Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Strict Liability Claims for Prescription Medical Products
September 02, 2015
On July 16 of this year, decisions by two federal judges once again spoke to the Pennsylvania Supreme Court's silence on a fundamental issue of tort law applicable to prescription medical product liability claims in the Commonwealth.
Significant UK Court Ruling on Data Protection Liability
September 02, 2015
The UK's Court of Appeal gave a very important judgment in March 2015 in a case concerning Google's Internet behavior tracking through a browser. First, misuse of private information is now classified as a tort, thereby in this case enabling proceedings to be issued against a party outside the jurisdiction of the UK; and, second, financial compensation for distress caused by breaches of the Data Protection Act 1998 may now be claimed, despite there being no monetary loss.
e-Mail Risk Mitigation For Law Firms
September 02, 2015
Each day, attorneys create and handle documents that require strict confidentiality to avoid loss of evidentiary privileges. In today's digital workplace, many of these files are exchanged via e-mail. While e-mail allows for convenience, speed and portability, each attorney using e-mail must ask before sending: "Am I putting my client's confidentiality needs and expectations, as well as my ethical obligations, at risk?"
IP News
September 02, 2015
Federal Circuit: District Courts Must Address <i>Intel</i> Factors In Determining Whether to Modify A Protective Order In Foreign Proceedings <br>Federal Circuit Applies An 'Abuse of Discretion' Standard of Review for a PTO 'Special Circumstances' Determination
Data Sharing in the Cloud
September 02, 2015
Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.
Online Impersonation Continues, With Varying Consequences
September 02, 2015
Online impersonation is defined in the New York Code provisions that prohibit the practice, as the act of impersonating another "under an assumed character with intent to obtain a benefit or to injure or defraud another." The foremost case brought under this law, <i>People v. Golb</i>, in many ways epitomizes the bizarre and highly esoteric reasons why someone chooses to impersonate another in the first place.
Recent Challenges To the FTC's Data Regulation Authority
September 02, 2015
Early on in 2015, pundits were already predicting that the extent and number of data breaches from 2014 would severely pale in comparison to those that would occur in 2015. Inevitably, people across the country, victims, media, members of government, and even litigious-minded attorneys, are scrambling to determine what legal recourse exists to not only retroactively seek retribution, but also proactively enforce data security methods ' a task that is still at its nascent stages of development.
<b><i>Online Extra:</b></i> Banks' Lawyers Balk at Target's Data-Breach Deal
August 31, 2015
Plaintiffs lawyers representing some banks and financial institutions caught up in Target's 2013 data breach say the $67 million deal struck last month between the retailer and Visa Inc. leaves their clients shortchanged.
<b><i>Online Extra:</b></i> Apple Beats Back Privacy Suit Over iMessage Glitch
August 31, 2015
A federal judge in San Jose has refused to certify a class of former Apple customers who claim the company illegally intercepted their text messages as a result of a glitch in its iMessage system.
<b><i>Online Extra:</b></i> Am Law 200 Firms Spending $7M on Cybersecurity Annually
August 31, 2015
With unfettered access to critical documents and information, law firms are an attractive target for hackers. Even when firms employ cutting-edge data security techniques, their possession of corporate data still multiplies the surface area of risk for that information. A recent survey of the Am Law 200, which tapped nearly one-third of firm CIOs for their experience, is showing the extent to which the highest grossing firms are spending to mitigate the risk associated with data security.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Unlicensed Real Estate Broker in New York: Beware
    The U.S. District Court for the Northern District of New York recently determined that because New York prohibits unlicensed real estate brokers from pursuing payment in its courts for services rendered, a plaintiff who performed real estate work for a client who then did not pay had no standing to sue.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • How the U.S.-China Trade War Effects IP Strategy
    The trade war between the United States and China has had far-reaching effects on international trade and the global economy. The dispute is slowly developing into a battle of attrition, without any immediate resolution on the horizon despite ongoing trade talks. As businesses change the way they operate in response to this unpredictable trade environment, counsel should consider the risks and potential impacts on corporate IP strategy.
    Read More ›