Science, Computers & Technology Business Torts

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Angie’s List Accuses Amazon of Home Improvement Hijinks

Even freed from bricks and mortar, online retailers and service providers are realizing that market share is not infinite. A complaint recently filed by Angie’s List Inc. against Amazon Local LLC for its newly launched online...more

IP Law Tracker Docket Review

Each month, we review significant intellectual property decisions from the U.S. Court of Appeals for the Sixth Circuit and the U.S. District Courts for the Eastern District and Western District of Michigan. Below is the...more

Mobile App Developer Settles with FTC and New Jersey AG Over Virtual Currency Mining

On June 29, a mobile app developer entered into an agreement with the FTC and the New Jersey AG to settle allegations that the developer engaged in deceptive and unfair practices by marketing its rewards app, called “Prized,”...more

Reforming Trade Secret Protections in Japan

Theft of corporate trade secrets continues to dominate the headlines as news abounds of stories ranging from crippling cyber-attacks exposing confidential data to employees stealing trade secrets to share with competitors. ...more

Certification Unhealthy: Ninth Circuit Vacates Order Certifying Class of Dietary Supplement Purchasers

The Ninth Circuit vacated a class certification order issued by the Central District of California, finding that common issues did not predominate because plaintiff had failed to demonstrate that the alleged misrepresentation...more

Theratechnologies Inc. V. 12185 Canada Inc: Supreme Court Of Canada Raises The Bar For Obtaining Leave To Bring Secondary Market...

In Theratechnologies inc. v. 12185 Canada inc., the Supreme Court of Canada has ruled that requirements that plaintiffs demonstrate that their claims have been brought in good faith and have a reasonable chance of succeeding...more

King Drug Co. of Florence, Inc. v. SmithKline Beecham Corp. (3rd Cir. 2015)

Ever since the Supreme Court's decision in FTC v. Actavis in 2013, courts (predominantly district courts) have grappled with the scope of the decision. It was evident that the presence of a large cash payment from the...more

Has the Supreme Court signaled the end of invalidity opinion letters?

On May 26, 2015, in the case of Commil USA, LLC v. CISCO Systems, Inc., the U.S. Supreme Court answered the question of whether a good-faith belief that a patent is invalid shields a party from committing induced...more

G.D. Searle LLC v. Lupin Pharmaceuticals, Inc. (Fed. Cir. 2015)

Over seven years ago, the Federal Circuit delivered a mixed ruling against Pfizer in litigation against Teva) relating to the pain medication Celebrex® (celocoxib) (where "celocoxib" is...more

That is SO last week - June 2015 #2

Over the past couple of weeks, payroll giant ADP and successful HR startup Zenefits got into what The Starr Conspiracy has called a “kerfuffle” over Zenefits’ use of ADP’s employer data and millions of employees’ personal...more

Akamai Technologies, Inc. v. Limelight Networks, Inc. (Fed. Cir. 2015)

1. Background - In 2006, Akamai Technologies ("Akamai") sued Limelight Networks, Inc. ("Limelight") in the U.S. District Court for the District of Massachusetts, alleging infringement of U.S. Patent No. 6,108,703. The...more

Still Can’t Search This: B.C. Court of Appeal Affirms Global Restraining Order Against Google

In 2014, the B.C. Supreme Court ordered Google Inc. (Google) and Google Canada Corporation (Google Canada) to remove all of a company’s websites from its search results. As we noted in our June 2014 Blakes Bulletin: Can’t...more

Competing After Employment (Part 2)

A few weeks ago, Jawbone, a fitness tracking hardware and software maker, sued its arch-rival Fitbit, alleging that Fitbit lured its employees away to obtain access Jawbone’s confidential information and product plans. How...more

[Webinar] Cyber Threats and the Crown Jewels: Practical Steps to Protect Corporate Assets - June 24, 9 a.m. EDT

Information security is a growing concern for companies and legal teams around the world. The rising tide of cybersecurity issues and insider threats pose great risks to a company’s crown jewels: its intellectual property....more

Pennsylvania Court Refuses to Create a Duty of Care to Protect Confidential Personal Data

On May 28, 2015, Judge R. Stanton Wettick, Jr. refused to create a new cause of action sounding in negligence allowing a claim for damages resulting from improper disclosure of confidential personal and financial...more

Things You Can’t Un-See … Such As Trade Secrets

A federal appeals court has ruled that “features and functions” of software programs are not trade secrets, particularly when those with access are not required to sign confidentiality agreements. This ruling reinforces the...more

Should We Hack Back?

“No,” says U.S. Assistant Attorney General Leslie R. Caldwell. At the most recent Cybersecurity Law Institute held at Georgetown University Law Center in late May, the head of the U.S. Department of Justice’s (DOJ) Criminal...more

Five Takeaways from the First Cyber Insurance Case

On May 11, 2015, in a case that is being widely celebrated as one of the first coverage rulings involving a “cyber” insurance policy, a federal court ruled that Travelers has no duty to defend its insured in Travelers...more

Pharmaceutical Marketing and Unfair-Trade-Practices Claims

Lawsuits against pharmaceutical companies generally center on product-liability claims. A new trend in pharma cases, however, is to include a different kind of claim: a claim for unfair trade practices....more

“‘Say it ain’t so, bro!’” (Episode 14)

Previously we’ve discussed Hooli’s reverse engineering of Pied Piper’s technology and the threatened lawsuit for ownership of the technology. In Episode 14, Pied Piper faces a new threat: Endframe, a Pied Piper competitor,...more

Federal Circuit Finds No Direct Infringement Where Limelight's Customer—and Not Limelight—Performs Required Step of Method Claim

On May 13, 2015, a divided Federal Circuit held that Limelight did not infringe Akamai's asserted method claim because Limelight did not perform all steps of the asserted method claims, and because there was no foundation on...more

Direct Infringement Has Its Turn in the Limelight

Akamai’s Return to the Federal Circuit - In the latest round of the long-running saga of Akamai Technologies, Inc. v. Limelight Networks, Inc., a Federal Circuit panel on Wednesday reiterated that there is no direct...more

Allegations of Purposeful Data Withholding Do Not Trigger Cyber E&O Coverage

In Travelers Property Casualty Co. of America v. Federal Recovery Servs., Inc., Case No. 2:14-CV-170 TS (D. Utah May 11, 2015), the United States District Court for the District of Utah held that where a cyber liability...more

Tinker, Tailor, Who’s the Spy? How to Safeguard Your Company From the Insider Hack

The headlines are full of data breach attacks — millions of credit card numbers stolen, healthcare information hacked — all of it feeding the thriving cyber-crime economy. More often than not, the bad actors lurk outside the...more

CMS Fines Insurer for Misleading Medicare Part D Beneficiaries

The federal agency that oversees Medicare’s prescription drug program has alleged that a major U.S. insurance company misled beneficiaries about the pharmacies included in the company’s drug plan, and imposed a $1 million...more

277 Results
|
View per page
Page: of 12

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×