An overview of redesigns at the ITC, a discussion of the ITC's recent determination in Certain Audio Players and Controllers, and identifies some considerations to keep in mind when litigating redesigns at the ITC.
- March 01, 2022Frank Liu, Dustin Ferzacca and Gwen Tawresey
Data is the fuel for software development, and developers use historical data from existing products to train algorithms and build AI models. Companies may be well aware of privacy and regulatory restrictions on data use, but often do not consider the potential impact of data use restrictions on intellectual property ownership and use rights.
March 01, 2022Anna RemisFederal Circuit: Applicant Admitted Prior Art Cannot Provide a "Basis" for a Ground of Unpatentability in an IPR, But Can be Cited for Other Purposes Federal Circuit: After SAS, IPR Estoppel Extends to Prior-Art Grounds That Reasonably Could Have Been Raised in the Petition
March 01, 2022Jeff Ginsberg and Ryan J. SheehanData is the fuel for software development, and developers use historical data from existing products to train algorithms and build AI and machine learning models. Companies are well aware of privacy and regulatory restrictions on data use, but often do not consider the potential impact of data use restrictions on intellectual property ownership and use rights.
February 01, 2022Anna RemisThe question has been frequently debated in the legal community: What is the difference between an attorney providing business consulting services or acting as legal counsel? The California Court of Appeal recently issued an opinion on the concern.
February 01, 2022Stan SoocherSome of the major issues the court addressed in the Unicolors oral argument, and some questions that are likely to remain open no matter the outcome.
February 01, 2022Robert W. Clarida and Thomas KjellbergThe murkiness around patent eligibility is one reason innovators have been turning more toward trade secret law to protect their inventions.
February 01, 2022Scott GrahamInternet site legal identity theft is becoming increasingly more sophisticated and common. If successful, a third party can use the theft of a legal identity to secure confidential information, harm marketing brand value, diminish good will and steal customers. Internet sites may employ legal, business, and technological means to protect their legal identities.
February 01, 2022Jonathan BickHow can one launching a new trademark mitigate the risk of rejection or infringement on the basis of likelihood of confusion with an existing mark? The primary strategy is trademark searching.
February 01, 2022Jared A. StarkEvolusion Concepts, Inc. v. HOC Events, Inc. Novartis Pharmaceuticals Corp. v. Accord Healthcare, Inc.
February 01, 2022Howard Shire and Shaleen Patel









