Podcast: How Delaying Third Party Discovery Can End Up Costing You Dearly
Software Escrow: An enterprise resiliency tool every legal department should have in their toolbox (with Don Dennis Jr.)
IP|Trend: Discovering Source Code
What happens when the clock runs out on critical evidence in a high-stakes patent infringement case? Join me, Kelly Twigger, as we unravel the intricate layers of electronic discovery through the compelling Beacon Navigation...more
In Fiskars Finland OY AB v. Woodland Tools Inc., 2024 WL 2504717 (W.D. Wisc. May 24, 2024), plaintiff sued for alleged misappropriation of trade secrets. Defendants counterclaimed....more
The US Court of Appeals for the Fifth Circuit granted a writ of mandamus ordering the transfer of a case, finding that the district court’s denial of the motion to transfer “was so patently erroneous” that the extreme measure...more
In a recent Order, ALJ McNamara clarified that while diagrams drawn by an expert depicting the interplay and hierarchy of relevant code modules, inputs, and outputs of source code are to be treated as confidential business...more
Armstrong Pump, Inc. v. Hartman, No. 10-CV-446S, 2016 WL 7208753 (W.D.N.Y. Dec. 13, 2016) - In this case, pending before the Court was a motion by Armstrong Pump Inc. (“Armstrong”) to compel formal production of certain...more
Source code is increasingly becoming prevalent in litigation. Patent cases, copyright, trade secret, and even mass tort cases can turn on the content and function of source code. Attorneys Seth Northrop and David Prange...more