Are websites legally responsible for content posted by their users?
Do I need permission to use images from Google on my website?
Patent Infringement Defense Leveraging Contested Proceedings
Implementing a Counterfeit Enforcement Program
Design Patents: New Implications from the Hague Agreement
Patent Litigation and the Proposed Innovation Act of 2013
Developing a Business Strategy that Deters Counterfeiters
Protecting Trade Secrets When Employees Depart
Polsinelli Podcast - Conducting Business in China
Are there going to be new generic top level domains available in the future?
Beastie Boys Sue; Law Prof's 'Head Spins'
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
The Building Blocks of a Technology Deal
Emerging Strategies for Protecting Global IP Rights
Starting a new business? Intellectual Property 101 Presented by Prof. Islam & PA Thomas Lewry
Warranty vs. Indemnity
What should my company be aware of when launching a new website?
Demonstratives in Post-Grant Proceedings
Video: Claim Contruction in Post-Grant Proceedings
A federal magistrate judge has released on bond the accused trade-secrets larcenist and former W. L. Gore & Associates, Inc. employee Kwang Seoung Jeon, who was arrested as he allegedly tried to flee the United States for his...more
On March 14, 2014, a Texas jury acquitted former Texas Instruments (“TI”) employee Ellen Chen Yeh on all counts brought against her arising from her admitted downloading of Texas Instruments proprietary information before...more
Technology firms SanDisk and Toshiba recently filed trade secrets lawsuits on opposite sides of the Pacific, each alleging misappropriation by a third party stemming from the two companies’ joint venture....more
On January 21, 2014, Mozaffar Khazaee, a naturalized American who maintained dual citizenship with his native Iran, was indicted in Connecticut on two counts of interstate transportation of stolen property, which carries with...more
Former Korn/Ferry recruiter David Nosal was sentenced to one year and one day in prison on Wednesday for violating the federal Computer Fraud and Abuse Act and the Economic Espionage Act.
In April, a federal jury in...more
On October 16, 2013, a federal judge in New Jersey ruled that Goldman Sachs must advance the legal fees of a former employee charged with stealing Goldman’s source code. The order is the latest twist in a case that...more
On February 28, 2008, Hanjuan Jin, a Chinese-born former software engineer for Motorola, arrived at Chicago O’Hare Airport en route to Beijing. During a random customs check, officials discovered that she had a one-way...more
The recent arrest and likely prosecution of three executives at Taiwanese smartphone giant HTC Corporation may foreshadow an era of tougher prosecutions under Taiwan’s newly amended Trade Secrets Act. Although the arrests...more
Whenever an appeals court kicks off a 65-page opinion by describing you (or your client) as a thief, and posits that the question before it is whether you’ve been properly convicted of thievery, you know you’re in trouble. ...more
As Europe’s largest economy, one might expect Germany to provide robust protection of intellectual property assets such as trade secrets....more
In all jurisdictions the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, the federal computer crime statute, applies to former employees who steal data from the company computer, but in two federal circuits it does not...more
In the area of trade secrets and non-compete law, there continue to be notable developments at the state and federal levels. Here are five recent ones.
Summer has arrived. The Hollywood blockbusters are here. New animated features hit the big screens this week. Superman is flying once more. Sure, if the movies are your cup of tea, then summer is your annual thirst...more
We previously reported on the downpour of recent trade secret activity in Congress. Last week, Congresswoman Zoe Lofgren (D-Cal.) added to the deluge by introducing two bills bearing on trade secret misappropriation...more
You’ve just discovered that an employee who recently left your company took your company’s valuable trade secrets with him to his new employer. What are your options?...more
On April 24, 2013, a federal jury in the Northern District of California found former Korn/Ferry International corporate executive recruiter, David Nosal, guilty on six counts of conspiracy, stealing trade secrets, and...more
Legal News: Eye on China Quarterly Newsletter offers companies helpful insight as they successfully navigate China’s complex and ever-changing legal and regulatory environment. In this issue, we focus on the following...more
Two new criminal laws underscore the value of trade secrets as a critical asset to a corporation. These new laws, the Trade Secrets Clarification Act (TSCA) and the Foreign and Economic Espionage Penalty Enhancement Act...more
Adam Young worked for an architecture firm, Nortex Foundation Designs Inc. in Fort Worth Texas as a drafter. He was hired in 2001 and designed foundation plans based on copyrighted architectural designs that Nortex provided...more
Most people know that an employee who misuses his employer’s confidential information may be subject to damages in a civil lawsuit. Many states have enacted a Uniform Trade Secrets Act that allows an employer to pursue a...more
“Distribution in China – Legal Issues” is a four-part series. Part I discussed the business models and legal structures most commonly used for distribution in China. Part II looked at important issues to consider in the...more
On March 12, 2013, the U.S. District Court for the Northern District of California issued a ruling clarifying the reach of the federal Computer Fraud and Abuse Act (CFAA) when employees access computer systems. The decision...more
On December 28, 2012, the President signed the Theft of Trade Secrets Clarification Act of 2012, which significantly expands trade secret protection by extending criminal penalties to the theft of a wider class of trade...more
In the summer of 2009, in an office at Goldman Sachs, in the waning hours of his last day of employment, a computer programmer named Sergey Aleynikov encrypted more than 500,000 lines of source code from Goldman’s proprietary...more
Sometimes we can learn valuable employment law lessons from even the non-employment law court decisions.
What happens if the boardroom meeting to discuss your company’s trade secrets ends up as pillow talk between an...more
Find an Intellectual Property Author »
Back to Top