Intellectual Property Privacy Science, Computers & Technology

Read Intellectual Property Law updates, alerts, news, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Intellectual Property and Technology News - December 2014 (Global)

In This Issue: - Fundamental Reform Ahead For European Patent Law - Patentability of Isolated Nucleic Acid - Patent Reform – Is It Working? - Right To Privacy In Japan - Supreme Court Corner - The FTC...more

Businesses Encouraged to Adopt Social Media Policies

Many business owners, particularly those with a limited marketing budget or no marketing plan, view access to social media as free marketing. What could be better? Ask paid employees to get out the “buzz” as an assignment....more

BYOD In Australia - Cool, Cheap And (Potentially) Catastrophic!

THE ALLURE OF THE POTENTIAL COST SAVINGS OF BRING YOUR OWN DEVICE PROGRAMS IS TOO GREAT FOR MANY AUSTRALIAN ORGANISATIONS TO RESIST. Not only do the financials of Bring Your Own Device (BYOD) programs look good (the...more

Your Client is Hacked and Personal Information is Leaked Online – Now What?

You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more

Intellectual Property and Technology News (Asia)

Welcome to the most recent Asia Pacific edition of Intellectual Property and Technology News, our biannual publication designed to report on worldwide developments in IP and technology law, offering perspectives, analysis and...more

I Want My Selfie Back!!!

If your selfie has fallen into the wrong hands, the following statutory acts and/or common law theories may provide some relief....more

IP Rights In Data Handbook - Protecting and exploiting IP in data, big data and databases internationally

In the era of Big Data, no ambitious business can afford to live without a strategy for the acquisition, protection and exploitation of the data upon which it depends. The laws enabling data to be protected and exploited are...more

Life Sciences Spotlight - Issue 4, 2014

Since our last edition, there has been a number of developments in the Life Sciences sector across the Asia Pacific region and we are pleased to be able to update you on these recent trends. It is evident that the...more

IP/IT & Media Newsletter - Issue 1/2014

In this issue: - Apps and Data Privacy – New Guidelines from the German DPAs New Developments in Cybersecurity Regulation - Refer-a-Friend Functionality on the Internet – Federal Court underpins its...more

Employment Law Commentary -- Volume 26, Issue 7 July 2014 -- Building A Workforce Culture Of Data Security In The Post-Snowden Era

Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more

How is Graphene Currently Used and What is the Hope for the Future? [Video]

In the second video of a three-part series, Fenwick attorney Paul Smith talks about the growing anticipation surrounding this strong, conductive and flexible material. Why the excitement? Simply put, graphene is easy. It’s...more

Going Mobile: The Risks and Rewards of a BYOD Program

Employees are increasingly using their personal electronic devices, such as laptops, smartphones, and tablets, for work purposes. The trend, dubbed “Bring Your Own Device” or “BYOD,” has redefined what it means to “be at...more

What is Graphene? Fenwick Patent Attorney Has the Answer [Video]

The technology and life sciences communities alike have been raving about new "wonder material" graphene for the past year. From applications for wearable devices to the creation of lightweight, bendable televisions and...more

Hedge Fund Hack Results in Trade Secret Loss, and Raises SEC Reporting Issues

Data breaches may be nothing new, but they are certainly evolving into bigger and more notorious infractions. While the data breaches of yesterday may have involved accidental disclosure or disgruntled former employees, the...more

The Katten Kattwalk | Issue 05

In this issue: - The Early Bird Gets the Trademark: Don’t Delay Filing Intent-to-Use Applications - Color Wars: Narrowing Color Claims in Trademark Rights - It’s Good to Be Famous: TTAB Expands...more

Protecting Trade Secrets in the Digital Age Requires Extra Vigilance

Technology allows businesses around the world to easily communicate and access data, increasing both business opportunities and worker productivity. However, this same technology also makes corporate data more vulnerable to...more

Data Security in a Technological World

The Uniform Trade Secrets Act, adopted by 47 states including Virginia, Maryland, and the District of Columbia, generally defines protectable trade secrets as information that derives independent economic value from not being...more

DOJ Charges Chinese Military Hackers with Economic Espionage

In what is the first case of its kind, the Justice Department has filed criminal charges against Chinese military officers for hacking U.S. Companies. Five Chinese military officers, all members of China’s Peoples’ Liberation...more

China Business Update: China’s Evolving Legal Landscape for Trade Secret Protection

2013 will be remembered as a watershed year for trade secret protection in China. In January 2013, China’s Amended Civil Procedure Law came into force, giving courts discretion to issue interlocutory injunctions (1)...more

Copyright v. Privacy: Voltage Pictures LLC v. John Doe And Jane Doe

The recent Federal Court of Canada decision in Voltage Pictures LLC v. John Doe and Jane Doe (2014 FC 161) has already received considerable attention for its approach to deterring so-called “copyright trolls”: plaintiffs...more

mHealth Stakeholders: Updated Bullet List of Legal Considerations

You are a device maker, an app or software developer, a potential investor, a healthcare provider, a healthcare payor or an insurer and you see opportunities in mobile health (mHealth). You have an idea for a revolutionary...more

Ten Legal Practice Tips: Developing and Distributing Apps

Apps likely contain several elements of intellectual property. Protect copyrights, patents and trade secrets as you would in other software projects (employee and contractor agreements, copyright registrations, trademark...more

BYOD: Policy Considerations for Employers in the Age of Personal Devices

Employees who use personal smart phones, PDAs, tablets, laptops and other electronic devices to connect to the employer’s computer network are fast becoming more of a rule than an exception. Today’s employees are often...more

"Cybersecurity: Amid Increasing Attacks and Government Controversy, a Framework to Reduce Risk Emerges"

2013 likely will be considered a watershed period in the role of cybersecurity in corporate strategy and management. While there were few significant legislative developments, a marked increase in cybersecurity attacks...more

A Weapon Against Hackers on the Home Front

Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulner­ability of our intellectual property to...more

196 Results
|
View per page
Page: of 8

Follow Intellectual Property Updates on: