Patent Litigation and the Proposed Innovation Act of 2013
Developing a Business Strategy that Deters Counterfeiters
Protecting Trade Secrets When Employees Depart
Polsinelli Podcast - Conducting Business in China
Are there going to be new generic top level domains available in the future?
Beastie Boys Sue; Law Prof's 'Head Spins'
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
The Building Blocks of a Technology Deal
Emerging Strategies for Protecting Global IP Rights
Starting a new business? Intellectual Property 101 Presented by Prof. Islam & PA Thomas Lewry
Warranty vs. Indemnity
What should my company be aware of when launching a new website?
Demonstratives in Post-Grant Proceedings
Video: Claim Contruction in Post-Grant Proceedings
Why Choose the Dual Track Process?
Claim Amendments in Post-Grant Proceedings
Due Diligence in Mergers, Acquisitions, and Corporate Transactions
International Patent Laws – Interview with Julian Crump, Managing Member, Mintz Levin's London, UK Office
Court Stay Factors in Concurrent Post-Grant Proceedings
An outline of privacy law that cites to potential causes of action, whether common law or statutory, with a focus on New York law....more
Key Takeaway: Companies that follow these 3 steps can use the Computer Fraud and Abuse Act as a tool to combat the misuse of their computers (and information) by (1) actively monitoring for misuses, (2) taking reasonable...more
What happens when the employee who set up the company’s LinkedIn account leaves? ...more
With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more
A personal injury law firm can buy search terms using the names of a competing law firm’s partners without violating Wisconsin’s privacy laws because the use of the names is “non-visible,” an appellate court found.
Your company has been sued – what do you need to consider to comply with data preservation requirements? How do you address litigation holds, ediscovery and data retention? Robert Brownstone, litigation attorney and chair of...more
The proper jurisdiction for suing someone for engaging in computer fraud from a foreign country, directed at a company in the United States, is the place where the wrongfully accessed computer server is located if the...more
If your company uses a browsewrap license agreement on your website, it may not be legally binding on site visitors. That’s the message from a recent case, In re Zappos.com Inc., Customer Data Security Breach Litigation,...more
You’ve read the tile of this article. There it is, up above. Let me repeat:
Preventing Unfair Competition in the Absence Of A Noncompete Agreement
What I really want you to focus on is the last part. The part that reads:...more
Three recent Computer Fraud and Abuse Act (“CFAA”) cases decided over the last couple of months are worth looking at because they show the following points, respectively: (1) the CFAA in its current form does not give...more
Sets forth practical strategies for in-house counsel so that they may preserve the attorney-client privilege....more
The Computer Fraud and Abuse Act (“CFAA”) is the omnibus federal computer crime statute outlawing theft and destruction of data, hacking, use of viruses, theft of passwords and extortionate threats to damage computers. 18...more
Official newsletter of The Internet Law Group providing cutting-edge insights and updates regarding notable developments in the world of e-commerce and internet law. ...more
Global business imposes on potential investors significant restraints in ensuring and understanding the laws of the countries in which business investment is sought. Not least of their problems is the manner in which...more
IN THIS ISSUE:
*Chamber of Commerce Sues Parody Site
*Agency Sues Over Brand Integration Idea
*Internet Airing Helps Settle Monster Lawsuit
*Iconix Settles COPPA Complaint for $250,000
*Ad Shop Goes After Fake...more
Few attorneys have more experience than Sebastian Gibson in the field of modeling law. If you have a modeling contract that’s been offered to you or if you are already signed with a modeling agency and have a modeling agency...more
On June 10, 2009, the Second Circuit vacated a summary judgment decision that permanently enjoined menswear designer Joseph Abboud from making commercial use of his own name. J.A. Apparel Corp. v. Abboud, No. 08-3181-cv, 2009...more
The pursuit of trademark infringers on the Internet, specifically the use of a party’s trademark by an unauthorized second party, poses problems that are unique in trademark infringement law. How do you uncover who is the...more
Find an Intellectual Property Author »
Back to Top