• CEB Top 20

  • Categories

  • Archives

  • © The Regents of the University of California, 2010-2017. Unauthorized use and/or duplication of this material without express and written permission from this blog’s author and/or owner is strictly prohibited.

The Pros and Cons of IP Licenses

175660493Does your client need to acquire rights to certain intellectual property (IP), e.g., someone else’s invention or copyrighted work? Licensing IP, rather than purchasing, can be advantageous in many circumstances, but there can be drawbacks as well. Before advising a client to enter into an IP license agreement, consider whether it makes sense given the client’s business needs.

Continue reading

Need to Protect Trade Secrets in Litigation? There’s a Privilege for That

Trade secrets are not necessarily outed in litigation. There’s a conditional privilege that protects owners of trade secrets from being forced to spill their secrets. Continue reading

Make These 4 Assumptions about Cybersecurity

158695294It has been clear for some time that cybercrime isn’t an outlier in the spectrum of corporate risk. Yet many organizations have been slow to wake up to that reality, or having awoken, are unsure of what steps to take to manage that risk. Law firms are in the thick of it with nearly half of all firms infected with viruses, spyware, or malware last year. Continue reading

Idea-Expression Dichotomy Remains Key to Copyright Protection of New Technology

464285047Can you state the difference between an idea and the expression of that idea? Don’t worry if it doesn’t slip off your tongue. This distinction is one of the most difficult areas of copyright law but far from academic because copyright law doesn’t protect ideas, but it does protect expressions of ideas. And this distinction remains key to technology copyright cases. Continue reading

Free, Open-Source, and Possibly Risky

177229229Once an exception, the use of free and open-source software (FOSS) in commercial software products has become the rule. FOSS is particularly attractive to resource-strapped companies looking to avoid high software development costs or licensing fees, but even the biggies in the tech industry use FOSS. Despite its common use, FOSS carries risks and you need to do your due diligence.

Continue reading

Employee Poaching

477986347Poaching employees from a rival company has risks. So does agreeing with your rivals not to poach employees from each other. Potential poachers beware… Continue reading

Protecting Company Secrets: Checklist for Making a Plan

186300420If you represent businesses, you know how important it is to protect their trade secrets. A crucial part of that effort is developing and implementing a trade secret protection plan. Specific company needs may vary, and plans have to be crafted with those needs in mind, but some elements should be included in any trade secret protection plan. Continue reading

%d bloggers like this: