Earlier this year on this page, we mentioned that the massive Target data breach and the regulatory response to it warranted prompt action to avoid similar situations. Now, the very recent federal court decision against Wyndham Hotels raises the stakes even more as it illustrates the need for all clients to promptly address their exposure to data breaches.
QUESTION: “Our manufacturing company is thinking of lending money for six months to one of our key suppliers so that they can stay in business. What kind of paperwork do we need to ensure that we get paid back when we are supposed to?” ANSWER: No documentation can ensure their ability to repay. You need […]
ATLANTA, March 28, 2014 – FisherBroyles LLP (FisherBroyles) expands its Dallas office and presence across Texas with the addition of Bryan D. Pollard and William J. Akins, both trial and litigation partners. Pollard and Akins both join FisherBroyles from the Dallas office of Wilson Elser Moskowitz Edelman & Dicker LLP.
In this issue, we emphasize information security, which has taken on new importance for all businesses in the wake of the Target episode. However, we also have significant discussion of other IP topics such as innovative trademark licensing strategy, implications for practice in the US Patent Office of the US Supreme Court decision in the Myriad and Prometheus gene and medical patent cases and significance of remedies analysis in IP contracting and disputes.
Most entrepreneurs and business executives understand the value of a powerful name for a new product or service. On one hand, it’s natural to want the name to convey to the purchasing public something about the product or service for which it stands. Therein lies the problem…
Marty Robins was recently interviewed by Got Invention Radio on the subject of protecting an APP idea.
Both our own practices and external developments illustrate new opportunities for our clients. You need to be aware of developments such as the following and their significance for day-to-day business and financing operations…
The recent massive data breach involving Target is just one the most recent high profile examples of the potential exposures faced by all businesses, regardless of size, in the area of data security breaches. Companies need to be aware of the various steps they should consider to mitigate their risks from both data breaches and the use of information from website visitors.
QUESTION: “Our manufacturing company is thinking of lending money for six months to one of our key suppliers so that they can stay in business. What kind of paperwork do we need to ensure that we get paid back when we are supposed to?”
Season’s Greetings and Happy Holidays! There have been a number of major developments this Fall which may impact your business activities.
In this issue, we focus on:
Proper use and handling of cease and desist letters;
Expansion of the fair use defense to copyright infringement claims;
Patent and trade secret strategy alternatives; and
Options for IP infringement clauses; and,
California’s new Do Not Track – what it means for interactive websites.