News & Analysis as of

Trademarks Hackers

A Trademark is a legally registered distinctive mark or sign which identifies goods, products or services that originate or are associated with a particular person or enterprise . A typical example of a trademark... more +
A Trademark is a legally registered distinctive mark or sign which identifies goods, products or services that originate or are associated with a particular person or enterprise . A typical example of a trademark would be a company's logo such as the Nike "Check" or McDonald's "Golden Arches."  less -
Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights, Volume 2, Issue 16

The T-Mobile Data Breach is One You Can’t Ignore - "Hackers claim to have obtained the data of 100 million people—including sensitive personal information." Why this is important: Earlier this week, reports began...more

Holland & Knight LLP

Religious Institutions Update: November 2017 - Lex Est Sanctio Sancta

Holland & Knight LLP on

Timely Topics - Serious data breaches have become routine in the United States, yet a recent survey shows that the majority of religious institutions do not have a full-time IT professional, have no system to detect a...more

McCarter & English, LLP

1f You Can R3ad Th15 – Security and Scam Alert

You may think there is no value in chasing domain name squatters because customers find your website through search engines, but consider squatters as internal and external security risks. A constantly evolving threat, there...more

Foley Hoag LLP - Trademark, Copyright &...

UDRP Panel Tells Snapchat to Check Itself Regarding Snapchatcheck.com

By now you’ve probably heard of Snapchat. But if you are not among its growing core base of users between 13 and 23 years of age (probably a good deal younger than you, constant reader) there’s a good chance you are not a...more

McDonnell Boehnen Hulbert & Berghoff LLP

Obama Administration Reports on Efforts to Prevent Trade Secret Misappropriation

The Obama Administration issued a Report earlier this month, entitled "Administration Strategy on Mitigating the Theft of U.S. Trade Secrets," that sets forth its efforts to prevent trade secret misappropriation. The Report...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide