Features
Safe Harbor for Service Providers under the Anticybersquatting Act
GoDaddy.com has been the prevailing defendant in two major lawsuits under the Anticybersquatting Consumer Protection Act (ACPA). In both cases, plaintiffs sought to hold a defendant liable for contributory or secondary infringement rather than "direct" cybersquatting under the ACPA. The principal reason for plaintiffs' lack of success lies in a fundamental misunderstanding of the ACPA.
Features
<b><i>Online Extra:</b></i> NJ Legislature Moves on Cybersecurity Bill
The New Jersey Legislature on Oct. 5 began taking steps toward increasing its ability to combat cybercrime.
Features
Overcoming Challenges In Transferring Technology In Academia and Beyond
University technology transfer offices (TTOs) bridge the gap between innovation and commercialization by identifying ways to protect university-generated innovations from unauthorized exploitation, by obtaining the appropriate protection for such innovations, and by facilitating commercialization of these innovations. For-profit companies worldwide engage in a similar process; however, universities face unique challenges in these efforts.
Features
Reviewing the CFAA
Locks, the saying goes, keep honest people honest. But no lock is perfect and the determined thief will always find a way in. In recent years, it has become obvious that the same is true of the Internet.
Features
The Key to ELM Success Is Creating A Great User Experience
The tasks involved in managing legal, risk and compliance functions aren't simple. But when they take place with the support of a comprehensive Enterprise Legal Management (ELM) solution with a well-designed and holistic user experience, it can all be executed with confidence and efficiency.
Features
Twitter Faces Privacy Suit over Direct Messages
Twitter Inc. has been hit with a proposed class action alleging that the company's handling of direct messages between users violates the Electronic Communications Privacy Act (ECPA).
Features
2015 Trends: Balancing Judicial vs. Corporate e-Discovery Practices
The changing data landscape and prevalence of new data sources continues to impact how e-discovery is addressed. I had the opportunity to discuss these impacts with Andrea D'Ambra, senior counsel for Norton Rose Fulbright, as part of a recent webcast. We compared and contrasted findings from Norton Rose Fulbright's Litigation Trends Annual Survey of in-house counsel and Exterro's 2015 Federal Judges' Survey. Following are the takeaways we discussed.
Features
<i>Ariosa Diagnostics v. Sequenom </i>
On June 12, 2015, the U.S. Court of Appeals for the Federal Circuit, in <i>Ariosa Diagnostics,</i> affirmed a grant of summary judgment of invalidity of another patent in the biotech space. The decision adds to a long and growing list of patents that have fallen in the wake of the Supreme Court's recent 35 U.S.C. '101 jurisprudence.
Features
Using Digital Tools To Assess and Remedy Online Reputational Damage
The speed with which negative Internet postings spread can cause immediate reputational harm. To remedy this harm, the nature and extent of the damage must be quantified, which is no easy task. This is true whether a defamation lawsuit is pursued or whether a public relations strategy is used. However, new digital tools can now be used to assess and quantify damage caused by these kinds of negative Internet postings.
Features
<b><i>Online Extra:</b></i> DOJ Wants Massive Government Data Breach Suits Consolidated
It was the worst data breach in the history of the U.S. government, and now the Justice Department says the ensuing lawsuits filed in six different jurisdictions belong in a single court in Washington, DC.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›
- Issues in Reverse Morals Clauses In Talent Influencer Contracts With Product BrandsThe next company general counsel to slide a morality clause across the desk for a celebrity or web influencer to sign shouldn't be surprised if that talent also whips out a morals clause, one to cancel the contract if the company's brand acts immorally.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›