The Threat of Evidence Destruction: Strategies to Safeguard and Accelerate Proof of Patent Infringement in the U.S. and China
Part One of this article addressed judicial and other mechanisms in the United States and China that a patentee can utilize to safeguard evidence under an alleged infringer's control. This second installment continues the discussion of safeguarding evidence in China.
Features
Solving an IP Practice Business Need with Patricia
In January 2003, Duane Morris recognized a need to provide a better IP docketing system. The new docketing system needed to be user-friendly and give users the ability to create reports quickly and efficiently. It also needed to provide a flexible solution for incorporating the dockets of lateral hires during the firm's growth cycle and to integrate the firm's nine separate IP docketing databases into a master database. Finally, it was vital that it work well within the firm's existing infrastructure.
Features
Ex Parte Kubin: Board of Patent Appeals and Interferences Applies 'Obvious to Try' in Post-KSR Biotechnology Appeal
For the past 15 years, the PTO has been issuing patents based on its interpretation of Federal Circuit precedent that a previously unknown DNA sequence that encodes a known polypeptide is non-obvious. This precedent, established by the Court of Appeals for the Federal Circuit in <i>In re Bell</i>, and later reaffirmed in <i>In re Deuel</i>, is now being challenged by the Patent Office Board of Patent Appeals and Interferences.
Features
<i>Product Review</i>: BigHand Digital Dictation Improves Workflow
As part of my role as Firm Administrator, productivity lags, as well as bottlenecks and workflow issues concerning flow of information and documents, are all brought to my attention ' sooner or later ' and obviously require swift action. We were faced with a big challenge when we began to rate the efficacy of our existing dictation technology and best practices of delivering dictations.
Features
Practical Advice for European Electronic Discovery Projects
If you are a U.S.-based IT or litigation support professional, have you ever received an e-mail message that ended like this: "And there are three people in the Munich office"? If you have not, you may very well receive such a message within the next few months. This article provides practical advice for European electronic discovery projects for litigation support and IT professionals.
Features
Determining an e-Mail Management Strategy
Legal IT professionals are challenged with finding the most efficient and appropriate e-mail management model while considering the rising cost of e-discovery and ethical issues surrounding e-mail retention. Against this demanding backdrop, firms must determine which of three potential e-mail management strategies to employ: passive, active or a combination of the two.
Case Briefs
Highlights of the latest insurance cases from around the country.
Features
Notice under Occurrence Policies: Issues Beyond the Prejudice Debate
This article reviews key notice issues under occurrence-based policies, underscoring how multi-faceted and complex the questions are that can arise when a notice defense is presented. These questions range from what triggers the notice requirement to what the applicable statutory standards are for a notice defense, and from how theories of constructive notice apply to whether there are circumstances where notice will be excused on the basis of excuse or futility.
Features
Benzene and the Pollution Exclusion
Many see benzene-related cases as the next big thing in toxic tort litigation.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›