Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 2,537 results for "Entertainment Law & Finance"...

Protection Against Today's Network Attacks Begs for Unified Approach
June 29, 2006
The increasingly complex security environment is fueling an innovative approach to network security called Unified Threat Management (UTM) that consolidates and integrates all of the major threat protection services into a single device. UTM can save time and money and redirect IT resources back to the business of improving the practice of law.<br>Even as companies are spending billions on sophisticated new security hardware and software, current research indicates that corporate networks are being successfully attacked. Data compromises are common. This article outlines the root causes for computer network vulnerabilities and how law firms can ensure better security and more efficient use of their security-related investments.
Asset Creation, Seclusion And Money Laundering In The Virtual World
June 29, 2006
As more and more people take up residence in the virtual world ' sometimes also called digital or synthetic worlds ' through their participation in one of the many 'Massively Multiplayer Online Role-playing Games' (MMPORGs) currently available online, the potential for monetary abuse and malfeasance also increases. While the original virtual worlds were built by private gaming companies for their subscriber base and were fully controlled by the designers and their all-encompassing End-User Licensing Agreements (EULA), new MMPORGs have emerged that provide individual players with more freedoms ' including the ability to create, seclude or launder wealth. The likelihood of this new technology being co-opted for unscrupulous purposes is great, since historically the same has happened in response to other advances in technology.
Bit Parts
June 29, 2006
Copyright Infringement/Attorney Fees<br>Executive Compensation/Severance Pay<br>Film Distribution/Net Profits
Courthouse Steps
June 29, 2006
Recently filed cases in entertainment law, straight from the steps of the Los Angeles Superior Court.
Counsel Concerns
June 29, 2006
The Court of Appeal of California, Second Appellate District, Division Five, affirmed the disqualification of a law firm from representing plaintiffs in litigation over the late singer Eva Cassidy.
Cameo Clips
June 29, 2006
Recent cases in entertainment law.
<b>Decision of Note: </b>Copyright Law Preempts Singer's Publicity Claim
June 29, 2006
The U.S. Court of Appeals for the Ninth Circuit decided that singer Debra Laws' state right-of-publicity claim over the use of her voice in a Jennifer Lopez sound recording and music video was preempted by federal copyright law. <i>Laws v. Sony Music Entertainment Inc.</i>
Songwriters Gain from Change in Tax Law
June 29, 2006
Tax-treatment and copyright-reversion issues are among the most complicated concerns songwriters and music publishers face. This article examines a recent change in federal tax law regarding the sale of musical compositions, as well as related tax and reversion issues.
Some Old Lessons For New Enterprises
June 28, 2006
e-Commerce firms have aggressively marketed themselves as the new kids on the block. They eagerly discard old ways of doing business, confident that their way of doing business ' online ' is better. It's an e-commerce article of faith that everyone can work more efficiently if he or she would only eliminate outdated practices that don't take advantage of the conveniences available online.<br>But maybe some supposedly 'old' laws and ways of doing business have survived ' for decades and centuries ' for reasons other than that the Internet had not yet been invented. Sometimes, the tried and true is sufficient for what's needed. The old way may work more reliably, and perhaps even better than, the new path offered by e-commerce.
Internet Privacy: Do You Know Who's Collecting Information About You?
June 15, 2006
While savvy users of the Internet may be aware of the multitude of ways that personal information can be monitored and collected on the Web, most users are likely oblivious to the information trail they leave behind. How many readers of this publication, a population plainly concerned with privacy issues, have read the privacy policies of their favorite Web sites? If you have not, you may be surprised to learn about the amount of information collected by even the most popular and mainstream sites. For example, when a user requests and views a Web page from Yahoo!, that request is logged on Yahoo!'s servers with information including the IP address of the computer that requested the page. Even if information is not purposely collected, just about everything a person does on the Web is stored somewhere for at least some period of time.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›