Are websites legally responsible for content posted by their users?
Do I need permission to use images from Google on my website?
Patent Infringement Defense Leveraging Contested Proceedings
Implementing a Counterfeit Enforcement Program
Design Patents: New Implications from the Hague Agreement
Patent Litigation and the Proposed Innovation Act of 2013
Developing a Business Strategy that Deters Counterfeiters
Protecting Trade Secrets When Employees Depart
Polsinelli Podcast - Conducting Business in China
Are there going to be new generic top level domains available in the future?
Beastie Boys Sue; Law Prof's 'Head Spins'
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
The Building Blocks of a Technology Deal
Emerging Strategies for Protecting Global IP Rights
Starting a new business? Intellectual Property 101 Presented by Prof. Islam & PA Thomas Lewry
Warranty vs. Indemnity
What should my company be aware of when launching a new website?
Demonstratives in Post-Grant Proceedings
Video: Claim Contruction in Post-Grant Proceedings
As a Circuit judge recently noted in dissent, the Digital Millennium Copyright Act (DMCA) strives to "achieve a balance between strengthening copyright law and preserving consumer rights, promoting technological innovation,...more
Earlier this month, Walter Liew, his company, USA Performance Technology, Inc., and Robert Maegerle were found guilty of economic espionage and theft of trade secrets, among other crimes, for participating in a scheme to...more
The Italian tax police seized 46 websites streaming videos in breach of the copyright holders, but is also going after entities “supporting” such sites through banners published on them so starting a new approach in the fight...more
Several bills under consideration in the 113th Congress would establish or significantly amend certain federal statutes related to the protection, enforcement, and exploitation of trade secrets or copyrights. Some legislation...more
A November 2013 ruling from the United States District Court in a bankruptcy case may create an obstacle for a tactic increasingly popular among federal prosecutors – the seizure of a defendant company’s domain name....more
According to a report by the Financial Times, British internet service providers (ISPs) have rejected an attempt by the Gambling Commission to post warning pages on unlicensed gambling websites, alerting the user that the...more
Former Korn/Ferry recruiter David Nosal was sentenced to one year and one day in prison on Wednesday for violating the federal Computer Fraud and Abuse Act and the Economic Espionage Act.
In April, a federal jury in...more
On October 16, 2013, a federal judge in New Jersey ruled that Goldman Sachs must advance the legal fees of a former employee charged with stealing Goldman’s source code. The order is the latest twist in a case that...more
On February 28, 2008, Hanjuan Jin, a Chinese-born former software engineer for Motorola, arrived at Chicago O’Hare Airport en route to Beijing. During a random customs check, officials discovered that she had a one-way...more
The Criminal Court no. 4 of Castellón (Spain) has recently sentenced a peer-to-peer file sharing webmaster to 18 month imprisonment for a continued offence against IP rights. In addition, the Court has also banned him from...more
January 2012 saw an explosion of controversy over two Internet-related bills that had been progressing through Congress: the Stop Online Piracy Act (SOPA) in the House, and the Preventing Real Online Threats to Economic...more
With Chinese cyber attacks, data security, and industrial espionage occupying more and more space in the headlines, companies are re-evaluating their strategies for guarding sensitive information. There is certain to be more...more
The infamous Silk Road Anonymous Market site is back in service, following a DDOS (“distributed denial of service”) attack on May 1, 2013. The Silk Road is sometimes referred to as “the Amazon or eBay of illegal drugs.”...more
The Computer Fraud and Abuse Act (CFAA) (18 U.S.C. § 1030) levies penalties on a person who "intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains... information from any...more
Whenever an appeals court kicks off a 65-page opinion by describing you (or your client) as a thief, and posits that the question before it is whether you’ve been properly convicted of thievery, you know you’re in trouble. ...more
In all jurisdictions the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, the federal computer crime statute, applies to former employees who steal data from the company computer, but in two federal circuits it does not...more
Lord Younger, in his capacity as Intellectual Property Minster, has announced that a new IP police unit is to be created by September of this year. ...more
We previously reported on the downpour of recent trade secret activity in Congress. Last week, Congresswoman Zoe Lofgren (D-Cal.) added to the deluge by introducing two bills bearing on trade secret misappropriation...more
Trade secret theft and cybersecurity are hot topics in Congress these days, spawning legislative initiatives left and right....more
On May 21, 2012, the Senate Armed Services Committee issued a report of its inquiry into counterfeit parts in the Department of Defense Supply Chain. The Committee’s report stated that the problem of counterfeit electronic...more
On April 24, 2013, a federal jury in the Northern District of California found former Korn/Ferry International corporate executive recruiter, David Nosal, guilty on six counts of conspiracy, stealing trade secrets, and...more
There’s been a lot of news lately about the Chinese military allegedly launching cyber attacks to steal U.S. trade secrets. This has gotten people riled up, including the President of the United States, who issued a 5-point...more
Most people know that an employee who misuses his employer’s confidential information may be subject to damages in a civil lawsuit. Many states have enacted a Uniform Trade Secrets Act that allows an employer to pursue a...more
On March 12, 2013, the U.S. District Court for the Northern District of California issued a ruling clarifying the reach of the federal Computer Fraud and Abuse Act (CFAA) when employees access computer systems. The decision...more
No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more
Find an Intellectual Property Author »
Back to Top