Are websites legally responsible for content posted by their users?
Do I need permission to use images from Google on my website?
Patent Infringement Defense Leveraging Contested Proceedings
Implementing a Counterfeit Enforcement Program
Design Patents: New Implications from the Hague Agreement
Patent Litigation and the Proposed Innovation Act of 2013
Developing a Business Strategy that Deters Counterfeiters
Protecting Trade Secrets When Employees Depart
Polsinelli Podcast - Conducting Business in China
Are there going to be new generic top level domains available in the future?
Beastie Boys Sue; Law Prof's 'Head Spins'
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
The Building Blocks of a Technology Deal
Emerging Strategies for Protecting Global IP Rights
Starting a new business? Intellectual Property 101 Presented by Prof. Islam & PA Thomas Lewry
Warranty vs. Indemnity
What should my company be aware of when launching a new website?
Demonstratives in Post-Grant Proceedings
Video: Claim Contruction in Post-Grant Proceedings
On December 28, 2012, President Obama signed into law the Theft of Trade Secrets Clarification Act. The Act amends the Economic Espionage Act of 1996 (EEA) and expands the jurisdiction of federal courts over cases concerning...more
On November 12, the State Intellectual Property Office (SIPO) released the Draft Measures on Service Invention«????????(?????)»(the “Draft Measures”) for public comments. Generally speaking, the Draft Measures enhance the...more
In This Issue:
- 1 Common sense trade secret protection
- 4 Canada’s Anti-Spam Legislation to impact electronic marketing and communications
- 5 Concerns over copyright infringement drive Google to change...more
Executive Summary: A District Court in Pennsylvania entered judgment in favor of the employer on a former employee's Computer Fraud and Abuse Act ("CFAA") claim in a dispute over the ownership of the employee's LinkedIn...more
In PhoneDog v. Kravitz, an employer and former employee battled over who owns a company-sponsored Twitter account. Now, LinkedIn joins Twitter, as it tries to claim title to the LinkedIn account of a former employee....more
Earlier this month, a federal judge ruled that when a company took over a departing employee’s LinkedIn account, the company did not violate the Computer Fraud and Abuse Act in the case of Eagle v. Edcomm....more
Last month, an Indiana appellate court became the latest court to adopt the majority position on the question of whether the Uniform Trade Secrets Act (UTSA) displaces state-law tort claims said to protect information that is...more
Employers in North Carolina, Virginia, Maryland, West Virginia and South Carolina have lost a potentially powerful method of protecting their electronic secrets from disgruntled employees who download sensitive material and...more
Exotic dancer slips and falls, negligent handling of human remains and the usual neat contracts cases -- all this and more in the BLG Monthly Update for August!...more
I have had more than one corporate general counsel tell me that anti-corruption compliance is not very effective in protecting against foreign bribery. Their argument is that a company’s compliance program boils down to the...more
Originally published in The Enterprise - Utah’s Business Journal - July 16-22, 2012 - Volume 41, Number 48.
One of the consequences of being in a state that has an extremely well educated population combined with a...more
If three Democratic senators have their way, some companies may soon be able to protect their valuable trade secret information under federal law. On July 17, 2012, senators from Wisconsin, Delaware, and Rhode Island...more
The federal Computer Fraud and Abuse Act, 18 U.S.C. § 1030 (CFAA), is — for most of corporate America — one of the most powerful weapons available to protect trade secrets. Like many state computer crimes laws, CFAA was...more
This past Thursday, July 26th, the US Court of Appeals for the Fourth Circuit issued an opinion addressing liability under the federal Computer Fraud and Abuse Act (CFAA) for departing employees who access and copy computer...more
Everybody in the modern workforce is involved in social media in one way or another. Think about it. Even if your company does not utilize social media (which is becoming less and less likely), it is almost certain that your...more
As I settle in at a table in my favorite cafe near my home, large coffee in hand, I check my work emails from my personal smart phone as I pull out my personal laptop and dial into my company servers providing access to all...more
On April 10, 2012, the United States Court of Appeals for the Ninth Circuit issued its decision en banc in United States of America v. David Nosal, rejecting the notion that employees who breach their employers’ computer use...more
On April 10, 2012, the Ninth Circuit filed its opinion in United States v. Nosal, holding that a former employee cannot be held criminally liable under federal law for receiving confidential company data and information from...more
Employers and website hosts cannot, by contractually limiting how individuals may use information stored on their networks, define acceptable limits of access ‘‘authorization’’ under the Computer Fraud and Abuse Act, the U.S....more
Executive Summary: In its much anticipated en banc decision, the Ninth Circuit refused to extend the Computer Fraud and Abuse Act ("CFAA") to employee data theft in United States v. Nosal. The Court declined to "transform the...more
List of legal and practical steps most entrepreneurs face in starting a business in Kentucky...more
With the blog approaching its fifth (!) anniversary later this year, I thought it was time to revisit some subjects that I covered in the blog’s infancy and update them.
One such story from way back on...more
It's time for another roundup here on a rainy Friday morning in New Jersey!
Once again we're seeing some excellent content coming out of our member firms from around the world - I highly recommend checking out these...more
The past year has produced noteworthy decisions from the Sixth, Ninth and Eleventh Circuit Courts of Appeals – and recent Congressional hearings – regarding the applicability of the Computer Fraud & Abuse Act (“CFAA”) to...more
On January 9, New Jersey Governor Chris Christie signed the New Jersey Trade Secrets Act (NJTSA). The NJTSA brings New Jersey in line with 46 other states and the District of Columbia, all of which have enacted a version of...more
Find an Intellectual Property Author »
Back to Top