Features
Nine Key Steps In a Proactive Cybersecurity Review
Securing your company's network and protecting your valuable data is difficult enough in today's Internet-driven economy. But to be treated by regulators and courts like an accessory to the crime after you've been hacked is truly adding insult to injury.
Features
SEC Takes First Significant Steps Toward Crowdfunding
Recently finalized rulemaking by the SEC to implement the Jumpstart Our Business Startups Act allows issuers of securities to engage in general solicitation and advertising to accredited investors in some private placement offerings of securities. Although the SEC's announcement leaves several notable questions unanswered, Rule 506(c) has the potential to enhance the utility of investment programs in the franchise world.
Features
Bloggers Want Same Rights as Mass Media
Bloggers, claiming that no distinction exists between blogs and traditional media, are seeking protection afforded by the First Amendment rights previously reserved for traditional media outlets. However, most courts do not afford bloggers the same rights given to traditional media.
Features
FTC Expanding Its Role in 'Internet of Things' Security
The FTC continued to expand its reach into cybersecurity last month when it took legal action against TRENDnet, which markets Web-connected home security cameras that allowed hundreds of live video feeds to be hacked and posted online.
Features
e-Discovery Platforms Are Not All the Same
The value of e-discovery technology varies, depending on a number of factors, including the provider that is hosting the data, the quality of technical support and the nature of the matter at hand. For that reason, there is no single one-size-fits-all platform.
Features
Accidental Access, 'Catfishing' and Unsecured Wi-Fi
The increasing use of Web browsing and other user data has stirred some users to reconsider the unspoken "bargain" that exists on social media and other interactive websites, namely, that privacy sacrifices in the form of targeted marketing and data collection subsidize free content and services and promote a robust online ecosystem. However, beyond the larger debate over digital privacy, new practices and technologies have emerged that do not neatly fit within the boundaries of existing privacy laws.
Features
ICANN's Trademark Clearinghouse Sees Slow Initial Take-Up
Later this year, the Internet is set to undergo a series of new and drastic changes with the first rollout of hundreds of new generic Top Level Domains (gTLDs). However, there is still a significant lack of participation from many top businesses that have yet to register and, as a result, are at greater risk of intellectual property infringement and potentially putting consumers at risk as well.
Features
Recent Issues in Cybersquatting Disputes
There are several pressing issues within the realm of cybersquatting, including: recent heightened scrutiny applied by courts to cybersquatters and the operators who host their domains; the various methods by which companies attempt to combat the problem; and whether cybersquatting will become a substantial problem on newer platforms, such as social networking sites and on the forthcoming new gTLDs.
Features
Why Not Throw in the Design of the Kitchen Sink?
When it comes to seeking patent protection for a new product, companies are often faced with a dilemma: delay patent filings until the product has proven commercial value, or gamble substantial resources trying to create a portfolio of utility and design patents for a product that may not be successful?
Features
<b><i>BREAKING NEWS</b></i>New Jersey Must Allow Gay Marriage, Judge Rules
A New Jersey judge ruled on Sept. 27 that the state must allow same-sex couples to marry, since failing to do so would deprive them of rights that now are guaranteed by the federal government, according to a report in <i>The New York Times</i>.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Clause & EffectNet-Profit Rights/Movies Based on TV Shows<br>Insurance/Contract-Breach Exclusion<br>Insurance/Copyright-Infringement CoverageRead More ›
- Rights and Obligations In Patent LicensesThe owner of a commercially successful patent may have competing desires. On one hand, the patent owner wants to protect the patent and secure its maximum benefit; on the other hand, the patent owner wants to avoid enforcement litigation with competitors because it is expensive and puts the patent at risk.Read More ›
- Foreseeability as a Bar to Proof of Patent InfringementThe doctrine of equivalents is a rule of equity adopted more than 150 years ago by the U.S. Supreme Court. Prosecution history estoppel is a rule of equity that controls access to the doctrine. In May 2002, the Court was called upon to revisit the doctrine and the estoppel rule in <i>Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co. Ltd.</i> Ultimately the Court reaffirmed the doctrine and expanded the estoppel rule, but not without inciting heated debate over the Court's rationale — especially since it included a new and controversial foreseeability test in its analysis for estoppel.Read More ›