Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


What Should the Filing Time Be for Common Law Copyright Infringement Suits?
May 02, 2014
Rights in pre-Feb. 15, 1972, sound recordings ' which are protected by state law, rather than federal copyright law ' are hotly litigated in the digital music era. On April 17, for example, major record labels sued the music-streaming service Pandora in New York Supreme Court in Manhattan. The suit alleges common-law copyright infringement and unfair competition from Pandora's use of pre-1972 recordings.
Cameo Clips
May 02, 2014
Actor's Agreement Gave Merchandising Rights to Production Company<br>E-Book of English Translation of Novel Isn't Derivate Work
War College Curriculum for Defense Counsel
May 02, 2014
If your company or client is the target of such a frivolous claim, there is a growing body of law that offers effective offensive strategies.
Case Briefs
May 02, 2014
In-depth analysis of key rulings.
The Debate About Actors' Ownership of Film Roles
May 02, 2014
The April issue of <i>Entertainment Law &amp; Finance</i> reported on a ruling by the U.S. Court of Appeals for the Ninth Circuit involving the Internet video <i> Innocence of Muslims.</i> That article discussed the court's "secret" takedown order and the court's view on copyright ownership of acting roles in movies. The article that follows provides further analysis of the copyright ownership issue in the case.
Are We All Computer Felons?
May 02, 2014
The Computer Fraud and Abuse Act (CFAA) has come under recent scrutiny due to its use against unsuspecting individuals who may not be the malicious hackers that the Act was originally meant to address.
Using Extraterritorial Cyber Subpoenas To Obtain Evidence
May 02, 2014
Although the reach of the federal government is impressive, all 50 states have had for some time a powerful weapon in the form of the Uniform Act to Secure the Attendance of Witnesses from Without the State (Uniform Act). Originally enacted in New York in 1936, it is used today to facilitate the issuance of extraterritorial or "cyber subpoenas," with nationwide reach.
At the Intersection: Dispatch to Managing Partners
May 02, 2014
Are the predicted trends <i>really</i> trending?
Speaking Engagements for Attorneys
May 02, 2014
Do you want to be considered a thought leader in your field? What law firms need to do is expose their expertise and practice groups to new prospects for their services.
Credit Bid Buyers Beware: Delaware Bankruptcy Court Caps Credit Bid
May 02, 2014
A cautionary tale for secured lenders who may want to credit bid to acquire a debtor's assets.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›