Are websites legally responsible for content posted by their users?
Do I need permission to use images from Google on my website?
Patent Infringement Defense Leveraging Contested Proceedings
Implementing a Counterfeit Enforcement Program
Design Patents: New Implications from the Hague Agreement
Patent Litigation and the Proposed Innovation Act of 2013
Developing a Business Strategy that Deters Counterfeiters
Protecting Trade Secrets When Employees Depart
Polsinelli Podcast - Conducting Business in China
Are there going to be new generic top level domains available in the future?
Beastie Boys Sue; Law Prof's 'Head Spins'
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
The Building Blocks of a Technology Deal
Emerging Strategies for Protecting Global IP Rights
Starting a new business? Intellectual Property 101 Presented by Prof. Islam & PA Thomas Lewry
Warranty vs. Indemnity
What should my company be aware of when launching a new website?
Demonstratives in Post-Grant Proceedings
Video: Claim Contruction in Post-Grant Proceedings
Nearly all companies now use online or mobile websites and/or social media network pages to promote their businesses, sell goods or services, conduct business transactions, and connect and communicate with customers, clients,...more
The recent Federal Court of Canada decision in Voltage Pictures LLC v. John Doe and Jane Doe (2014 FC 161) has already received considerable attention for its approach to deterring so-called “copyright trolls”: plaintiffs...more
You are a device maker, an app or software developer, a potential investor, a healthcare provider, a healthcare payor or an insurer and you see opportunities in mobile health (mHealth). You have an idea for a revolutionary...more
Apps likely contain several elements of intellectual property. Protect copyrights, patents and trade secrets as you would in other software projects (employee and contractor agreements, copyright registrations, trademark...more
Employees who use personal smart phones, PDAs, tablets, laptops and other electronic devices to connect to the employer’s computer network are fast becoming more of a rule than an exception. Today’s employees are often...more
2013 likely will be considered a watershed period in the role of cybersecurity in corporate strategy and management. While there were few significant legislative developments, a marked increase in cybersecurity attacks...more
Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulnerability of our intellectual property to...more
Readers seem to have liked our post about the recent GAO report that summarized the U.S. data privacy debate. For those interested in Internet law and policy issues, there are plenty of other official reports that you can use...more
2013 was an incredibly active year for social media legal issues. Below are selected highlights on some of the more interesting legal issues that impacted social media, along with links to reference material relating to the...more
In the New Year, one of the trade secret trends we’re watching is the ongoing tension between a company’s interest in preserving its proprietary information and the public’s demand to know more about the goods or services it...more
The U.S. Department of Defense issued final rulemaking on November 18, 2013 that will require DOD contractors to protect from attack confidential technical information on their computer systems, and to report and cooperate...more
Scott & Scott, LLP attorney, Brian Von Hatten, lists some of the risks companies face when their workforce wants to bring their own devices to work....more
The app economy is, by most estimates, equivalent in size to the GDP of a small country: $15 billion in 2012, projected to mushroom to $74 billion by 2016. All that economic activity inevitably breeds litigation. In what...more
Legislative Activity -
Senate Commerce Committee Evaluates FCC And FTC Nominees -
The Senate Committee on Commerce, Science and Transportation held a hearing on Wednesday, September 18 to consider the...more
In this presentation:
- The Cloud
- Information Security
- Electronic Contracting
- Excerpt from: Apps: But, What Exactly Is an App?
- A software application designed to run on...more
Living in one of the world fashion capitals and with the upcoming Milan fashion week, we thought it might be of interest covering some of the top current legal issues impacting the fashion sector. This is the first post of a...more
In a win for privacy rights and a setback for Google, the Ninth Circuit agreed that unencrypted Wi-Fi is protected from outside snooping under the federal Wiretap Act.
When Google sent vehicles out to take pictures for its...more
Key Takeaway: Companies that follow these 3 steps can use the Computer Fraud and Abuse Act as a tool to combat the misuse of their computers (and information) by (1) actively monitoring for misuses, (2) taking reasonable...more
The constant threat of cyberattacks presents many and varying challenges for businesses. Insurance provides one way to deal with them....more
The Digital Advertising Alliance (DAA), a self-regulatory group comprised of advertising and media companies, released mobile privacy guidelines which supplement the DAA's Self-Regulatory Principles for Online Behavioral...more
In this issue:
- Data Protection ‘Around the World’
- New Neighbouring Right for Press Publishers under German Copyright Law – from 1 August 2013
- German Federal Supreme Court decides on Internet Video...more
Below is a top ten pocket guide for the top ten laws any operation (social, e-commerce, IP/UGC driven, etc.) needs to be familiar with now and for the foreseeable future. Having this at the ready won’t necessarily make you...more
Trade secret theft and cybersecurity are hot topics in Congress these days, spawning legislative initiatives left and right....more
Fenwick & West's Tyler Newby discusses the Federal Trade Commission's concept of Privacy by Design....more
In This Issue:
- Here Come the Feds -- What President Obama’s second term means for the tech industry
- Log In:
...Feds cast an eye on social media
...3-D’s IP dimension
Find an Intellectual Property Author »
Back to Top