Are websites legally responsible for content posted by their users?
Do I need permission to use images from Google on my website?
Patent Infringement Defense Leveraging Contested Proceedings
Implementing a Counterfeit Enforcement Program
Design Patents: New Implications from the Hague Agreement
Patent Litigation and the Proposed Innovation Act of 2013
Developing a Business Strategy that Deters Counterfeiters
Protecting Trade Secrets When Employees Depart
Polsinelli Podcast - Conducting Business in China
Are there going to be new generic top level domains available in the future?
Beastie Boys Sue; Law Prof's 'Head Spins'
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
The Building Blocks of a Technology Deal
Emerging Strategies for Protecting Global IP Rights
Starting a new business? Intellectual Property 101 Presented by Prof. Islam & PA Thomas Lewry
Warranty vs. Indemnity
What should my company be aware of when launching a new website?
Demonstratives in Post-Grant Proceedings
Video: Claim Contruction in Post-Grant Proceedings
In This Presentation:
- User Generated Content
..What, Me Worry? What could go wrong with UGC?
- The Communications Decency Act
- The DMCA
- Sweepstakes, Contests and...more
Judge Totenberg remanded the case brought by TransCardiac Therapeutics, Inc. (“TransCardiac”), against Ajit Yoganathan, Ph.D, Jorge H. Jiminez, Ph.D., Vinod H. Thourani, M.D., Emory University, Georgia Tech Research...more
In this patent infringement action between Emblaze and Apple, Apple filed a motion to stay the case pending the recent grant of certiorari in Akamai v. Limelight Networks. In Akamai, a divided en banc Federal Circuit panel...more
Where a technology license carries with it an obligation to pay royalties based on revenues, how does the licensor determine if the revenues are accurately reported? The sales are known to the licensee, but the licensor has...more
A California federal court in Enki Corporation v. Freedman held that a former employee’s access of the employer’s computer systems through his log-in credentials did not amount to unlawful hacking under either the Computer...more
Several bills under consideration in the 113th Congress would establish or significantly amend certain federal statutes related to the protection, enforcement, and exploitation of trade secrets or copyrights. Some legislation...more
In This Issue -
..Quinn Emanuel Arbitration Practitioners Recognized in Global Arbitration Review’s “International Who’s Who of Commercial Arbitration”
..Quinn Emanuel Expands International White...more
A company that has filed a series of cases alleging infringement of a patent has found itself named as a defendant sued under the federal Racketeering and Corrupt Organizations Act (RICO). The case, FindTheBest.com, Inc. v....more
In almost all corporate transactions, the first piece of written documentation the parties exchange and execute (after a non-disclosure agreement) is a letter of intent or term sheet (“LOI”), which is intended to summarize...more
Key Takeaway: Companies that follow these 3 steps can use the Computer Fraud and Abuse Act as a tool to combat the misuse of their computers (and information) by (1) actively monitoring for misuses, (2) taking reasonable...more
SUMMARY: The two year statute of limitations for Computer Fraud and Abuse Act claim began to run when the plaintiff had an awareness of an unauthorized access into its computer system even if the plaintiff did not know the...more
Brief in opposition to defendants' post-Akamai motion for summary judgment on the ground of non-infringement....more
From the preliminary statement:
Plaintiff David Tropp (“Tropp”), owner of U.S. Patent Nos. 7,021,537 and 7,036,728 (the patents-in-suit), submits this memorandum of law in opposition to the motion by Travel Sentry and...more
A publicly accessible website may selectively block users from using the website, and attempts by a blocked user to access the site may be a violation of the Computer Fraud and Abuse Act (CFAA).
A federal district court...more
As lawyers, we are always arguing about documents, and we often need to display those documents in court. In patent cases, displaying documents is particularly important because the patent’s language describes the invention....more
For your next trial or important hearing, you should seriously consider using an e-brief to help the judge (and the judge’s clerk) navigate and understand your argument. Cogent Legal recently helped a team of patent...more
We previously reported on the downpour of recent trade secret activity in Congress. Last week, Congresswoman Zoe Lofgren (D-Cal.) added to the deluge by introducing two bills bearing on trade secret misappropriation...more
On 17 May, Mrs Justice Asplin delivered a judgment in the Chancery Division of the High Court of Justice. The dispute concerned intellectual property rights in hedge fund computer software that was the "cornerstone of the...more
Trade secret claims have historically derived from state common law causes of action and, subsequently, most states’ adoption of the Uniform Trade Secrets Act, which codifies that common law and generally proscribes the...more
ICANN, the International Corporation for Assigned Names and Numbers, has taken another step in expanding the number of sanctioned top-level web domains (TLD). Domain extensions such as .nike, .canon and .bank may now join the...more
In This Issue:
Supreme Court -
Supreme Court Finds That “First Sale” Doctrine Applies to Works
Joint Actors as It Relates to Method Claim Infringement; Federal Circuit Ruling Clears Way...more
In This Issue:
- Kirtsaeng v. John Wiley & Sons, Inc., U.S. Supreme Court, March 19, 2013:
In a 6-to-3 decision with far-reaching implications, U.S. Supreme Court holds that copyright “first sale” doctrine...more
With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more
A personal injury law firm can buy search terms using the names of a competing law firm’s partners without violating Wisconsin’s privacy laws because the use of the names is “non-visible,” an appellate court found.
Cases involving alleged false advertising in cyberspace increased significantly in number in the past year, but success has been limited according to a legal survey article by Cheryl Dancey Balough.
The article noted that...more
Find an Intellectual Property Author »
Back to Top