Learn How to Copyright Your Music

the law

To protect your music from being misused or plagiarized, you need to copyright your music. This is essential or you may find your music being ripped off. If the copyrighted material is plagiarized then you can take action and claim damages but unless the music is copyrighted, you may be left high and dry, wringing your hands in frustration. Copyrighting comes with a fee as most things do, however it gives you peace of mind regarding your creative effort.

What is Copyrighting?

When you write or compose something original and lay claims to it, it automatically becomes your own. Laying claims need to be made through a statutory body recognized by law. In this way you can be assured that your original creation will not be misused. Some people simply send a copy of the CD to themselves in their mail to prove the date and time. This is poor man’s copyright and does not carry too much weight nor is it enough to claim a penalty. A copyright needs to be approved by the government to make it legal. The official process to copyright your music involves going through the government process of obtaining a copyright from the US Copyright Office. The process is simple and reliable.

Requirements for Copyrighting Your Music

A copy of the songs to be copyrighted A copyright form An envelope for mailing them $45

Tips Regarding the Official Copyright Form

1. If you are going to copyright your music, sound as well as music, then you need Form SR for Sound Recording to copyright both as copyrighting the sound alone will not take care of your composition. This is absolutely required if your band has recorded an album. 2. The Performing Arts copyright lets you copyright the song too. If you submit a recording to be copyrighted then only your song will be copyrighted and not the sound recording. If you are a songwriter and are not worried about the recording the Form PA should be good enough for you. 3. There is a CON or a Continuation Form along with the SR or PA form which can be used as continuation forms when you copyright your music.

Register your copyrighted music

Copyright your music by registering it. First fill in the appropriate forms SR, PA or CON. Write out a check for $45 and make it out to “Register of Copyrights”. Make a good copy of the music that you need copyrighted. This copy will be retained and will not be returned to you. Next put everything (CD, forms and check) in an envelope and mail it to:

Library of Congress Copyright Office 101 Independence Avenue, SE Washington DC 20559-6000

Copyright your music and have peace of mind regarding your composition. This is absolutely necessary if you wish to prevent plagiarism. Copyright your music and make it legally yours. The process is simple does not cost the earth, when compared to the risks involved if you do not copyright your original creation. A lot of effort and time has gone in to creating your music so protect it by copyrighting it.

The Clash – I Fought The Law

The ??????????/????? Law

It's the Law of the Old Testament only the Ten Commandments? I know there are other laws, but The man-made laws that occur or Pharasees laws of God? What laws are going to continue to this day, only the ten commandments? Jesus said to follow his command, which commands apply to us?

The law was given to the nation of Israel to demonstrate that they could reach one foot in front of God based on their performance. They thought they could obey the Ten Commandments and thus gain a correct position with God, but soon discovered they could not do it! Gods standard is 100% from the day they are born until the day you die …. Whoa … can not be done! The purpose of the law was never to make a fair man, but to carry the only person who meets the requirements of U.S. law … Jesus Christ. Once we have come to Christ by our justice and law have recognized that a man never fair, then we become dead to the law and has no authority over us. The Bible says that "Christ is the end of the law to justice all those who believe." The law is not for the righteous, but for the sinner, the Bible says. The law is a mirror that shows us that our face is dirty. It points to the Savior who took our sins on the cross, that we walk in dependence on the Sp irit living within, rather than law can not save anyway. Jesus told the Jews to obey the commandments given to them. We are told to walk in the Spirit and that we are dead to the law, but alive to God. Words of Jesus, while on earth are not intended for today, but to the lost sheep of the house of Israel. You can find instructions of the gods to you as a member of the Body of Christ in Romans to Philemon, where Christ is risen from the dead gives us marching orders through their appointed apostle to us, Paul. www.graceteacher.com

Caveats and Registration

the law

The Land Transfer Act 1952 in New Zealand provide for 5 types of caveats.

A caveat is a warning to anyone to be aware. A Caveat is a notice which is registered against a title for any party to be aware that a claim is being made and sought. Caveats do not create new rights, they are used to protect existing ones. The person lodging a caveat must have reasonable grounds to register a Caveat. If they don’t then they may be liable to compensate anyone who suffers a loss as a result of the registration.

The different types of Caveats are:

1. A caveat against bring land under the Act.
2. A caveat against dealing with land.
3. A caveat against an application for prescriptive title.
4. A caveat as notice of interest in respect of compulsory registration of title.
5. A caveat to forbid issue of an ordinary certificate of title to replace a certificate limited by parcels.

Other types of Caveats can be registered by other statutes. As an example Section 42 Property Relationship Act 1976, where a spouse is claiming an interest in the other spouse’s property.

Or

Section 6 of the Joint Family Homes Act 1964 which allows a creditor to possibly lodge a Caveat claiming an interest in the land due to debt.

The most common caveat we come across is the caveat against dealings. Generally a caveat is used by a person who wishes to protect an interest in land by preventing the registered proprietor from disposing of the land or dealing with it in a way that would affect the caveators rights and interests.

Caveats can be registered to protect a Purchaser under a long term Agreement for Sale and Purchase, or the Caveator is a lessee under an Agreement to Lease, or the Caveator is a mortgage under an agreement or unregistered mortgage, or the Caveator holds an option to purchase, or if the Caveator is a beneficiary under a Trust.

Registration requirements under the Land Transfer Regulations 2002 require;

- The Caveat are signed by the Caveator, attorney for Caveator or the Agent.
- Confirms sufficient certainty the nature of the estate or interest being claimed.
- States the land subject to the claim.
- Appoints an address for service.

If the Caveat is against dealing is must also show the state or interest claimed from the proprietor and whether it is intended to forbid registration of any instruments.

The Clash – I Fought The Law

What is the standard Law School Dehradun?

Dehradun Law School offers the following courses. 1. 5 year BA Integrated Bachelor of Laws Degree after 10 +2. 2. Course 3 years LLB degree after graduation. The College is affiliated with the University of HNB Garhwal, Srinagar (Garhwal), Uttaranchal. The courses are duly approved by the Bar Council of India, New Delhi. The university attracts students from around the country and is the best. Priority is given to train students in practical aspects of the Act, the integration of classroom teaching practice moot court. HSJ

Find Peace of Mind With Living Will Forms

Preparation of a living will guarantees that your family and loved ones will respect your wishes in the event of catastrophic injury or illness. You cannot be too young or too fit to prepare a living will, and the easiest, most economical way to prepare the document is to use a living will form.

Also known as an “advanced medical directive,” a living will specifies your wishes respecting medical procedures in case you become incapacitated and cannot speak for yourself. A living will instructs your family what to do if a physician or surgeon recommends risky procedures or use of life-support systems. In your living will, you may appoint a loved one to act on your behalf, but you also simply may declare your wishes, stipulating that you wish no proxy or surrogate. Most importantly, your living will must be as detailed and specific as possible, because any treatment not included in the document becomes a matter for your next-of-kin to decide. Living will forms assure your thoroughness.

You should discuss your wishes and prepare your living will long before you require any kind of medical treatment. You may enlist an attorney’s, a clergyman’s, or a patient advocate’s assistance as you complete living will forms. Most hospitals either have staff who specialize in advanced medical directives or can refer you to professionals well-qualified to help.

Living will forms help you remember the three essentials.

As you prepare your instructions, make certain of three essentials: First, emphasize the importance of your family’s compliance with your directions; your living will is binding on them, and you should reconcile all disagreements as you negotiate its provisions. Second, make certain your document complies with the laws in your state; loving will forms generally follow or refer you to applicable laws. Third, make certain you date and sign the document in the presence of two trustworthy witnesses. You do not want implementation of your wishes delayed because you missed a minor technicality.

Living will forms cover the most difficult decisions.

Remember that your living will instructs your family, loved ones, and physicians about what to do if you suffer serious injury or illness; it guarantees they will hear and obey your voice. Using living will forms, you assure that you cover issues about tissue and organ donation: are you willing to donate your vital organs to transplant patients or to science? The forms also cover blood transfusions and the use of medications: will you accept a donor’s blood, and will you allow the use of medications with severe side effects or experimental drugs? What kinds of surgery will you allow the doctors to perform; do you absolutely forbid your doctors to perform particular surgeries?

The most difficult decisions involve the use of life support: do you wish to be kept alive on a respirator; and, if so, do you wish to continue receiving food and fluids while machines support your respiration? Under what circumstances would you want doctors or family to “pull the plug”? Although these discussions may cause you and your family great pain and anguish, you more properly can reconcile these issues in the peace and privacy of your own home than you would in the confusion of the intensive care unit. Using a living will form, you gain assurance that doctors will follow your decisions.

Public Records Check - Easier Than Ever Before

Whatever the case is, you maybe want to do a public record check before giving employment and actually searching for the future employees, for your concern or simply to protect yourself or someone you love or intend to take into your love life. Check public records has never been as easier before as it is now. Modern developments on the Internet allow public research performed on individuals to be more accessible, but questions remain about the legality given current privacy laws, but it is totally legal. By using this method, doing a public records check can be accomplished with practically no fees? The answer is yes!

Reviewing public information on individuals is legal until you get into things like medical records, legal testimony and affidavits but everything else is legal. General public data are available freely to most people who are researching for this information. A few examples of free and legal public information are: mortgage transactions, marriage records, divorce records, birth and death records, some specific criminal records and even the orders of the court and thus finding certain types of information about an individual or a group of individuals are legal. And now comes the issues relating to costs.

Before anything, you need to know where you have to go to get public records because the cost involved with finding public information on individuals varies regarding to what type of information you are looking for. Just browsing over the internet can provide you the most basic information having assumed that you have the correct spellings of an individuals name, this information is undoubtedly free of costs, more detailed information is available for a mild to moderate fee, which are generally fairly priced. But before you start searching, you must know what you are looking for; the database expenses will quickly add up if you are not aware of what you are looking for. Municipalities either have, or are in the process of, digitizing their public records and this is why the Internet is such a great tool in searching public records.

It is pretty obvious that performing a public records check using the Internet is quickly becoming the method of choice among those who need public information regarding present or potential employees and individuals who want to know more about a person that is in their life presently or from their past. The tools of undermining this information towards the Internet are now thwarted to history.

Truck Accident FAQs - How Collisions With Semi Trucks Affect Victims

Whenever injury occurs following a large truck accident, the first objective should be to seek medical attention. Next, victims should think about filing a legal claim to recover compensation for their damages. Below are some of the most frequently asked questions about these sorts of accidents.

If I am in a semi-truck accident, should I contact the police?

Yes. Any automobile accident should be documented for the safety of the individuals involved. Along with the obvious trading of names and insurance information, it is wise to seek out information from any relevant witnesses.

Do large truck accidents and the legal procedures that follow differ from the ordinary auto accident?

Technically, there is no difference in the way that negligence is determined. However, there are special laws that apply specifically to semi-trucks. Commercial trucking is regulated by laws at the federal and state level. They are in place to reduce threats to the driver and those who share the road with him, by mandating a number of hours that can be driven, the way that a trailer must be loaded in order to avoid uneven weight, and regulating safety equipment utilized by the vehicle.

Who can sue in a large truck accident?

Anyone injured in the accident has legal right to seek retribution. If there is a fatality, this includes family members of the victim. However, state laws do vary slightly as to who can file suit, so speaking with an attorney is wise. There are also special circumstances for minors harmed in auto accidents.

Who would a victim make a case against, if he was not driving the semi-truck?

The initial thought of most would be to sue the truck driver. However, in some situations, the case should be made against the trucking company. The decision should be based on the relationship between the driver and his hiring company. In some instances, semi-truck drivers are simply independent contractors, who are not affiliated with a specific company. If that is the case, then legal action would likely be pursued against the driver. However, if the driver is employed by a company, then a term known as “respondent superior” applies. This insinuates that the driver was acting as the company and, therefore, the suit would be made against the company as a whole.

Who will be liable for the accident?

Along with the general rules of determining negligence in an accident, there are a few other factors that can be weighed in a large truck accident. Malfunctioning equipment can place the manufacturer at fault, simple affiliation with the driver can place negligence on the shoulders of the trucking company, and state and federal laws and regulations place different guidelines on determining liability.

What if a settlement is offered before a suit is officially filed?

Occasionally, the trucking company, insurance agency, or manufacturer will offer a settlement amount. Although it can make for a very fast resolution, it is wise for all parties to fight the urge to accept such terms before consulting an attorney. A qualified and experienced attorney will help protect that individual from lesser compensation than what is actually deserved.

Once the formal lawsuit has been made, the case will move forward just as any other vehicle accident case would. Most will settle out of court, with only a small percentage going to trial. Damages will likely be assessed and the victim will be paid a lump sum to cover the costs of medical bills, lost wages, psychological detriment, or for other considerations made by the judge or jury.

Electronic Discovery - Can Contents of My Electronic Communications Be Used As Evidence in Court?

Online communications: “Meet me online so we can talk privately for all to read.”

The use of electronic internet devices such as computers, laptops, cell-phones and smart phones, has led to an explosion of readily available information. The web has become a literal smorgasbord of data – facts galore, sports stats heaven, and the latest teenage nonsense can all be accessed at the touch of a button, or the touch of a screen. The sheer amount of “stuff” can seem at times more like a virus outbreak than an explosion, or like a tidal wave that wipes out the casual web surfer.

Even more accessible than before are our communications. Social networking sites have put the very corners of our private life on blast for all to see and read. The latest posts and status updates let everyone know where we’ve been, what we ate, what we think about the latest movie, what we’re going to wear tomorrow – the list is as endless as our observations of the minutest details of our minute-to-minute existence.

And our conversations are getting memorialized in the form of comments and instant messages, sometimes allowing random intruders to interject in our sophisticated discussions of the most recent happenings. “Who is this person again?” is not an uncommon question when chatting with an online “friend”.

As these internet devices are used more and more for “private” communications, the question begs to be asked, “Can my electronic communications be used as evidence in court against me?” In general, the answer to this is “yes” – this information can be used, subject to various limitations, during what is known as the discovery process of a trial. What follows is a discussion of the basic applications of discovery to electronic information.

What is “The Discovery Process” in General?
In general, evidence gathered during the pre-trial phase of a lawsuit is known as discovery. During the discovery phase, each party is allowed to request documents and other items from the opposing side. Following the Federal Rules of Civil Procedure (FRCP), these documents and items are entered into the record to be admitted as evidence. If a party is unwilling to produce documents for discovery, the other party may force them to hand over the evidence using discovery devices such as a subpoena.

Usually the objects produced during discovery tend to be documents and records kept on file by a person or a business. Some items are not admissible as evidence. Examples of items that may not be reached during discovery are those protected by the attorney-client privilege, or items that have been illegally seized by warrant.

What is “Electronic Discovery”?
In legal parlance, electronic discovery, or “e-discovery” refers to discovery of Electronically Stored Information. Electronically Stored Information, or “ESI” is an actual legal term adopted by the Federal Rules of Civil Procedure in 2006. ESI refers to information that is created, stored, and used in digital form, and requires the use of a computer for access. Such information may take the form of documents, e-mails, web site addresses, and digitally stored photographs. ESI is subject to the basic principals that govern the discovery phase. Once admitted as evidence, ESI becomes “electronic evidence”.

However, because ESI is a relatively recent phenomenon (legally speaking), and because of its unique nature, there are various rules and statutes that are unique to e-discovery. E-discovery can often be much more demanding than traditional discovery, both time-wise and financially, because of the enormous amount of information that can be stored on a computer.

Which Laws Govern E-Discovery?

Federal Rules of Civil Procedure (FRCP)
As mentioned, the basic rules governing e-discovery are the Federal Rules of Civil Procedure (FRCP). Specifically, Rule 16 was amended in 2006 to include ESI. The greatest contribution of FRCP to the discussion of e-discovery is the term ESI.

The U.S. Constitution: 4th Amendment Search and Seizure rules apply
Under the U.S. Constitution, electronically stored information is subject to the same 4th amendment protections guiding the search and seizure process. Some of these 4th amendment inquires include whether or not the person has a privacy interest in the property, and whether the police obtained a valid search warrant in seizing the property. As we will see, in the realm of e-discovery, obtaining valid search warrant is a central theme of the discussion.

The Electronic Communications Privacy Act of 1986 (EPCA)
Born out of old-school wiretapping legislation, the EPCA is one of the main legislative Acts affecting e-discovery. This federal statute prohibits third parties from intercepting and using electronic communications without proper authorization. The term “third parties” applies to both government actors and private citizens. “Proper authorization” has been subject to scrutiny, since many websites often contain questionable disclosure agreements. The Act protects communications that are either in storage or in transit.

While the EPCA does secure a good amount of privacy for the electronics user, it has been the target of much criticism. For example, the Act initially did not protect e-mails while they were in transit. However, later cases ruled that this would defeat the entire purpose of the Act, since e-mails are transient at least once in their existence. E-mails are now protected both in storage and in transit.

Another criticism of the Act is that it is not very difficult for government actors to find ways around the “proper authorization” requirement. All that the agent would need to do is state that the information was relevant to issues of national security, i.e., counter-terrorism. Therefore a proper warrant is relatively easy to secure if the agent could justify a seizure of the ESI based on anti-terrorism theories. Also, warrantless seizures are easily justified on such a theory. Many of the concerns with anti-terrorism became more complicated with the passage of the Patriot Act of 2001, which gave government agents even more access to ESI.

Popular Categories of ESI that are Discoverable
Courts have ruled that basically all forms of ESI are discoverable. As stated, in order for ESI to be obtained in discovery, the government actor or private individual must still adhere to discovery rules and search and seizure requirements. Here are some notes to consider regarding the various forms of ESI:

E-mail
Under the EPCA, e-mails are protected from improper disclosure by third parties both in storage and in transit. The Federal Rules in 2006 specifically named e-mails as ESI and therefore they are discoverable as long as the proper procedures are followed. Two main points in the discovery of e-mails are the temporary nature of e-mails, and the level of specificity required in the warrant or discovery request.

In a 2003 case, Zubulake v. UBS Warburg 217 F.R.D. 309 (S.D.N.Y. 2003), a great deal of effort was expended during the case in trying to prove the existence of certain e-mails. In this case, the e-mails sought were never found, nor was it proven that they were destroyed, and the court ruled that they did likely exist. UBS was sanctioned heavily for not preserving information that might be subject to discovery. The case illustrates how important it is to be timely in the production of ESI, because it is subject to being erased or deleted.

In another 2003 case, Theofel v. Jones-Farley 341 F.3d 978 (2003), a lawyer requesting production of e-mails was sanctioned for not specifying the dates of the e-mails requested (he had requested that all of the company’s e-mails be produced). This case demonstrates that in discovery of ESI, a lawyer needs to be very specific as to which e-mails are requested. Courts need to be able to identify which e-mails are relevant to their opinion; if they cannot do so, the discovery request will be denied.

Text Messages, Instant Messages, and Chats
Text messages, Instant Messages (IM), and Chats are all ESI and are treated like e-mails for the purposes of discovery. Therefore they are discoverable. Many users of text and instant message believe that because their messages are executed on a mobile phone, their communications are deleted once sent. However, most service providers keep a record of texts and IM’s for anywhere from one to three months after they are sent. Also, after the Zubulake case, companies are much more wary of clearing messages from their database, especially if the message is “potentially discoverable” in a pending case.

Text messages and the like can also present problems with timeliness, as they tend to be deleted from the database even more quickly than e-mails. Also, most texts do not have a title as do e-mails, so they can be cumbersome to sift through for the relevant information. They are still, however, discoverable.

Social Networking Websites
Information posted on sites such as MySpace or Facebook is definitely considered to be ESI and subject to discovery. This means that anything posted by a profile owner that is incriminating could be used against them in court as electronic evidence.

Attorneys now regularly search such networking sites such as MySpace and Facebook to gather information that might be relevant to their cases. This might involve identifying witnesses, or collecting statements that might add testimonial weight to their case. Also, photographs posted online can be used in various ways to establish a case. Therefore profile owners should be wary of posting any information that might be used against them in court.

To date there have been no major corporate legal cases that relied heavily on the production of discovery information from social networks such as Facebook or Twitter. A recent Canadian case, Leduc v. Roman 2009 CanLII 6838 (ON S.C.), held that information posted on websites such as Facebook must be disclosed upon request even if the person has blocked public access to their profile. It probably won’t be long before we see some major American cases dealing with the production of evidence from social network sites.

Most legal cases involving social networks and privacy have been the other way around: the website intruded on people’s privacy with invasive advertisement. Perhaps the reluctance to involve such information in litigation is that these websites are very new to the scene. Also, most companies agree that e-discovery in a social network setting can be a potential nightmare. As with texts, there are usually no titles in much of the information posted, not to mention the various applications and different features of such sites. Finally, most attorneys would prefer to rely on traditional forms of evidence such as witness testimony, before relying on information from networking sites.

More recently, the Philadelphia State Bar Association has published an opinion regarding attorneys’ use of third parties to obtain information from social networks. The opinion stated that an attorney should not use a third party in order to gain access to a person’s profile, for example, by asking someone else to make a friend request in order to remain anonymous. Although information on social network sites is discoverable, attorneys and state officials must still abide by rules of ethics and professional conduct.

A Final Note: Creative Lawyering and E-Discovery
Finally, remember that it is not always the content of electronically stored information that can be incriminating. ESI can be used in many creative ways. The information might be used to prove a required element of a crime, such as the person’s mental state, or a person’s location in a particular place. For example, if a suspect’s alibi might be questioned if a computer log shows that they were actively online at a different place. Creative lawyering means that a lawyer will use any information to prove their case, and they might do so in ways not commonly imagined.

So, it is to your benefit that you be aware of the possibility of electronic information being used as evidence. Obviously, posting incriminating evidence is unwise, but bear in mind that information can be used in a variety of ways. Even seemingly harmless conversations can be used to prove guilt in a court of law. And statements that other people post on a user’s profile are also fair game. It is nearly impossible not to be involved with ESI in some way or another, but a little common sense can go a long way.

Guide to Conveyancing

Selling your house can be a stressful time, even more so if you don’t understand the conveyancing process. The first stage is when your solicitor obtains the title deeds and any land registry documents for the property, and once they have these they will provide you with two forms to complete. The first is a ‘Fixtures, Fittings and Contents Form.’ And the second is a ‘Property Information Form’ and when you send these back they need to be accompanied by any other documentation relating to the property.

Once your solicitor all the correct documentation they will then, on your behalf, prepare a draft contract, which is then sent to the buyer’s solicitors. Once they receive it they will carry out the searches and raise any queries they may have.

You may need to assist your solicitor in answering these queries, and once the other party are satisfied, you and the buyer will need to sign and exchange contracts. Upon exchange of contracts the sale becomes legally binding, a completion date will be agreed, and the buyer will pay the deposit.

After the completion date has arrived your solicitor will receive the balance form the buyer and handover the deeds to their solicitor. After paying any mortgage and subtracting their legal fees the solicitor will the forward the balance on to the seller, and the sale is complete.

If it is you that is buying a property, then first of all congratulations! The conveyancing process begins for you as soon as your solicitor receives the draft contract from the buyers solicitor, which they will review whilst carrying out an relevant searches, such as the Local Authority Search.

Should there be any queries relating to this or any of the documentation, then your solicitor will raise these with the other party and gain answers/resolution, and once all queries are satisfied they will construct a property report for you.

Afterwards a contract will be drawn up, which will be signed by both buyer and seller, and once these are exchanged the contract will be legally binding. Once this has happened the statement of completion is drawn up and a date set, and you will need to pay the balance to your solicitor, at which point the property is transferred into your name.

Upon completion, the balance of the funds is transferred to the seller’s solicitor and they pass on the deeds.

VHS to DVD - Are You Breaking the Law?

Operating a VHS to DVD service can be very rewarding. It can give one the opportunity to help friends and family improve their home movie collections by upgrading them to a more stable media. There are times, however, when a customer will ask to have a copyrighted movie transferred from VHS to DVD. There are certain steps that must be taken when one does this in order to avoid breaking the law while operating a VHS to DVD service.

If the person presents an original, purchased movie on VHS, that person has a legal right to make one copy and store the original and archive. The copy made must be for that individual’s personal use and may not be sold, traded, or even given away. Doing any of these things makes that individual guilty of copyright infringement, a crime that carries some very stiff penalties if one is caught.

The dilemma that develops for someone operating a VHS to DVD service is that multiple clients may produce their own original copies on VHS of the same movie. The question becomes, “How does one avoid being guilty of copyright infringement while making multiple copies of the same movie?”

The answer in this case becomes a bit tricky. In order to stay completely legal, one would have to make a direct copy from each original. Unfortunately, there is likely to be a difference in the quality of image available from different originals do to differences in age and storage methods. There will be a great temptation to choose the best of the originals and make all copies from it. However, in order to remain completely innocent of any wrongdoing and to avoid the appearance of wrongdoing, this temptation must not be succumbed to.

Additionally, there may be a tendency to want to edit the video and/or audio to produce a better quality before burning to DVD. This practice is perfectly acceptable with home movies that were originally recorded by the owner. However, making any changes during the copying process could, and probably would, be viewed as copyright infringement and result in fines and or jail time.

The best way to handle the situation of being presented with multiple copies of a copyrighted material for VHS to DVD conversion is to have a VCR to DVD-R setup that makes the copy directly without any intermediary devices. This is the best setup to avoid breaking the law while operating a VHS to DVD Service.

HIPAA and HITECH - What is Protected Health Information?

The HIPAA rules all speak of “protected health information,” or PHI. What does that really cover? It is important to understand what it is so that you are sure you have the correct protections in place. Let’s explore the definition of PHI a bit here. The rule defines individually identifiable health information as:

Individually identifiable health information is information that is a subset of health information, including demographic information collected from an individual, and…

1. Is created or received by a health care provider, health plan, employer, or health care clearinghouse; and
2. Relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual; and 1. That identifies the individual; or 2. With respect to which there is a reasonable basis to believe the information can be used to identify the individual.

It then goes on to define “protected health information” in this way: Protected health information, or PHI, is individually identifiable health information:

1. Transmitted by electronic media; or
2. Maintained in electronic media; or
3. Transmitted or maintained in any other form or medium.

What that tells us is that it covers health information in ANY form. While the privacy rule applies to the information in any form, the security rule focuses on information that is created and stored electronically, including spoken conversations.

What about De-Identified Information?

The rules do allow for the use of information if it is de-identified. What is important to remember here is that the rule includes several things that must be removed before something is considered de-identified. Here’s the list:

(A) Names;
(B) All geographic subdivisions smaller than a state, including street address, city, county, precinct, zip code, and their equivalent geocodes, except for the initial three digits of a zip code if, according to the current publicly available data from the Bureau of the Census: (1) The geographic unit formed by combining all zip codes with the same three initial digits contains more than 20,000 people; and (2) The initial three digits of a zip code for all such geographic units containing 20,000 or fewer people is changed to 000.
(C) All elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death; and all ages over 89 and all elements of dates (including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older;
(D) Telephone numbers;
(E) Fax numbers;
(F) Electronic ma il addresses;
(G) Social security numbers;
(H) Medical record numbers;
(I) Health plan beneficiary numbers;
(J) Account numbers;
(K) Certificate/license numbers;
(L) Vehicle identifiers and serial numbers, including license plate numbers;
(M) Device identifiers and serial numbers;
(N) Web Universal Resource Locators (URLs);
(O) Internet Protocol (IP) address numbers;
(P) Biometric identifiers, including finger and voice prints;
(Q) Full face photographic images and any comparable images; and
(R) Any other unique identifying number, characteristic, or code, except as permitted by paragraph (c) of this

Historically, we have faithfully removed all demographic information from the headers of a report, and we have used the words “the patient” when a physician dictates the name of the patient. If you really look at the above list, you will see that it’s much more detailed than that. When a pacemaker is implanted, for example, the physician gives the model number and serial number, right in the middle of the report. With (M) above, that report is not considered de-identified information.

The rule also states that the information must be such that a reasonable person with a statistical background would not be able to figure out the person’s identity. Lastly, it says that the covered entity must not have knowledge that the information could be used, alone or with other information, to identify the person.

It is critical to understand the meaning of PHI and how it applies to your setting. It is also important that all persons involved in the workforce be clear on the definitions. Be sure you have research these rules so you understand them and know how they apply to your work setting.

How Much is My Intellectual Property Worth? Setting a Value on Your IP?

While no standardized way exists to fully and accurately assess the monetary worth of your IP, you should have a sense of its real value. Several valuation models exist (some of which are more scientific than others) that are widely accepted. Here are just a few:

Fair value measurements – Here you are basically asking, “What would a third party be willing to pay?” This analysis uses objective measurements such as price per engineer who created the technology, price per patent, licensing fee per brand recognition rate and price per unit generated from IP assets. This method is relatively simple and easy to use, but it might not produce enough data points to accurately reflect how much your IP is actually worth.

Present value of expected future cash flows – This approach is based on discounted cash flows. Essentially, you examine past revenue that can be tied to your IP such as licensing fees, royalties and product sales revenue. You then use that data as a basis for forecasting future revenues. The resulting forecast is discounted by the costs associated with the IP, which can include things like maintenance fees, defense costs and any potential future investments in the existing IP. This method is more accurate than the fair value measurement, but it can produce considerable uncertainty regarding the revenue forecast.

Option pricing models – Option pricing models are so called because they were originally developed to assess the value of stock options. In this case a patent is treated as an option on future technology. The most popular model is the Black-Scholes model, which-when adapted for patents-considers things such as remaining development costs, the market value of the underlying products and variance of product value return. This method is much more scientific than either of the previous methods, which is desirable. There are a number of examples, however, in which the initial analysis has been contradicted by reality because some of the assumptions were simplified so as to make the method easier to wield.

Conjoint and relative utility analysis – This approach also brings science to bear in the assessment of your IP. Using a standard questionnaire a mathematical equation and a sound IP Management Software platform, products and technologies can be evaluated to determine a monetary value. The biggest drawback of this type of assessment is that it can be complicated and assessing an entire patent pool can take considerably longer than other methods.

We share the vision of a standardized valuation model for IP because we believe that Intellectual Property Management is an integral part of your business. Until recently, that hasn’t been widely recognized. It’s an extension of the concept of business intelligence, a concept that’s been around for a while and which is playing an ever-increasingly critical role in business strategy.

An Explanation of LLCs - The Advantages and Disadvantages

For entrepreneurs who are starting new ventures, Limited Liability Companies or LLCs are among their most popular choices of business types. If you’ve ever looked up the names of companies who offer products and services you like, you might find that some of them have company names ending in “LLC”. Basically, an LLC is a type of company. It’s one of the options available to you if you’ve ever thought about starting your own business. But before you register your business this way, you need to learn more about LLCs to see if they’re the right type of company for you.

Let us start with a simple explanation of LLC. The acronym stands for “Limited Liability Company”. This means that the owners of the LLC, also known as “members”, are not personally liable for company debts and expenses. You might wonder, “But don’t other types of companies, such as corporations, offer that kind of protection as well?” The answer to that is yes, other types of businesses can give you limited liability, but the LLC has other advantages.

First of all, it’s relatively easy to form. Most states have downloadable forms that you can just mail in. In most states, the fees you pay are minimal (unless you opt for expedited processing). As for the long run, the records and paperwork required of LLCs are also usually simpler.

Another advantage of an LLC is that you can choose how you want to be taxed. You can opt to be taxed as a partnership, S corporation, or C corporation. This flexibility is attractive to many business owners, especially to those who want to take advantage of cheaper taxes.

Speaking of taxes, unless you’ve chosen to be taxed as a C corporation or you’ve established your LLC in the District of Columbia, you don’t have to worry about double taxation. You are taxed only once for the same income. This advantage makes the LLC an attractive choice to individuals who run a consulting or freelancing business.

Despite its benefits, an LLC also has its disadvantages. One major disadvantage is that you cannot sell stock or shares of the company. This makes it difficult to expand a business, especially for companies that plan to go public someday. Also, if one of the owners wants to leave the company, the LLC has to dissolve and be reformed again with the remaining members if they want to continue running the business together.

Also, the LLC is a relatively new entity. Because of this, it doesn’t have the prestige or trustworthiness attached to a corporation or other type of business. This makes it harder to seek funding if you’re looking for outside investors. This also means that state laws about LLCs also vary since there’s no singular consensus as to how the government should treat them fiscally and administratively.

As you can see, just like any other business structure LLCs have their own advantages and disadvantages. It’s up to you, the business owner, to determine whether the benefits of setting up an LLC is worth the disadvantages you’ll be facing.

How You Can Conduct a Free Outstanding Warrant Search Today!

Residents of the United States, and some other countries, are able to enjoy a service that is usually provided to them by the state that they’re a resident of. These searches typically allow the person who is searching to find out who has a warrant out for their arrest, and for what reason. If you are able to get through the layers of administration and red tape, the actual physical search is quite easy. However, the administrative side of the search can be so overwhelming some people give up before they even start. If you know what you are doing, however, it isn’t that hard…

It is important to realize the reasons why someone might be performing a warrant search in these modern times. Typically it is someone close to the person who is being checked ensuring that they know the background behind the person they’re looking for. It could be a babysitter, future employee, tenant, or even a little league coach or a neighbor who might need a little reassuring that the person is a good person. Whatever the reason, asking for a person’s criminal history or warrant history is not something the administrative officials take lightly. They will most likely ask you for identification of yourself as well as written, granted permission from the person with the record.

Even then, many times they will not allow you to perform the search online or through the mail, for privacy reasons. You’re also not allowed to ask that person about their outstanding warrants if their employment or their ability to be accepted as a tenant is contingent on the answer.

If you’re checking your own arrest warrant status, there are a couple of issues you will run into. First, a Private Investigator is an incredibly expensive service, and typically they’ll head home, jump on their computer, and go to the exact same site that you can go to, for a lot less of a price, and sometimes even for free, as you can also view warrants from around the country.

Which brings us to the last problem associated with trying to go to the courthouse all by yourself – you’ll actually end up paying more in “administrative fees” for the supposedly “free” services. If you want a free search, you should try one of the commercially available options. They will allow you to search for free and you’ll only end up paying if you actually find the person and the record you’re looking for.

Child Molestation

Child molestation is any activity where an adult or older adolescent uses a child for sexual stimulation. There are many different situations and instances that can fall under this title. The molestation of a child is considered a very serious crime and is often punished with jail time, fines, and lengthy probation. Often those convicted of molesting a child are required to register as a sex offender, making housing and job searches challenging.

Child molestation is not the same as sexual assault. It mostly applies to children under the age of 14 but can be broadened to apply to all minors. Also, it usually does not take consent into consideration. Because children under the age of 14 are not legally able to give consent to participate in sexual activities their consent usually cannot be held up in court. This policy is also influenced by the fact that in many child molestation cases the adult was in a position of power in the child’s life, which could influence the child’s consent.

What Qualifies as Child Molestation

It has been estimated that one in ten boys and one in five girls will experience some form of sexual molestation by the time they reach the age of 14. Most victims of sexual abuse are abused by someone they know, be it a family member or family acquaintance. There are a number of situations that can be classified as the molestation of a child. These include:

Groping, touching, or lewdly interacting with a minor

Having any form of sexual contact with a child under the age of 14

Touching a child in a manner that could be classified as lascivious or lewd

Using a position of influence or power to coerce a child into performing sexual acts

Using inappropriate or sexually suggestive language towards or around a minor

Any of the above situations and activities can qualify as child molestation. They can range in severity, but all are punishable by the law.

For More Information

Sex crimes against a child are considered some of the most serious crimes that can be committed. Those who are convicted of molesting a child face years in prison, probation, and long term animosity from peers and neighbors. That is why it is so important to know your rights if you are facing this serious charge.

Your Photo Session - But Not Your Pictures

PICTURES, PICTURES, PICTURES!!! I have to address this subject because honestly most people (especially aspiring models) do not understand the copyright law pertaining to professional photographers. With that being said….here goes.

A photographer, by FEDERAL law, owns every picture that he or she takes. Period. Please understand that just because you pay for a photo shoot does NOT mean you own your images. When you pay a photographer for a photo session, you are only paying for their services. A photographer has the right to express how they want their images used and they can even exact a time frame on the usage of those images. For this very reason, you must understand a photographer’s terms BEFORE you step in front of the camera. Not all photographers operate the same so make certain you know exactly how you may use your images prior to your session.

Now, I know you might be thinking, “That’s unfair!”. Unfair or not, that’s the law. It’s no different than if you took pictures on a family vacation. By law, you own those images and by law you have the right to legally pursue anyone who uses your images without your permission. The same applies to professional photographers. If you use a photographer’s images without their permission or in any way that exceeds the boundaries of the agreement, you are breaking the law. It’s called copyright infringement.

The purpose of my blog is to help educate aspiring models. I posted a link below to better help you understand this post. Please read this article so that you know for yourself; don’t take my word for it. The biggest mistake that aspiring models make is not knowing how the industry works. Read. Ask questions. Do your own research. Know what you are getting into before you agree to any terms. I hope the link below helps!

Structuring My Business to Save Tax

Whether you are a new business or have been trading for some time, you will at some point wonder whether you should you think of incorporating your business. Is it best to trade through your own limited company rather than as a sole trader or partnership? It’s a very good question to ask for both business and potential tax reasons. In general, it makes more sense to incorporate for business reasons rather than just to save tax, as the tax regime changes and any planned savings may no longer be available.

In some sectors, such as IT contractors, it is hard to obtain contracts unless you trade through a limited company. The reasons for this are not always obvious; it is just the way things are. If you are taking risks such as in ordering large stock for an order that could be cancelled, then there can be a real benefit in the limited liability offered by trading as a company. Your own possessions are generally protected from any claim made against the company. However, in many situations, taking out a good insurance policy is all you need.

Perhaps most significantly though, a company structure makes it easier to involve outside investors in the company. Any business seeking to involve new investors will find it easier to structure the business by issuing or selling shares rather than complicated partnership agreements.

There can be tax advantages in trading through a company as there is also more flexibility in handling the owner’s remuneration in such a way as to minimise the tax liability. Limited Companies are taxed on their trading profits, in addition to other sources of income such as interest and rent, and corporation tax is assessed after any owner’s salary has been deducted. It is possible therefore to adjust the amount taken from the company in any one tax year, as well as the way in which it is taken out. Some profits can be retained in the company if the owner would otherwise be likely to pay higher rate tax personally.

For sole traders all income is taxable on their business profits, in addition to any other sources of income. There is little or no flexibility for deferring some of those profits to another year if you happen to have a particularly good year and are taxed at the higher rate. An additional advantage of a company is that shareholders can take profits as dividends which do not attract National Insurance Contributions. It may not sound exciting but significant savings can be made by an appropriate remuneration strategy.

The company will be regulated by Companies House, which has strict rules for reporting trading accounts and for the conduct of directors and other company officials. You will need to be satisfied that you can manage the additional administrative burden. You can always start as a sole trader and later incorporate. In fact, this is a common route when a new business is unsure of how large it will grow and whether the savings will outweigh the costs. It may be that there is also a potential tax saving on incorporating the company but this will depend on whether there is any realistic goodwill in the business.

To consider this and other issues properly, you will need to consult a professional advisor. Incorporating tends to be a decision business owners make a few times at most over a lifetime, and it makes sense to consult an experienced expert before acting.