IP|Trend: Inter Partes Review: Is It Still Right For You?
IS THE A IN ANDA BEGINNING TO MEAN ANTITRUST?
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
Bill Beutler on Editing Wikipedia
Inter Partes Review Appeals: What You Need to Know
The AIA Has Moved the Cheese
Emerging Markets: Opportunity, Risk, and What it Means for Brand Protection
How is Graphene Currently Used and What is the Hope for the Future?
Derivation Proceedings: What You Need to Know
What is Graphene? Fenwick Patent Attorney Has the Answer
Examining Trends in Worldwide Design IP Filings
Two Tips for Inventors Filing Patent Applications
Track One and the Patent Prosecution Highway
The Intersection Between Intellectual Property Law and Employment Law
Lessons from Nautilus v. Biosig at the Supreme Court
Examining the Impact of the Supreme Court's Limelight v. Akamai Decision
FCPA Compliance and Ethics Report-Episode 72-interview with Michael Rasmussen
The Evolution of Trade Secret Damages
The Art of Communicating to a Jury
The Evolution of Patent Damages
Welcome to the most recent Asia Pacific edition of Intellectual Property and Technology News, our biannual publication designed to report on worldwide developments in IP and technology law, offering perspectives, analysis and...more
If your selfie has fallen into the wrong hands, the following statutory acts and/or common law theories may provide some relief....more
In the era of Big Data, no ambitious business can afford to live without a strategy for the acquisition, protection and exploitation of the data upon which it depends. The laws enabling data to be protected and exploited are...more
Since our last edition, there has been a number of developments in the Life Sciences sector across the Asia Pacific region and we are pleased to be able to update you on these recent trends.
It is evident that the...more
In this issue:
- Apps and Data Privacy
– New Guidelines from the German DPAs New Developments in Cybersecurity Regulation
- Refer-a-Friend Functionality on the Internet – Federal Court underpins its...more
Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more
In the second video of a three-part series, Fenwick attorney Paul Smith talks about the growing anticipation surrounding this strong, conductive and flexible material.
Why the excitement? Simply put, graphene is easy. It’s...more
Employees are increasingly using their personal electronic devices, such as laptops, smartphones, and tablets, for work purposes. The trend, dubbed “Bring Your Own Device” or “BYOD,” has redefined what it means to “be at...more
The technology and life sciences communities alike have been raving about new "wonder material" graphene for the past year. From applications for wearable devices to the creation of lightweight, bendable televisions and...more
Data breaches may be nothing new, but they are certainly evolving into bigger and more notorious infractions. While the data breaches of yesterday may have involved accidental disclosure or disgruntled former employees, the...more
In this issue:
- The Early Bird Gets the Trademark: Don’t Delay Filing Intent-to-Use Applications
- Color Wars: Narrowing Color Claims in Trademark Rights
- It’s Good to Be Famous: TTAB Expands...more
Technology allows businesses around the world to easily communicate and access data, increasing both business opportunities and worker productivity. However, this same technology also makes corporate data more vulnerable to...more
The Uniform Trade Secrets Act, adopted by 47 states including Virginia, Maryland, and the District of Columbia, generally defines protectable trade secrets as information that derives independent economic value from not being...more
In what is the first case of its kind, the Justice Department has filed criminal charges against Chinese military officers for hacking U.S. Companies. Five Chinese military officers, all members of China’s Peoples’ Liberation...more
2013 will be remembered as a watershed year for trade secret protection in China.
In January 2013, China’s Amended Civil Procedure Law came into force, giving courts discretion to issue interlocutory injunctions (1)...more
The recent Federal Court of Canada decision in Voltage Pictures LLC v. John Doe and Jane Doe (2014 FC 161) has already received considerable attention for its approach to deterring so-called “copyright trolls”: plaintiffs...more
You are a device maker, an app or software developer, a potential investor, a healthcare provider, a healthcare payor or an insurer and you see opportunities in mobile health (mHealth). You have an idea for a revolutionary...more
Apps likely contain several elements of intellectual property. Protect copyrights, patents and trade secrets as you would in other software projects (employee and contractor agreements, copyright registrations, trademark...more
Employees who use personal smart phones, PDAs, tablets, laptops and other electronic devices to connect to the employer’s computer network are fast becoming more of a rule than an exception. Today’s employees are often...more
2013 likely will be considered a watershed period in the role of cybersecurity in corporate strategy and management. While there were few significant legislative developments, a marked increase in cybersecurity attacks...more
Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulnerability of our intellectual property to...more
Readers seem to have liked our post about the recent GAO report that summarized the U.S. data privacy debate. For those interested in Internet law and policy issues, there are plenty of other official reports that you can use...more
2013 was an incredibly active year for social media legal issues. Below are selected highlights on some of the more interesting legal issues that impacted social media, along with links to reference material relating to the...more
In the New Year, one of the trade secret trends we’re watching is the ongoing tension between a company’s interest in preserving its proprietary information and the public’s demand to know more about the goods or services it...more
The U.S. Department of Defense issued final rulemaking on November 18, 2013 that will require DOD contractors to protect from attack confidential technical information on their computer systems, and to report and cooperate...more
Find an Intellectual Property Author »
Back to Top