Are websites legally responsible for content posted by their users?
Do I need permission to use images from Google on my website?
Patent Infringement Defense Leveraging Contested Proceedings
Implementing a Counterfeit Enforcement Program
Design Patents: New Implications from the Hague Agreement
Patent Litigation and the Proposed Innovation Act of 2013
Developing a Business Strategy that Deters Counterfeiters
Protecting Trade Secrets When Employees Depart
Polsinelli Podcast - Conducting Business in China
Are there going to be new generic top level domains available in the future?
Beastie Boys Sue; Law Prof's 'Head Spins'
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
The Building Blocks of a Technology Deal
Emerging Strategies for Protecting Global IP Rights
Starting a new business? Intellectual Property 101 Presented by Prof. Islam & PA Thomas Lewry
Warranty vs. Indemnity
What should my company be aware of when launching a new website?
Demonstratives in Post-Grant Proceedings
Video: Claim Contruction in Post-Grant Proceedings
Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulnerability of our intellectual property to...more
Last month the Vermont Legislature kicked off its 2013-2014 Legislative Session, and already a couple of bills have our attention here at the IP Stone....more
Table of Contents:
- Pearson Education Inc. v. Almgren -
Eighth Circuit affirms bankruptcy court’s order striking textbook publishers’ demand for jury trial on copyright infringement damages, granting minimum...more
In This Issue:
Court of Appeal of England and Wales Considers “Best” and “All Reasonable” Endeavours
The Court of Appeal of England and Wales in Jet2.com Limited v Blackpool Airport Limited ...more
In This Issue:
FTC, Facebook Reach Settlement Over Privacy Violations; Suit Alleges DISH Violated TCPA – Again; New Trademark Suits Implicate Muhammad Ali, President Obama; OBA Accountability Program Releases First Six...more
IN THIS ISSUE:
- Let's Get Ready to Rumble – Muhammad Ali Steps Back in the (Legal) Ring
- Trying to Force a Turnover: ESPN Sues Ohio State to Compel Release of Emails Involving Jim Tressel
- Gossip about...more
In This Issue:
PATENTS; TRADE MARKS; COPYRIGHT; COMMUNITY DESIGN; CONFIDENTIALITY; DATA PROTECTION; INTELLECTUAL PROPERTY; E-COMMERCE; and EU.
Musion Systems Ltd v Activ8-3D Ltd: Disposal, Making and Offer...more
In this issue:
Manatt’s Advertising, Marketing & Media Practice Receives National Ratings for Excellence in Chambers USA 2011; State Legislators Reject Law Regulating Social Networks; Pharmaceutical Companies Face Impact...more
In this issue: False Marking Claims Must Be Pled with Particularity; PTO Confirmation of Validity in a Related Reexamination Proceeding, Even If Later Revoked, Can Provide Evidence of a Reasonable Basis for Patentee’s...more
In this issue: The Buzz Over Privacy Continues with Google FTC Settlement; Power Balance Reaches $57 Million Settlement Over False Marketing; FTC Commissioner: Do-Not-Track Not Endorsed by Agency; LinkedIn Sued Over Cookies;...more
In Liberty Media Holdings, LLC. v. Does 1-59, 2011 WL 292128 *3 (S.D.Cal. Jan. 25, 2011) unknown individuals hacked into Liberty Media Holdings’ web servers and obtained “certain motion pictures” that it...more
On January 26, 2011, the federal district court in the Northern District of California granted Facebook a default judgment against Philip Porembski and PP Web Services LLC for obtaining “login credentials for at least...more
In This Issue:
Copyright Designs and Patents Act 1988 (Amendment): PPL Licence Exemptions Abolished
The Newspaper Licensing Agency Ltd v Meltwater Holding BV: Online Commercial Media Monitoring Services...more
In American Family Mutual Insurance Co. v. Hollander, 2010 WL 2851639 *1 (N.D. Iowa, July 20, 2010) the court denied the defendant employee’s motion for summary judgment on the Computer Fraud and Abuse...more
The Computer Fraud and Abuse Act (“CFAA”) is the omnibus federal computer crime statute outlawing theft and destruction of data, hacking, use of viruses, theft of passwords and extortionate threats to damage computers. 18...more
The pursuit of trademark infringers on the Internet, specifically the use of a party’s trademark by an unauthorized second party, poses problems that are unique in trademark infringement law. How do you uncover who is the...more
Find an Intellectual Property Author »
Back to Top