Application of the Reverse Doctrine of Equivalents to Amgen v. Hoechst Marion, Inc.
In the previous issue, we discussed the principle of the Reverse Doctrine of Equivalents and provided several illustrations of cases that have addressed the same. In this issue, we apply the principle to the <i>Amgen, Inc. v. Hoechst Marion, Inc.</i> case, wherein the defendants Hoecht Marion and Transkarayotic Therapies (collectively 'TKT') were found liable for infringing several of Amgen's patents. <i>Amgen, Inc. v. Hoechst Marion, Inc.</i>, 126 F. Supp. 2d 69 (D. Mass. 2001). Although the Reverse Doctrine of Equivalents defense was not raised, this article discusses how this doctrine might have relieved TKT of liability.
Features
Net News
Recent developments in Internet law and in the Internet industry.
Features
Proof of Infringement Not Required To Obtain Injunction Under DMCA
The United States District Court for the District of Hawaii recently ruled in favor of Defendant Motion Picture Association of America (MPAA) and against InternetMovies.com in a case that underscores the broad powers afforded to copyright holders under the Digital Millennium Copyright Act (DMCA).
Features
PA Law Covers Just the Fax, Not the E-Mail
Federal law that prohibits sending unsolicited advertisements to fax machines does not affect unsolicited commercial e-mail, the Pennsylvania Superior Court has ruled.
Features
FTC Struggles To Gain Ground In War On Spam
Get rich suing spammers or your money back! If offers like that get your goat, you are not alone. Angry consumers forward about 130,000 spam messages to the Federal Trade Commission every day, Chairman Timothy Muris said at the FTC's first Spam Forum. As recently as 2001, the average was just 10,000 per day, he said. The FTC has stepped up its enforcement efforts in the past year. For instance, it announced the fourth in a series of joint federal-state sweeps directed at Internet fraud, including deceptive spam. But there is widespread agreement among experts that existing legal tools are insufficient for the task.
'Effects Test' for Jurisdiction Gets Another Nod
In its first case on Internet jurisdiction, the North Dakota Supreme Court has affirmed a $3 million libel award to a university professor who was defamed on a student's Web site.
Features
Are You Breaking the Law?
Internet law has developed in lock step with the Internet, and both interpenetrate every aspect of a company-employee relationship. From how to handle employee data to accommodating disabled Internet users to preventing security breaches that an employee's juvenile family members might cause from a computer in the home that is also used for work purposes, numerous new legal difficulties await the unprepared human resource professional. This is the first of a two-part article detailing the top 10 things companies need to know about Internet law.
Features
CASE BRIEFS
Highlights of the latest insurance cases from around the country.
Features
Hacker Attack: Data Loss Considered Covered Property Under First-Party Policy
The U.S. Court of Appeals for the 4th Circuit has recently weighed in on the applicability of standard-form, first-party property policies to the loss of computer data, finding such data loss resulting from a hacker attack by a former employee of the insured to be covered property damage. <i>NMS Services, Inc. v. The Hartford,</i> No. 01-2491, 2003 WL 1904413 (4th Cir., April 21, 2003)
Features
Insurance Company Insolvencies: A Primer for Corporate Policy Holders
The past several years have seen some major property-casualty insurance companies on the ropes and worse, far worse. Home Indemnity Company and Legion Insurance Company, two notable insolvency casualties, have left their policyholders without the full protection paid for and required. Sadly, they pale in comparison to the train wreck that is Reliance Insurance Company. The demise of Reliance has had repercussions for insurance buyers and others all over. Once a fixture in the directors' and officers' ('D&O') liability insurance marketplace, among other insurance markets, Reliance is now well underway in the liquidation process, after a brief and unsuccessful attempt at 'rehabilitation.' The Reliance debacle has left policyholders scrambling to protect themselves while state insurance departments wrangle with one another in an attempt to snap up a share of the inadequate pool of assets left behind in the collapse of Reliance.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- <b><i>Online Extra</b></i><br> Law Firms, Legal Departments Predicted to Focus More on IT RiskOverall global spending in the information security services and products sector will total $86.4 billion this year, an increase of 7% over last year.Read More ›