Patent Litigation and the Proposed Innovation Act of 2013
Developing a Business Strategy that Deters Counterfeiters
Protecting Trade Secrets When Employees Depart
Polsinelli Podcast - Conducting Business in China
Are there going to be new generic top level domains available in the future?
Beastie Boys Sue; Law Prof's 'Head Spins'
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
The Building Blocks of a Technology Deal
Emerging Strategies for Protecting Global IP Rights
Starting a new business? Intellectual Property 101 Presented by Prof. Islam & PA Thomas Lewry
Warranty vs. Indemnity
What should my company be aware of when launching a new website?
Demonstratives in Post-Grant Proceedings
Video: Claim Contruction in Post-Grant Proceedings
Why Choose the Dual Track Process?
Claim Amendments in Post-Grant Proceedings
Due Diligence in Mergers, Acquisitions, and Corporate Transactions
International Patent Laws – Interview with Julian Crump, Managing Member, Mintz Levin's London, UK Office
Court Stay Factors in Concurrent Post-Grant Proceedings
A California federal court in Enki Corporation v. Freedman held that a former employee’s access of the employer’s computer systems through his log-in credentials did not amount to unlawful hacking under either the Computer...more
A recent Massachusetts Superior Court decision held that employers risk losing trade secrets and confidential information if they do not protect that information from independent contractors. The court held that employers who...more
Employers know all too well that their own employees are often the most likely people to misappropriate their confidential and proprietary information and their valuable trade secrets. Employers have plenty of weapons at...more
Angelica Textile Services, Inc. v. Park, No. D062405 (October 15, 2013): A California Court of Appeal recently held that claims of breach of contract, breach of fiduciary duty, and unfair competition are not “displaced” or...more
Courts continue to define the scope of the emerging trade secret displacement doctrine, (commonly referred to as preemption) which stems from California's Uniform Trade Secrets Act ("UTSA"). The UTSA contains a relatively...more
I’ve written many times about Section 16600 of California’s Business & Professions Code which, with limited exceptions, voids covenants not to compete. See TRO Issued Enjoining Breach Of Non-Compete Agreement Clauses, No...more
In a case whose facts plainly compelled the outcome, California’s Fourth Appellate District held on October 15, 2013 in Angelica Textile Services, Inc. v. Jaye Park, No. D062405 that a claim for trade secret misappropriation...more
Key Takeaway: Companies that follow these 3 steps can use the Computer Fraud and Abuse Act as a tool to combat the misuse of their computers (and information) by (1) actively monitoring for misuses, (2) taking reasonable...more
SUMMARY: The two year statute of limitations for Computer Fraud and Abuse Act claim began to run when the plaintiff had an awareness of an unauthorized access into its computer system even if the plaintiff did not know the...more
What happens when the employee who set up the company’s LinkedIn account leaves? ...more
“I need a timeline.” This is how litigators often start in asking for legal graphics. This start to the graphics conversation makes sense because timelines are perhaps the most common type of legal graphic, and the most...more
Mere Employment Not Enough Consideration for Non-Compete Provision
Being employed for less than two years is not sufficient consideration for enforcing a non-compete agreement in Illinois, a state appellate court...more
Texas recently became the 47th state to adopt a version of the Uniform Trade Secrets Act (UTSA). The Texas UTSA, taking effect on September 1, 2013, aims to benefit the business community by bringing Texas trade secret law...more
With the continually increasing popularity of social media websites like Facebook, Twitter, and LinkedIn, where members can be connected to friends, family members, co-workers, clients, and potential clients all by logging in...more
We previously reported on the downpour of recent trade secret activity in Congress. Last week, Congresswoman Zoe Lofgren (D-Cal.) added to the deluge by introducing two bills bearing on trade secret misappropriation...more
Trade secret claims have historically derived from state common law causes of action and, subsequently, most states’ adoption of the Uniform Trade Secrets Act, which codifies that common law and generally proscribes the...more
Two new criminal laws underscore the value of trade secrets as a critical asset to a corporation. These new laws, the Trade Secrets Clarification Act (TSCA) and the Foreign and Economic Espionage Penalty Enhancement Act...more
When your trade secrets are stolen, you might sue the ex-employee who stole them, or the competing business that’s now in possession of them, or both. What’s an appropriate measure of damages when your trade secrets are...more
The proper jurisdiction for suing someone for engaging in computer fraud from a foreign country, directed at a company in the United States, is the place where the wrongfully accessed computer server is located if the...more
Originally published in MidlandsBiz.com on December 18, 2012.
In its most significant employment law decision of 2012, Milliken & Co. v. Morin, the South Carolina Supreme Court addressed the enforceability of provisions...more
You’ve read the tile of this article. There it is, up above. Let me repeat:
Preventing Unfair Competition in the Absence Of A Noncompete Agreement
What I really want you to focus on is the last part. The part that reads:...more
A new informational app for the iPad and iPhone to help employers and employees better understand what is a trade secret or a covenant not to compete has been released by Balough Law Offices, LLC.
The Trade Secrets app...more
This case underscores the significance for employers to create and maintain social media policies that address the control and ownership of company-sponsored social media accounts.
One of the primary reasons for using a restrictive covenant agreement is to protect a company’s confidential information and trade secrets. By implementing certain behaviors, a company can significantly enhance its chances of...more
Under California’s trade secret laws, a trade secret is information that (a) is not generally known in the industry, to the public, or to others who can realize economic value from its disclosure or use; (b) has independent...more
Find an Intellectual Property Author »
Back to Top