Read Intellectual Property Law updates, alerts, news, and legal analysis from leading lawyers and law firms:
Beastie Boys Sue; Law Prof's 'Head Spins'
Generic Drugs to Market - What's the Climate in 2014?
The Building Blocks of a Technology Deal
Emerging Strategies for Protecting Global IP Rights
Starting a new business? Intellectual Property 101 Presented by Prof. Islam & PA Thomas Lewry
Warranty vs. Indemnity
What should my company be aware of when launching a new website?
Demonstratives in Post-Grant Proceedings
Video: Claim Contruction in Post-Grant Proceedings
Why Choose the Dual Track Process?
Claim Amendments in Post-Grant Proceedings
Due Diligence in Mergers, Acquisitions, and Corporate Transactions
International Patent Laws – Interview with Julian Crump, Managing Member, Mintz Levin's London, UK Office
Court Stay Factors in Concurrent Post-Grant Proceedings
Navigating the Dual Track M&A/IPO– Part One
Biosimilars in the U.S. and Abroad
Patent Mediation – Interview with John Delehanty, Member, Mintz Levin
Patent Eligibility Challenges in Post-Grant Proceedings
Witnesses in Post-Grant Proceedings
Four Tips on Preparing Inter Partes Review Petitions
A company that has filed a series of cases alleging infringement of a patent has found itself named as a defendant sued under the federal Racketeering and Corrupt Organizations Act (RICO). The case, FindTheBest.com, Inc. v....more
In almost all corporate transactions, the first piece of written documentation the parties exchange and execute (after a non-disclosure agreement) is a letter of intent or term sheet (“LOI”), which is intended to summarize...more
Key Takeaway: Companies that follow these 3 steps can use the Computer Fraud and Abuse Act as a tool to combat the misuse of their computers (and information) by (1) actively monitoring for misuses, (2) taking reasonable...more
SUMMARY: The two year statute of limitations for Computer Fraud and Abuse Act claim began to run when the plaintiff had an awareness of an unauthorized access into its computer system even if the plaintiff did not know the...more
Brief in opposition to defendants' post-Akamai motion for summary judgment on the ground of non-infringement....more
From the preliminary statement:
Plaintiff David Tropp (“Tropp”), owner of U.S. Patent Nos. 7,021,537 and 7,036,728 (the patents-in-suit), submits this memorandum of law in opposition to the motion by Travel Sentry and...more
A publicly accessible website may selectively block users from using the website, and attempts by a blocked user to access the site may be a violation of the Computer Fraud and Abuse Act (CFAA).
A federal district court...more
As lawyers, we are always arguing about documents, and we often need to display those documents in court. In patent cases, displaying documents is particularly important because the patent’s language describes the invention....more
For your next trial or important hearing, you should seriously consider using an e-brief to help the judge (and the judge’s clerk) navigate and understand your argument. Cogent Legal recently helped a team of patent...more
We previously reported on the downpour of recent trade secret activity in Congress. Last week, Congresswoman Zoe Lofgren (D-Cal.) added to the deluge by introducing two bills bearing on trade secret misappropriation...more
On 17 May, Mrs Justice Asplin delivered a judgment in the Chancery Division of the High Court of Justice. The dispute concerned intellectual property rights in hedge fund computer software that was the "cornerstone of the...more
The "inevitable disclosure" doctrine is one of the most discussed, controversial topics in unfair competition law. The commentary among academics and bloggers reminds me of the ongoing debate over the proper scope of the...more
Trade secret claims have historically derived from state common law causes of action and, subsequently, most states’ adoption of the Uniform Trade Secrets Act, which codifies that common law and generally proscribes the...more
ICANN, the International Corporation for Assigned Names and Numbers, has taken another step in expanding the number of sanctioned top-level web domains (TLD). Domain extensions such as .nike, .canon and .bank may now join the...more
In This Issue:
Supreme Court -
Supreme Court Finds That “First Sale” Doctrine Applies to Works
Joint Actors as It Relates to Method Claim Infringement; Federal Circuit Ruling Clears Way...more
In This Issue:
- Kirtsaeng v. John Wiley & Sons, Inc., U.S. Supreme Court, March 19, 2013:
In a 6-to-3 decision with far-reaching implications, U.S. Supreme Court holds that copyright “first sale” doctrine...more
With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more
A personal injury law firm can buy search terms using the names of a competing law firm’s partners without violating Wisconsin’s privacy laws because the use of the names is “non-visible,” an appellate court found.
Cases involving alleged false advertising in cyberspace increased significantly in number in the past year, but success has been limited according to a legal survey article by Cheryl Dancey Balough.
The article noted that...more
The proper jurisdiction for suing someone for engaging in computer fraud from a foreign country, directed at a company in the United States, is the place where the wrongfully accessed computer server is located if the...more
Software and technology licensing fees are often tied to the number of users or devices that access an application or database. More users, or more devices, will often mean higher licensing fees.
The terms and conditions...more
You are an innovator. You work hard. You are the first to get to the functioning platform of a genius new product. But to make money on it, you have to share it, sell it and let people sample it. Of course, you worry that...more
A new informational app for the iPad and iPhone to help employers and employees better understand what is a trade secret or a covenant not to compete has been released by Balough Law Offices, LLC.
The Trade Secrets app...more
This case underscores the significance for employers to create and maintain social media policies that address the control and ownership of company-sponsored social media accounts.