Trademark Infringement and Sibling Rivalries

Trademark infringements may be common in the business world, but they are as well not unheard of among family members in business who are competing in the same products.  The Southern District Court in Ohio heard a case between siblings which touched on pivotal points regarding trademarks. The court wrestled with the issue of ‘use’…

Details

Cyber Security Events and Lessons of 2015

The process of cyber security is an everyday occurrence in every entity, from government to small and large enterprises.  A handful of events took place in 2015, each shedding a lesson or two going forward.  Counseling clients on requirements always involves sharing best practices, despite them not being a guarantee.  But always the focus is…

Details

Child Privacy and the Apps They Play

Child privacy while playing with apps is something to consider.  The Federal Trade Commission (FTC) has been concerned.  The aspect of how information, that is children’s personal information, is shared with advertisers and the related networks brings to mind the requirements of the Children Online Privacy Protection Act (COPPA). In 2013, the FTC amended the…

Details

Copyright Challenge – Ideas and Expression

Copyright for many individuals appears to be anything they write, express, or present on paper.  By putting content on a book one assumes it’s copyrightable, whether it is text, photos, or drawings.  For a yoga studio in California this was the mindset.  That which they organized together in the form of photos displaying poses was…

Details

How Private is our Privacy

Privacy may not be as private as we would consider, and not much more than what we are capable of to keep private, as long as we live a cyber life.  Take for instance, the wearables that caught the craze throughout 2015 and became a popular item to buy at Christmas and other items that…

Details

Cybercrime Considerations for Cases

There are cybercrime considerations for cases as well as there is a judicial learning curve when it comes to cybercrime and judges  are not alone.  Cybercrime harm cannot be assessed with the mindset of assessing punishment as if it was a physical criminal act without assessing the extenuating consequences of a cyber-criminal act.  In cases…

Details

Cloud Technology Use for a ‘God View’

Uber’s cloud technology use for a ‘God view’ was exciting to experience among its employees.  With every innovative creation there is always the bit of excitement and a bit of dreaming of the capability devoid of cognition for security and for its ramifications.  To insert concepts of security and considerations of ramifications is a downer,…

Details

Cybersecurity Breach Aftermath with FTC

Cybersecurity and cybersecurity breach are difficult topics to discuss with clients because of the unknown variants and for their simple trepidation toward addressing the vulnerabilities and investing the capital for prevention and training.  From internal planning involving establishing a process to addressing external intrusion possibilities they tend to be cumbersome for a company’s administration to…

Details

Digital Copyright Disputes and First Sale Defense

Digital copyright disputes throw around terms such as “sale”, “license”, “first sale”, and “right ownership.”  The distinction of these terms began in 1908 by the Supreme Court determining that a “sale” serves as a defense as opposed to a “license” under a copyright claim.[1]  In a cited case, Bobbs-Merrill, the defendant purchased copies of a…

Details

Free Speech in Trademarks

Free speech in trademarks has been a long existing principle only to be recently circumscribed.  Ideas in naming something personal, such as exercising an expression for a trademark, could otherwise be prohibited if it were not for the constitutional principle of free speech. Imagine starting a company and devising a slogan to register as a…

Details

Digital Economy Fighting Copyright Piracy

Digital economy partnerships drawing close to fight copyright piracy have struck a chord that could have a significant impact to prevent Internet digital media piracy.  The piracy of digital media is an international cottage industry costing billions.  From content creators, ISPs, advertising agencies, network systems, and search engines, to data managers, and e-payment platforms, have…

Details

Advertising Guidelines from FTC

Advertising guidelines from the Federal Trade Commission underscore the deceptive features of ‘native’ advertising.  Prior to Christmas the FTC released its “Enforcement Policy Statement on Deceptively Formatted Advertisements.”  The attention was towards the use of native advertising which is ‘dressed’ or ‘tailored’ to appear as if it is an actual editorial.  The FTC notes the…

Details