The Beggs & Lane Blog
Robert Levinson is America’s longest held hostage. He has been held by the Iranian government for almost 13 years. Iran has held Mr. Levinson incommunicado during that time, allowing no contact with his family or anyone outside of his jailers. Iranian officials have publicly denied any knowledge of Mr. Levinson’s whereabouts while simultaneously engaging in secret negotiations in which they sought to extort concessions from the United States in return for Mr. Levinson’s release. Beggs & Lane has brought suit against the Islamic Republic of Iran under the Foreign Sovereign Immunities Act (FSIA), 28 U.S.C. § 1605A, on behalf of [...]
By Jack Zoesch and Matthew Massey Cybersecurity is vitally important to organizations large and small. Cyberattacks and data leaks can grab headlines, destroy client confidence, and expose a company to civil and criminal liability. Below are five things every business should know about cybersecurity protection. Assume you are a target. Companies increasingly rely on digital technology for the storage and transmittal of private information about clients, business partners, and other constituencies. As this reliance has increased, so too has the frequency of cybersecurity incidents. Most are familiar with attacks on large institutions such as Target or Allscripts. What many do [...]
By: Terrie L. Didier If counsel failed to make an argument prior to entry of judgment, Florida Rule of Civil Procedure 1.530 can be a lifeline to preserve the issue for review on appeal. Lack of preservation will be excused only in very limited circumstances, i.e., denial of due process or the court lacked subject-matter jurisdiction. Rule 1.530 is also available to address a deficient order or judgment. If the matter was tried before a judge without a jury, a motion for rehearing to challenge the findings as not supported by competent, substantial evidence is not necessary. However, when a [...]
When choosing a brand name or slogan, an often-overlooked consideration is the strength of potential trademark protection. Whether a fresh-faced entrepreneur starting a new business or a seasoned marketing expert, anyone who creates a brand must contemplate the degree of protection afforded to that mark. To obtain protection under U.S. trademark laws, marks must be “distinctive” with respect to the goods or services for which they issue. Protectable and enforceable marks are either inherently distinctive or have acquired distinctiveness through secondary meaning. Below is the “spectrum of distinctiveness,” or levels of strength under U.S. trademark law, from strongest to weakest [...]
Federal law enforcement agents have tremendous power to investigate a wide variety of cases. Whether from the FBI, DEA, IRS, or SEC, these agents use many different tools to gather information. A commonly-used tool by these agents is an unscheduled, surprise visit to a person’s home or work. This is commonly known as an “ambush interview.” The general rationale behind this type of interview is that a person will be sufficiently startled and unprepared such that they will immediately speak to the agent without any conditions or restraints. If this happens to you, there are three things to keep in [...]
Traveling Out of the Country? Be Prepared to Allow CBP to Inspect the Contents of Your Electronic Devices Upon Returning Home.
By: Charles T. Wiggins The U.S. Customs and Border Patrol (CBP) has the right to inspect the contents of your electronic devices—iPhones, iPads, laptops, etc.—upon entry to the United States. Even if you are a U.S. citizen. That means that CBP has a right to look at every e-mail, text, or photo you have on your phone. And CBP doesn’t have to obtain a warrant to do so. Does this seem overly intrusive? Certainly. But CBP says: “As a constitutional matter, border search authority is premised in part on a reduced expectation of privacy associated with international travel.” CBP Directive [...]