Columns & Departments
IP News
Federal Circuit Defines "By Means Of" <br>Doctrine of Claim Differentiation Insufficient to Overcome Plain Meaning of Claim Term<br>Patentee's Failure to Connect the Dots Insufficient, But Not Sanction-Worthy
Columns & Departments
Upcoming Event
TexasBarCLE 24th Annual Entertainment Law Institute
Columns & Departments
Bit Parts
California Right of Publicity Claims Can Be Assigned<br>Invasion of Privacy Suit Against Greenberg Glusker Law Firm Found Time-Barred<br>Whither the Transformative Use Defense in Copyright Infringement Cases?
Features
Patent Reform Is Coming, but Not From Congress
It's well established that the number of lawsuits filed by patent trolls in the last decade has increased dramatically. This increase comes at considerable expense to defendants of all stripes. But as widely reviled as this trend may be among operating companies that often find themselves as defendants in patent troll litigation, legislation that would curb this practice has made little progress.
Columns & Departments
IP News
Federal Circuit Applies <i>Alice</i> to Invalidate Online Transaction Patent <br>Federal Circuit Finds 'Unobtrusive' and 'Does Not Distract' Indefinite<br>Federal Circuit: In Hatch-Waxman, Infringement Based Only on Final ANDA Product
Features
Collecting Social Security Numbers
In the first half of 2014, at least 96 significant data breaches were reported, compromising more than 2.2 million records. Of these breaches, at least 46 involved records that may have contained Social Security Numbers (SSNs). What the affected businesses may not know is that the mere collection of SSNs may have put them in violation of state laws, in addition to the liability they may now face for having failed to protect the SSN information.
Columns & Departments
Court Watch
Franchisor's Control over System Uniformity Insufficient to Show Vicarious Liability <br>Printed Names Without Signatures Satisfy Requirement That Personal Guaranty Be Signed
Features
Social Media Invades and Modernizes Employment Practices
For employers, social media sites present a potential treasure trove of information on applicants, but mining this information for use in recruiting, hiring, firing and monitoring of employees is fraught with risk. Nonetheless, some studies show that 40% of employers search social media during the hiring process. While there are not currently any laws in the United States forbidding employers from gleaning information from social media, improper use can get them into trouble.
Features
Back to School
With schools back in session, now is the time for employers to review hiring, payment and scheduling practices for workers under the age of 18. The myriad federal and state child labor laws that employers must heed range from work permit requirements to the hours and type of work performed, all of which vary based on an employee's age and whether school is in session.
Features
Intercreditor Agreements
This is the fifth article in a series covering various aspects of intercreditor agreements.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›
- What Does 2024 Hold for Cybersecurity?Our annual poll of experts on the trends and developments to watch out for in 2024 in AI, data privacy, cybersecurity, e-discovery and more.Read More ›