Trademark Nominative Fair Use and Confusion

Trademark use and the element of fair use in business snags many businesses trying to market their service or product, while seemingly using a competitor’s trademark. Liability may not be avoided by relying on the fair use defense.  Words and their message are usually held to a standard regarding the possibility of consumer confusion.  There…

Details

Trademark Misrepresentation in Advertising

Trademark misrepresentation rather than respecting the appearance of a marks brand through advertising runs the risk of using creative naming.  Courts will look at advertising’s subjective effect on consumers.  The query for concern is to determine if the advertising seeks for the consumer to make the association with an existing unrelated brand of a product. …

Details

Website Safe Harbor Copyright Notice Designation

Website safe harbor takedown requirements by the Copyright Office is soon to undergo changes.  According to the Copyright Office, it is the responsibility of a website owner or online service entity to make it easy for a copyright holder to contact the website regarding the possibility of content infringement.  The agent designation requirement[1] process form,…

Details

Internet Security – Passwords’ Way into a Life

Internet account security and weak passwords are all too common when causes to cyber incidents are investigated.  The ease of use of one’s birthdate, anniversary, and the incredibly savvy use of ‘admin’ or ‘password’, not to mention ‘12345,’ has gotten many in a serious predicament.  Not following through on login processes and seeking shortcuts has…

Details

Online Contracts Consent and Choice of Law

Online contracts trip the line that draws on possible arguments for applying the choice of law principles.  Platform terms of service, though frequently updated, may not be providing appropriate notice to inform the public user.  Data collection practices of social media platforms for purposes of claimed efforts to provide enhanced services to the user public…

Details

Internet, Internet of Things and Cyber Threats

Internet of Things or “IoT,’ as commonly referred to, have proliferated our culture and will continue as they acquire growing attention with functionality and ease.  Their attraction is in their usefulness engendering efficiency, productivity, and an expectation of enhancing one’s fitness and along with self-awareness. The idea of IoT has brought the attention of platform…

Details

Trade Secrets Extraordinary Provisions

Trade secrets are going to be dealt differently now that the President has signed into law the new Defend Trade Secrets Act (DTSA).  Through the bipartisan efforts of Sen. Orrin Hatch, R-Utah, and Sen. Choons, D-Del., DTSA is meeting the desired measure that has long been sought by businesses to address the delicate nature of…

Details

Internet Technology and Employer Internet of Things

Internet technology and the internet of things pervasive expansion in our everyday lives has become a crazy, a thing to do, and something to use by employers.  The risks of privacy are overlooked as well as liabilities when an employer goes too far.  The application of technological uses to keep track of employees, staying in…

Details

Copyright Protection Standard for Clothing

Copyright protection standard for clothing articulated as conceptual separability will now be entertained by the U.S. Supreme Court amid the background of disparate circuit court views.  Copyright protection applies to the features pertaining to design, of say, articles, and pictures.  The garment sector items fall into the dichotomy of use or utility, as the design…

Details

Data Security and the Internal and External Cyber – Insecurity

Data security and the insecurity of electronically stored information (ESI) is ephemeral and any anticipation of its occurrence or origin is absolutely unpredictable.  All attention is always on the external incidents but little is focused on the internally sourced infraction.  Seldom do entities envision the internally sourced incident.  The risk from internal unauthorized access to…

Details

Social Media Self-Modification

Self-Modification by social media platforms has struggled to ensure that the Internet is acceptable to all cultures, religions, political persuasion, and to all values of countries.  This exercise in Internet Governance is tall and detailed and comes under criticism for being too heavy handed towards exercising censorship.  Though easy to say, it becomes difficult to…

Details