Features

Social Media Scene: How to Transform Your Rainmakers Into Social Media Rock Stars
How to transform your rainmakers into “social media rock stars.”
Features

Presidential Cybersecurity Handoff
Given the pending change in administration and uncertainty around President-elect Trump's priorities on cybersecurity, an analysis of the current federal cyber landscape may yield insights into how the next administration might prioritize their approach on this important front.
Features

Internet Law in a Trump Presidency
President Trump is already being pressured to reverse President Obama's Open Internet Order (also known as “net neutrality”) and take an aggressive stance against it. It remains to be seen how President Trump will balance the call for privacy regulations amidst our country's vulnerability to cyber-attacks.
Features

Practical Approaches to the EU-US Privacy Shield
This article discusses the corporate impact of the EU-US Privacy Shield and practical approaches to managing global corporate data in the wake of <i>Schrems</i>.
Features

In Light of Recent FTC Actions, Review Your Privacy Policy
The United States does not have comprehensive legislation addressing the privacy implications of the collection and use of geolocation data. However, the Federal Trade Commission (FTC) has used its enforcement authority under Section 5 of the FTC Act to regulate companies engaged in unfair or deceptive practices involving geolocation data.
Features

What Lawyers Can Learn from Uber, Redux
Lawyers need to know what the client wants and how to get them there before the process starts. Just like a driver who doesn't know exactly where he's taking his riders, a lawyer who isn't totally sure what a client wants — let alone how to get them there efficiently and effectively — is likely to end up with a client who is disgruntled.
Features

Estate Planning for the Digital Afterlife
This article discusses the importance of accounting for digital assets in an estate plan, provides practical considerations for handling their disposition after death, and describes the current state of the law for the handling of digital assets after death.
Features

<i>Online Extra</i> <br>Are Google's Confidentiality Agreements Illegal?
A current Google Inc. employee has sued the tech giant over its rules for protecting confidential information, alleging they prohibit workers from whistleblowing or even just complaining to their spouse about their boss. Employment lawyers say that if the allegations in the complaint are true — a big if, of course — Google's rules may well be overly restrictive.
Features

Why the DMCA Needs to Be Modernized
It has been 18 years since the DMCA was signed into law. It was created to balance the security and rights of copyright holders with the growing influence of digital communications. But today it is facing serious criticism about its usefulness from every key stakeholder — creators, distributors and consumers alike.
Features

Estate Planning for the Digital Afterlife
As more Americans establish personal email accounts, social media accounts, and other electronic accounts, these “digital assets” are becoming an increasingly vital estate-planning consideration. The failure to consider how to dispose of digital assets in an individual's estate plan could result in later complexities following the individual's death.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- How the U.S.-China Trade War Effects IP StrategyThe trade war between the United States and China has had far-reaching effects on international trade and the global economy. The dispute is slowly developing into a battle of attrition, without any immediate resolution on the horizon despite ongoing trade talks. As businesses change the way they operate in response to this unpredictable trade environment, counsel should consider the risks and potential impacts on corporate IP strategy.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›