Intellectual Property Science, Computers & Technology Privacy

Read Intellectual Property Law updates, alerts, news, and legal analysis from leading lawyers and law firms:
News & Analysis as of

How is Graphene Currently Used and What is the Hope for the Future? [Video]

In the second video of a three-part series, Fenwick attorney Paul Smith talks about the growing anticipation surrounding this strong, conductive and flexible material. Why the excitement? Simply put, graphene is easy. It’s...more

Going Mobile: The Risks and Rewards of a BYOD Program

Employees are increasingly using their personal electronic devices, such as laptops, smartphones, and tablets, for work purposes. The trend, dubbed “Bring Your Own Device” or “BYOD,” has redefined what it means to “be at...more

What is Graphene? Fenwick Patent Attorney Has the Answer [Video]

The technology and life sciences communities alike have been raving about new "wonder material" graphene for the past year. From applications for wearable devices to the creation of lightweight, bendable televisions and...more

Business News Digest – July 2014

In this issue: - SEC v. Citigroup: A New Standard for Reviewing Consent Decrees - Credit Unions Beware – the TARP Watchdog Is Ready to Pounce - Canada's New Anti-Spam Legislation: What Does It Mean for...more

Hedge Fund Hack Results in Trade Secret Loss, and Raises SEC Reporting Issues

Data breaches may be nothing new, but they are certainly evolving into bigger and more notorious infractions. While the data breaches of yesterday may have involved accidental disclosure or disgruntled former employees, the...more

The Katten Kattwalk | Issue 05

In this issue: - The Early Bird Gets the Trademark: Don’t Delay Filing Intent-to-Use Applications - Color Wars: Narrowing Color Claims in Trademark Rights - It’s Good to Be Famous: TTAB Expands...more

Protecting Trade Secrets in the Digital Age Requires Extra Vigilance

Technology allows businesses around the world to easily communicate and access data, increasing both business opportunities and worker productivity. However, this same technology also makes corporate data more vulnerable to...more

Data Security in a Technological World

The Uniform Trade Secrets Act, adopted by 47 states including Virginia, Maryland, and the District of Columbia, generally defines protectable trade secrets as information that derives independent economic value from not being...more

DOJ Charges Chinese Military Hackers with Economic Espionage

In what is the first case of its kind, the Justice Department has filed criminal charges against Chinese military officers for hacking U.S. Companies. Five Chinese military officers, all members of China’s Peoples’ Liberation...more

China Business Update: China’s Evolving Legal Landscape for Trade Secret Protection

2013 will be remembered as a watershed year for trade secret protection in China. In January 2013, China’s Amended Civil Procedure Law came into force, giving courts discretion to issue interlocutory injunctions (1)...more

Legal Considerations for E-Commerce Businesses

Nearly all companies now use online or mobile websites and/or social media network pages to promote their businesses, sell goods or services, conduct business transactions, and connect and communicate with customers, clients,...more

Copyright v. Privacy: Voltage Pictures LLC v. John Doe And Jane Doe

The recent Federal Court of Canada decision in Voltage Pictures LLC v. John Doe and Jane Doe (2014 FC 161) has already received considerable attention for its approach to deterring so-called “copyright trolls”: plaintiffs...more

mHealth Stakeholders: Updated Bullet List of Legal Considerations

You are a device maker, an app or software developer, a potential investor, a healthcare provider, a healthcare payor or an insurer and you see opportunities in mobile health (mHealth). You have an idea for a revolutionary...more

Ten Legal Practice Tips: Developing and Distributing Apps

Apps likely contain several elements of intellectual property. Protect copyrights, patents and trade secrets as you would in other software projects (employee and contractor agreements, copyright registrations, trademark...more

BYOD: Policy Considerations for Employers in the Age of Personal Devices

Employees who use personal smart phones, PDAs, tablets, laptops and other electronic devices to connect to the employer’s computer network are fast becoming more of a rule than an exception. Today’s employees are often...more

"Cybersecurity: Amid Increasing Attacks and Government Controversy, a Framework to Reduce Risk Emerges"

2013 likely will be considered a watershed period in the role of cybersecurity in corporate strategy and management. While there were few significant legislative developments, a marked increase in cybersecurity attacks...more

A Weapon Against Hackers on the Home Front

Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulner­ability of our intellectual property to...more

Whitepaper roundup: Privacy, copyright, and digital advertising

Readers seem to have liked our post about the recent GAO report that summarized the U.S. data privacy debate. For those interested in Internet law and policy issues, there are plenty of other official reports that you can use...more

Social Media & Games: 2013 Year in Review

2013 was an incredibly active year for social media legal issues. Below are selected highlights on some of the more interesting legal issues that impacted social media, along with links to reference material relating to the...more

Trade Secrets Trend To Watch In 2014: Government Regulations Requiring Public Disclosure Of Proprietary Information

In the New Year, one of the trade secret trends we’re watching is the ongoing tension between a company’s interest in preserving its proprietary information and the public’s demand to know more about the goods or services it...more

CYBERSECURITY UPDATE: New Rules Require Defense Contractors To Protect Technical Information

The U.S. Department of Defense issued final rulemaking on November 18, 2013 that will require DOD contractors to protect from attack confidential technical information on their computer systems, and to report and cooperate...more

Risks of Bring Your Own Device

Scott & Scott, LLP attorney, Brian Von Hatten, lists some of the risks companies face when their workforce wants to bring their own devices to work....more

Who is Liable: App Stores or App Developers?

The app economy is, by most estimates, equivalent in size to the GDP of a small country: $15 billion in 2012, projected to mushroom to $74 billion by 2016. All that economic activity inevitably breeds litigation. In what...more

Capital Thinking: Technology & Communications

Legislative Activity - Senate Commerce Committee Evaluates FCC And FTC Nominees - The Senate Committee on Commerce, Science and Transportation held a hearing on Wednesday, September 18 to consider the...more

Keeping Up with Technology and the Law: What Your Nonprofit Should Know about Apps, the Cloud, Information Security, and...

In this presentation: - Apps - The Cloud - Information Security - Electronic Contracting - Excerpt from: Apps: But, What Exactly Is an App? - A software application designed to run on...more

192 Results
|
View per page
Page: of 8

Follow Intellectual Property Updates on: