The ACLU discovered court documents detailing the amount of information ICE obtained from one suspect’s cell phone. Read for additional information on how smartphones help law enforcement.
Read MoreIn an opinion issued by the Supreme Court, federal question involving patents is not necessarily enough to divest state court of jurisdiction. Read for additional information regarding this decision.
Read MoreLegislation aimed at combating the high volume of lawsuits brought by patent trolls has been introduced. Read for additional information on the SHIELD Act and its potential repercussions for patent trolls in failed suits.
Read MoreIt is clear that cybersecurity is critical to all governments and business given the world’s dependence on the internet. Read for additional information regarding the improvement of America’s cybersecurity.
Read MoreAs any patent litigator knows by now, the Eastern District of Texas, based in Tyler, is a quite popular district for plaintiffs to file patent lawsuits. Read for more on the most popular place to file patent suits for 2012.
Read MoreArstechnica.com reported about a brazen scheme to plagiarize content from a blog and then use a DMCA takedown notice to remove the real authors' content from their own blog. Read for additional information on the alleged plagiarizer filing DMCA takedown notice.
Read MoreFor many small companies, the costs of fighting – or even settling – a patent lawsuit against a patent troll may quickly erode profits. Read more about patent trolls and IP litigation.
Read MoreRecent trends and notable legal cases so that brand owners can understand how to effectively fight online trademark infringers.
Read MoreIn a previous post, we discussed the rise of online trademark infringement. Read for the continuation of this discussion and solutions for brand owners, specifically those who are victims of online trademark infringement.
Read MoreThis post follows up on the previous conversation regarding online trademark infringement. Read for additional information regarding online trademark infringement and counterfeiting.
Read MoreThe Swartz case was not merely about someone downloading one too many documents. Swartz allegedly had circumvented JSTOR’s identification restrictions to access articles without authorization. Read more about cyber crime laws.
Read MoreVine is also creeping up on some legal issues, given the content posted. Vine has put in place the standard DMCA copyright infringement notification system. Read more about trademark and brand protection.
Read MoreLast Fall, the U.S. Patent and Trademark Office sought comments about a potential amendment to the Lanham Act that would move up the deadline for filing a Declaration of Use or Excusable Nonuse under Sections 8 and 71. Read more about trademarks and the Lanham Act.
Read MoreMuch conversation in recent years has revolved around the level of deceit that can be perpetrated using social media. Read for an example of this very issue, involving a Brazilian website that creates Facebook profiles for fake girlfriends.
Read MoreThe hijacking of your website can damage your brand, undermine your message, and frustrate your audience. Thus, savvy business owners and brand managers must be vigilant about protecting their sites and policing their marks. Read more about technology transactions and brand protection.
Read MoreUnder the Patent Law Treatise Implementation Act of 2012, U.S. companies may now have a new way to protect themselves from knock-offs. Read for more on protecting rounded rectangles and other shapes.
Read MoreIt is apparent from a brief survey of countries around the world that the United States isn’t the only country grappling with the issue of how to police social media. Read for additional information regarding the criminalization of social media posts around the world.
Read MoreThe following discusses various ways in which unscrupulous infringers trade off the trademarks, trade names, and goodwill of trademark owners. Read for additional information on avoiding online trademark infringement and counterfeiting.
Read MoreGlobalization of trade and interconnected nature of supply chains and the rise of overseas markets as a major source of production and economic opportunity are trends that have escalated the risk and prevalence of trade secret theft. Read more about trade secret protection.
Read MoreThe Federal Trade Commission has overhauled regulations aimed at protecting the privacy of children when they are online. Read for more information regarding the new rules released by the FTC to protect children’s online privacy.
Read More