Features
New Developments In Social Media Discovery In Employment Cases
As social media websites have become increasingly popular, courts have continued to address the legal issues raised by social media, particularly in the area of discovery. This article focuses on recent developments in the discovery of social media content in employment discrimination cases.
Features
<i>Inter Partes</i> Reviews
In September of last year, the America Invents Act introduced a number of powerful tools for challenging the validity of an issued patent at the USPTO ' Inter Partes Review (IPR), Covered Business Method Review (CBMR), and Post-Grant Review (PGR). By a large margin, however, the most popular of these procedures has been the IPR.
Features
Legal Battle Plans
Cyber security incidents are rising very rapidly. The growing number of serious attacks on essential cyber networks is one of the most serious threats the U.S. faces. One of the critical controls relating to cyber security incidents is the implementation of effective cyber security incident response plans. This article recommends that legal battle plans be developed and maintained as a critical part of your cyber security incident response plans.
Features
Data Encryption And the Law
This article discusses several of the pressing matters within the realm of data encryption, including: the Constitutional concerns that arise when an individual is forced by the government to divulge encrypted data; the recent disclosures in the press of government involvement with encrypted data; and the current global legal climate in which these issues are situated.
Features
Federal Courts Continue to Decide California Anti-SLAPP Motions, Despite Criticism
Ninth Circuit federal appeals court Chief Judge Alex Kozinski recently questioned whether federal courts should hear motions to strike under California's "ant-SLAPP" statute. He wrote that the state statute "cuts an ugly gash through" the "integrated program of pre-trial, trial and post-trial procedures" set out in the Federal Rules of Civil Procedure.
Features
ICANN's Trademark Clearinghouse Sees Slow Initial Take-up
Later this year, the Internet is set to undergo a series of new and drastic changes with the first rollout of hundreds of new generic Top Level Domains (gTLDs). However, there is still a significant lack of participation from many top businesses that have yet to register and, as a result, are at greater risk of intellectual property infringement and potentially putting consumers at risk as well.
Features
Nine Key Steps In a Proactive Cybersecurity Review
Securing your company's network and protecting your valuable data is difficult enough in today's Internet-driven economy. But to be treated by regulators and courts like an accessory to the crime after you've been hacked is truly adding insult to injury.
Features
SEC Takes First Significant Steps Toward Crowdfunding
Recently finalized rulemaking by the SEC to implement the Jumpstart Our Business Startups Act allows issuers of securities to engage in general solicitation and advertising to accredited investors in some private placement offerings of securities. Although the SEC's announcement leaves several notable questions unanswered, Rule 506(c) has the potential to enhance the utility of investment programs in the franchise world.
Features
Bloggers Want Same Rights as Mass Media
Bloggers, claiming that no distinction exists between blogs and traditional media, are seeking protection afforded by the First Amendment rights previously reserved for traditional media outlets. However, most courts do not afford bloggers the same rights given to traditional media.
Features
FTC Expanding Its Role in 'Internet of Things' Security
The FTC continued to expand its reach into cybersecurity last month when it took legal action against TRENDnet, which markets Web-connected home security cameras that allowed hundreds of live video feeds to be hacked and posted online.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- How Secure Is the AI System Your Law Firm Is Using?In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Big Law Banks On Contingency Fees to Maximize ProfitabilityIn a quest to maximize profitability, Am Law 200 law firms have grown their share of business tied to contingency fees, a gamble that has paid off for some firms in recent years.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›