Are websites legally responsible for content posted by their users?
Do I need permission to use images from Google on my website?
Patent Infringement Defense Leveraging Contested Proceedings
Implementing a Counterfeit Enforcement Program
Design Patents: New Implications from the Hague Agreement
Patent Litigation and the Proposed Innovation Act of 2013
Developing a Business Strategy that Deters Counterfeiters
Protecting Trade Secrets When Employees Depart
Polsinelli Podcast - Conducting Business in China
Are there going to be new generic top level domains available in the future?
Beastie Boys Sue; Law Prof's 'Head Spins'
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
The Building Blocks of a Technology Deal
Emerging Strategies for Protecting Global IP Rights
Starting a new business? Intellectual Property 101 Presented by Prof. Islam & PA Thomas Lewry
Warranty vs. Indemnity
What should my company be aware of when launching a new website?
Demonstratives in Post-Grant Proceedings
Video: Claim Contruction in Post-Grant Proceedings
Angelica Textile Services, Inc. v. Park, No. D062405 (October 15, 2013): A California Court of Appeal recently held that claims of breach of contract, breach of fiduciary duty, and unfair competition are not “displaced” or...more
Courts continue to define the scope of the emerging trade secret displacement doctrine, (commonly referred to as preemption) which stems from California's Uniform Trade Secrets Act ("UTSA"). The UTSA contains a relatively...more
Trade secret claims have historically derived from state common law causes of action and, subsequently, most states’ adoption of the Uniform Trade Secrets Act, which codifies that common law and generally proscribes the...more
Did the Ninth Circuit “blow it” when it snubbed other courts and held that “exceeding authorized access” under the Computer Fraud and Abuse Act (CFAA) means nothing less than “hacking?”...more
Last month, an Indiana appellate court became the latest court to adopt the majority position on the question of whether the Uniform Trade Secrets Act (UTSA) displaces state-law tort claims said to protect information that is...more
The federal Computer Fraud and Abuse Act, 18 U.S.C. § 1030, (CFAA) is — for most of corporate America — one of the most powerful weapons available to protect trade secrets. Like many state computer crimes laws, CFAA was...more
A summary of recent developments in the law you may find interesting or relevant -- or both....more
Find an Intellectual Property Author »
Back to Top