Are websites legally responsible for content posted by their users?
Do I need permission to use images from Google on my website?
Patent Infringement Defense Leveraging Contested Proceedings
Implementing a Counterfeit Enforcement Program
Design Patents: New Implications from the Hague Agreement
Patent Litigation and the Proposed Innovation Act of 2013
Developing a Business Strategy that Deters Counterfeiters
Protecting Trade Secrets When Employees Depart
Polsinelli Podcast - Conducting Business in China
Are there going to be new generic top level domains available in the future?
Beastie Boys Sue; Law Prof's 'Head Spins'
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
The Building Blocks of a Technology Deal
Emerging Strategies for Protecting Global IP Rights
Starting a new business? Intellectual Property 101 Presented by Prof. Islam & PA Thomas Lewry
Warranty vs. Indemnity
What should my company be aware of when launching a new website?
Demonstratives in Post-Grant Proceedings
Video: Claim Contruction in Post-Grant Proceedings
At an economic development summit earlier today in Newton, Massachusetts, Governor Patrick stated that he will propose an economic growth bill that includes a prohibition on non-competition agreements that discourage workers...more
A Pennsylvania federal magistrate judge has tossed an employer’s claims under the Computer Fraud and Abuse Act (CFAA), holding that the CFAA does not extend to punish employees for the misuse of information that was accessed...more
In this issue:
- Cybersecurity: Coming Soon to a Government Contract Near You
- Recent National Defense Authorization Act Presents Opportunities for Small Business Contractors
- Iran Sanctions Deal Does...more
A California federal court in Enki Corporation v. Freedman held that a former employee’s access of the employer’s computer systems through his log-in credentials did not amount to unlawful hacking under either the Computer...more
Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulnerability of our intellectual property to...more
Former Korn/Ferry recruiter David Nosal was sentenced to one year and one day in prison on Wednesday for violating the federal Computer Fraud and Abuse Act and the Economic Espionage Act.
In April, a federal jury in...more
In the New Year, one of the trade secret trends we’re watching is the ongoing tension between a company’s interest in preserving its proprietary information and the public’s demand to know more about the goods or services it...more
On October 16, 2013, a federal judge in New Jersey ruled that Goldman Sachs must advance the legal fees of a former employee charged with stealing Goldman’s source code. The order is the latest twist in a case that...more
For the two million Californians who have left the state in the past decade, Texas has been the most popular destination. Further, 254 California companies moved some or all of their work and jobs out of state— frequently to...more
On February 28, 2008, Hanjuan Jin, a Chinese-born former software engineer for Motorola, arrived at Chicago O’Hare Airport en route to Beijing. During a random customs check, officials discovered that she had a one-way...more
Scott & Scott, LLP attorney, Brian Von Hatten, lists some of the risks companies face when their workforce wants to bring their own devices to work....more
There is increasing interest from Chinese businesses in establishing an R&D center in the Silicon Valley and other technology centers in the United States. For example, the world’s largest mobile phone operator, China Mobile,...more
According to a recent press release by Gartner, Inc., a global technology research and advisory company, half of all employers are expected to require their employees to supply their own devices for work by 2017. A...more
A New Jersey appellate court’s decision last week in UCB Mfg., Inc. v. Tris Pharma, Inc., serves as a cautionary tale for employers when drafting confidentiality agreements to protect their trade secrets and confidential...more
Key Takeaway: Companies that follow these 3 steps can use the Computer Fraud and Abuse Act as a tool to combat the misuse of their computers (and information) by (1) actively monitoring for misuses, (2) taking reasonable...more
IN THIS ISSUE:
- A new wave of regulatory enforcement actions in China – Are we witnessing a prolonged enforcement cycle?
- Update on recent decisions
- Australia’s innovation patent – The...more
Attorney David Barmak, Chair of Mintz Levin's Employment, Labor & Benefits Practice, discusses two serious issues facing employers: class action lawsuits and the loss of trade secrets....more
SUMMARY: The two year statute of limitations for Computer Fraud and Abuse Act claim began to run when the plaintiff had an awareness of an unauthorized access into its computer system even if the plaintiff did not know the...more
When I do presentations on the Computer Fraud and Abuse Act, one of the issues I speak about is how we see CFAA issues arise in many unexpected cases such as those in the family law context. We now have another great example...more
Whenever an appeals court kicks off a 65-page opinion by describing you (or your client) as a thief, and posits that the question before it is whether you’ve been properly convicted of thievery, you know you’re in trouble. ...more
The Ethics Resource Center’s National Business Ethics Survey "Social Networkers: New Risks and Opportunities at Work” is now available. Sponsored by NAVEX Global and PwC, the survey provides a first-of-its-kind look at social...more
We are pleased to present the 30th edition of the Bernstein Shur Business and Commercial Litigation Newsletter. This month we highlight cases discussing federal pleading standards, the intersection of patent law and antitrust...more
Today’s hackers and ex-employees steal secrets with USB drives, personal email accounts, and computer networks, making computer forensics critical in detecting trade secret theft....more
In all jurisdictions the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, the federal computer crime statute, applies to former employees who steal data from the company computer, but in two federal circuits it does not...more
We previously reported on the downpour of recent trade secret activity in Congress. Last week, Congresswoman Zoe Lofgren (D-Cal.) added to the deluge by introducing two bills bearing on trade secret misappropriation...more
Find an Intellectual Property Author »
Back to Top