
Features
Evolution of the Patent Infringement Safe Harbor
Since its enactment in 1984, the scope of the "safe harbor" provision of the patent code has been in flux. The provision is intended to exempt from infringement certain acts related to the development of drugs and medical devices that are subject to FDA regulatory approval, to enable competitors to immediately enter the market upon patent expiration. However, the contours and boundaries of the safe harbor have been a consistent source of controversy in the courts.
Features
Collecting Social Security Numbers
In the first half of 2014, at least 96 significant data breaches were reported, compromising more than 2.2 million records. Of these breaches, at least 46 involved records that may have contained Social Security Numbers (SSNs). What the affected businesses may not know is that the mere collection of SSNs may have put them in violation of state laws, in addition to the liability they may now face for having failed to protect the SSN information.
Features
CFPB Gets Real About Bitcoin Risks
Consumers should be cautious when using bitcoin and alert the U.S. Consumer Financial Protection Bureau (CFPB) to any problems with the virtual money, the agency said last month after a government watchdog this summer urged the CFPB to engage more on the currency.
Features
Valuation of a Law Firm and a Law Practice
Lawyers leaving a law practice have an economic interest in monetizing their career-long investment in building a client portfolio and a referral network. How each lawyer has accomplished this depends on his or her particular practice, market and style. But while the means may vary, the results are the same ' access to clients who have legal needs. And this is the value the acquirers wish to capture.
Features
The DNA of an In-House Corporate e-Discovery Project Manager
What is the DNA of an in-house e-discovery project manager ' and how can you become one, whether you are a lawyer or a technician? Let's define an in-house e-discovery project manager, examine in-house corporate hiring trends and endeavor to understand what the corporate appetite is for grooming talent or, conversely, for hiring experienced e-discovery professionals.
Features
Is It a 'Cyberattack' or a 'Data-Breach Incident'?
This article goes beyond the nuts and bolts of how to respond to a data-breach incident, and offers some lessons learned from the frontlines of the cybersecurity war to help companies successfully navigate the legal and public-relations minefield that ensues.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- How Secure Is the AI System Your Law Firm Is Using?In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Big Law Banks On Contingency Fees to Maximize ProfitabilityIn a quest to maximize profitability, Am Law 200 law firms have grown their share of business tied to contingency fees, a gamble that has paid off for some firms in recent years.Read More ›
- Role and Responsibilities of Practice Group LeadersIdeally, the objective of defining the role and responsibilities of Practice Group Leaders should be to establish just enough structure and accountability within their respective practice group to maximize the economic potential of the firm, while institutionalizing the principles of leadership and teamwork.Read More ›