Developing a Business Strategy that Deters Counterfeiters
Protecting Trade Secrets When Employees Depart
Polsinelli Podcast - Conducting Business in China
Are there going to be new generic top level domains available in the future?
Beastie Boys Sue; Law Prof's 'Head Spins'
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
The Building Blocks of a Technology Deal
Emerging Strategies for Protecting Global IP Rights
Starting a new business? Intellectual Property 101 Presented by Prof. Islam & PA Thomas Lewry
Warranty vs. Indemnity
What should my company be aware of when launching a new website?
Demonstratives in Post-Grant Proceedings
Video: Claim Contruction in Post-Grant Proceedings
Why Choose the Dual Track Process?
Claim Amendments in Post-Grant Proceedings
Due Diligence in Mergers, Acquisitions, and Corporate Transactions
International Patent Laws – Interview with Julian Crump, Managing Member, Mintz Levin's London, UK Office
Court Stay Factors in Concurrent Post-Grant Proceedings
Navigating the Dual Track M&A/IPO– Part One
Lisa Hodgson, an Associate in our Birmingham office, comments: Social media is becoming an increasingly common business tool as it is easy to use, free and effective. Many of our clients, particularly in professional...more
Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulnerability of our intellectual property to...more
Following our post on U.S. lawsuits concerning the ownership of LinkedIn and Twitter accounts, we report on a recent United Kingdom High Court ruling that considered who was entitled to operate four LinkedIn Groups, and other...more
While New York law in theory recognizes the "inevitable disclosure" doctrine, a federal district court there, in Janus et Cie v. Andrew Kahnke, recently reinforced the state's hostility to the doctrine by dismissing an...more
The Virginia Trade Secrets Act protects the critical business secrets of a person or individual provided three pre-conditions are met:
1) the information to be protected must fit the definition of a trade secret;...more
Concerned about departing employees who might have confidential information about your business and clients? Or maybe you are the ex-employee and you are unsure of where the line is drawn when departing one job to start...more
In all jurisdictions the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, the federal computer crime statute, applies to former employees who steal data from the company computer, but in two federal circuits it does not...more
Texas recently became the 47th state to adopt a version of the Uniform Trade Secrets Act (UTSA). The Texas UTSA, taking effect on September 1, 2013, aims to benefit the business community by bringing Texas trade secret law...more
Italy is slowly changing its trade secret laws to conform to international standards....more
For many, Fourth of July festivities wouldn’t be complete without a baseball game, a family barbecue, and of course, fireworks....more
Pizza the Action is a major distributor of pizza dough and toppings and provides these products to many large national pizza chains. ...more
It is 4:00 p.m. on a Friday afternoon. You just learned that your top-performing salesman resigned his position to accept employment with a direct competitor. You quickly locate the salesman’s personnel file to determine...more
You’ve just discovered that an employee who recently left your company took your company’s valuable trade secrets with him to his new employer. What are your options?...more
New statute aims to promote favorable business climate and may provide broader protection of information under Texas law.
On May 2, Texas Governor Rick Perry signed the Texas Uniform Trade Secrets Act (Texas UTSA) into...more
Those loyal readers of this blog know that the focus tends to be on what your company can and cannot do regarding social media use by potential employees (i.e., applicants) or current employees. But there is a third category...more
On May 2, 2013, Governor Perry signed the Texas Uniform Trade Secrets Act into law. So, let’s cut right to it. ...more
If you have followed this blog, then you likely already know that restrictive covenants are legal and enforceable in Florida. You should also know that – although enforceable – restrictive covenants are strictly construed...more
Employers in New Hampshire now must comply with further restrictions on their ability to enforce non-compete and anti-piracy agreements. Venturing further into the already murky area of the enforceability of such agreements,...more
Most people know that an employee who misuses his employer’s confidential information may be subject to damages in a civil lawsuit. Many states have enacted a Uniform Trade Secrets Act that allows an employer to pursue a...more
On March 18, 2013, TBA Global, LLC, a live events market and communications agency, sued LEO Events, LLC and several of its owners for breach of non-solicitation agreements and misappropriation of TBA’s trade secrets and...more
When your trade secrets are stolen, you might sue the ex-employee who stole them, or the competing business that’s now in possession of them, or both. What’s an appropriate measure of damages when your trade secrets are...more
Last month the Vermont Legislature kicked off its 2013-2014 Legislative Session, and already a couple of bills have our attention here at the IP Stone....more
Seven years after entering into a separation agreement with one of its executives, Hallmark Cards, Inc. brought suit against the former employee, seeking a “full refund” of the $735,000 severance it paid her....more
In my prior blogs I’ve addressed the legal remedies available to employers when employees violate confidentiality agreements or restrictive covenants, and unfairly compete. A new opinion by Judge Frederic Kessler, P.J. Ch....more
Generally speaking, noncompete agreements are often rigidly construed by courts and reviewed in terms of whether they are reasonably limited with respect to time and place. On the other hand, confidentiality agreements and...more
Find an Intellectual Property Author »
Back to Top