Recently, the U.S. Supreme Court resolved a split between the circuit courts over whether the Copyright Act’s three-year statute of limitations limits the damages a plaintiff may recover to a three-year period. The Court...more
Earlier this month, the U.S. Supreme Court resolved a split between the circuit courts over whether the Copyright Act’s three-year statute of limitations limits the amount of damages a plaintiff may recover to a three-year...more
In a February 2, 2023, article titled “USPTO warns of new spoofing scam targeting trademark owners,” we warned you about a spoofing tactic where scammers were calling trademark owners using “spoofing” to hide their true...more
Cyber criminals love this season because the holidays and year-end processes create perfect opportunities for fraud to thrive. This holiday season, make sure the payments coming in and out of your business get to the right...more
Discussion of artificial intelligence has become ubiquitous, particularly generative artificial intelligence (AI) given its potential to create new content, which some reports estimate could add up to $4.4 trillion annually...more
11/15/2023
/ Artificial Intelligence ,
Biden Administration ,
Copyright Office ,
Defense Production Act ,
Enforcement ,
Executive Orders ,
Federal Trade Commission (FTC) ,
Intellectual Property Protection ,
Machine Learning ,
Patent Ownership ,
USPTO
Stopping overseas trademark infringement is often a challenge due to the time, expense, and difficulty with serving foreign companies with U.S. litigation. A recent decision by the Ninth Circuit Court of Appeals may have made...more
In recent articles and videos, we’ve provided updates on the pending Oklahoma Computer Data Privacy Act, House Bill 1602 (HB 1602), which – if passed – would require that businesses receive a consumer “opt-in” for the...more
In a January 22nd article titled “Oklahoma the latest state to consider consumer data privacy legislation,” we discussed House Bill 1602, a recently proposed bipartisan bill that, if passed, would require certain companies to...more
Currently, Oklahoma does not have any laws in place that govern the collection or use of consumer data. That could change this legislative session.
Two weeks ago, a bipartisan bill co-authored by Rep. Josh West, R-Grove,...more
As of this week, Oklahoma is now one of numerous states where consumer data privacy legislation has been proposed. The Oklahoma Computer Data Privacy Act (OCDPA), House Bill 1602, was filed on January 19, 2021 for review and...more
As the nation continues to fight the ongoing COVID-19 pandemic, many took notice of the December 27, 2020, signing of the Consolidated Appropriations Act, a bipartisan relief and government funding bill passed by Congress...more
In a November 2019 article titled “New year to ring in nation’s most comprehensive privacy law,” we gave an update on the California Consumer Privacy Act (CCPA), the nation’s most robust consumer privacy law that governs the...more
Brand owners may now have a valuable tool at their disposal thanks to an April 23, 2020, decision by the U.S. Supreme Court in Romag Fasteners, Inc. v. Fossil Group, Inc.
Although Section 1117 of the federal Lanham Act...more
4/28/2020
/ § 1125(a) ,
§ 1125(c) ,
Appeals ,
Burden of Proof ,
Charge-Filing Preconditions ,
Compensatory Awards ,
Dilution ,
Lanham Act ,
Lost Profits ,
Remand ,
Remedies ,
Romag Fasteners v Fossil ,
SCOTUS ,
Trademark Infringement ,
Trademark Litigation ,
Trademarks ,
Vacated ,
Willful Infringement
The United States Patent and Trademark Office (USPTO) deadlines for pending applications and other proceedings have NOT been continued or stayed in light of COVID-19.
The USPTO is continuing to conduct business with some...more
COVID-19 is increasingly being used in a variety of malicious email phishing spams and attacks in countries such as the United States, Japan, Russia and China. These updates purport to be from official government agencies and...more
3/26/2020
/ Coronavirus/COVID-19 ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Malware ,
Personally Identifiable Information ,
Phishing Scams ,
Popular
Current events have often been used for malicious IT attacks, and COVID-19 is unfortunately no different. With the recent uptick in coronavirus cases has come an uptick in email spam, ransomware, malicious domains, and other...more
In a June tIPsheet article titled “Privacy Gone Public: How growing push for privacy laws may affect U.S. Businesses,” we gave an update on the California Consumer Privacy Act (CCPA) and some pending amendments that could...more
11/13/2019
/ Amended Legislation ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Use Policies ,
Liability ,
Notice Requirements ,
Opt-Outs ,
Personally Identifiable Information ,
Privacy Laws ,
Private Right of Action ,
Proposed Regulation
The World Wide Web turns a spry 30 years old this year and statistics on its usage are mind-blowing. As of October 2018, more than four billion humans — half of the world’s population — are online. On average, Google...more
6/7/2019
/ California Consumer Privacy Act (CCPA) ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Use Policies ,
General Data Protection Regulation (GDPR) ,
Online Advertisements ,
Opt-Outs ,
Personally Identifiable Information ,
Privacy Laws ,
Terms of Use
Every minute more than 500,000 photos are shared on Snapchat, 4 million users watch a YouTube video, and 456,000 tweets are sent. Yet, more surprising to some is how personal information is used online without a post through...more
Management of electronic health records (EHR) is a complicated yet necessary task in the modern practice of medicine. To reduce the administrative burden of managing EHR records, many physicians and other healthcare...more
2/1/2018
/ Cloud Storage ,
Contract Termination ,
Contract Terms ,
Data Breach ,
EHR ,
Electronic Health Record Incentives ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Software ,
Third-Party Service Provider ,
Training Requirements ,
Vendors ,
Warranties
Just last month, the Federal Communications Commission reversed its 2015 rules that were intended to ban internet service providers from paid prioritization of internet users, content and services.
Originally published in ...more
On April 13, 2015, the Federal Communications Commission (FCC) placed new regulatory rules on internet service providers (ISPs) that were intended to ban paid prioritization of internet users, content and services. Last...more
For the 50 million Americans who are expected to participate in March Madness office pools this year, hope springs eternal … that is, until the official first round tips off and brackets begin busting. But for now, there’s...more
March is upon us, which means spring is near and the sweet smell of tournament brackets will soon fill the air. For many, the month is synonymous with March Madness, the NCAA’s annual tournament that crown’s college...more
Protecting intellectual property — from theft or misappropriation, infringement, or even from potential creditors and judgments — is a chief concern among businesses large and small and can be accomplished in a variety of...more