Features
It's a Licensee Eats Licensee World
These days, it is commonplace for companies to license multiple parties in various distinct geographical areas to use the same trademark. Because different licensees may be competitors of one another in different product lines, the question often arises as to whether one licensee may challenge another's right to use a licensed mark and, if so, where.
Features
Changes Recommended to Australian Franchising Legislation
The change of federal government in Australia on Sept. 7, 2013 has created some uncertainty in relation to the changes to the Franchising Code of Conduct that were expected to result from a recent comprehensive review of the Code.
Features
Slew of Privacy Bills Will Keep CA Lawyers Busy
When California lawmakers sent a host of online privacy bills to the governor in the final weeks of the session, consumer groups generally reacted with a "ho-hum."
Features
The 'Friendly Fraud' Chargeback
The abuse of the chargeback option has resulted in a "friendly fraud" epidemic harming not only merchants, but the very consumers the programs were designed to help.
Features
New Developments In Social Media Discovery In Employment Cases
As social media websites have become increasingly popular, courts have continued to address the legal issues raised by social media, particularly in the area of discovery. This article focuses on recent developments in the discovery of social media content in employment discrimination cases.
Features
<i>Inter Partes</i> Reviews
In September of last year, the America Invents Act introduced a number of powerful tools for challenging the validity of an issued patent at the USPTO ' Inter Partes Review (IPR), Covered Business Method Review (CBMR), and Post-Grant Review (PGR). By a large margin, however, the most popular of these procedures has been the IPR.
Features
Legal Battle Plans
Cyber security incidents are rising very rapidly. The growing number of serious attacks on essential cyber networks is one of the most serious threats the U.S. faces. One of the critical controls relating to cyber security incidents is the implementation of effective cyber security incident response plans. This article recommends that legal battle plans be developed and maintained as a critical part of your cyber security incident response plans.
Features
Data Encryption And the Law
This article discusses several of the pressing matters within the realm of data encryption, including: the Constitutional concerns that arise when an individual is forced by the government to divulge encrypted data; the recent disclosures in the press of government involvement with encrypted data; and the current global legal climate in which these issues are situated.
Features
Federal Courts Continue to Decide California Anti-SLAPP Motions, Despite Criticism
Ninth Circuit federal appeals court Chief Judge Alex Kozinski recently questioned whether federal courts should hear motions to strike under California's "ant-SLAPP" statute. He wrote that the state statute "cuts an ugly gash through" the "integrated program of pre-trial, trial and post-trial procedures" set out in the Federal Rules of Civil Procedure.
Features
ICANN's Trademark Clearinghouse Sees Slow Initial Take-up
Later this year, the Internet is set to undergo a series of new and drastic changes with the first rollout of hundreds of new generic Top Level Domains (gTLDs). However, there is still a significant lack of participation from many top businesses that have yet to register and, as a result, are at greater risk of intellectual property infringement and potentially putting consumers at risk as well.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- "Holy Fair Use, Batman": Copyright, Fair Use and the Dark KnightThe copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.Read More ›