Author archives

PROTECTING YOUR BRANDS FROM PARALLEL IMPORTS

As our economy becomes increasingly globalized, prudent trademark owners will remember that it is their responsibility to maintain control over the distribution channels, as well as the ultimate geographic sale location, of their branded products. Markets around the world are being flooded with “parallel imports” and “gray market” goods – branded goods that are imported …

Company Computer System Usage Etiquette – How to Establish Guidelines for Your Employees

Many employers are finding their companies held liable for an employee’s misuse of a computer system, bringing the company negative publicity and in some instances, subjecting it to civil or criminal liability.  Therefore, it is important that employers take a proactive approach in setting guidelines governing their employees’ Internet and e-mail usage. 

But I Paid For It – Securing Copyright Ownership In Works Created By Your Independent Contractors

Individuals and businesses in all industries routinely hire consultants to create materials for them.  Examples of materials often outsourced include websites, custom software, brochures, manuals and product literature.  Most purchasers of these items assume that they own all rights to them as soon as they pay for them.  Actually, often times they do not. 

Trademark Owners and Applicants Beware – Overstating the Goods and Services of Your Mark Can Result in Cancellation of the Registration

The Trademark Trial and Appeal Board (“TTAB”) of the United States Patent and Trademark Office (“USPTO”) recently adopted a new standard for trademark applications that can have disastrous consequences for trademark owners. To understand the significance of the new standard, one must first understand the nature of trademark rights.

“Authorization” and “Transmission” — Interpretations of the Computer Fraud and Abuse Act

While initially conceived in 1984 to punish hackers and safe guard classified financial and credit information relating to government and financial institutions, the Computer Fraud and Abuse Act (the “CFAA”) has evolved over the past two decades to reflect emerging technology in the areas it was created to protect. Specifically, the CFAA affords employers civil …

Computer Disaster Recovery Services – What You Need to Know to Protect Your Business in the Event of a Disaster

The tragic events of 9/11 and Hurricane Katrina were not only horrific human tragedies, but also served as warnings to businesses to revisit their own disaster recovery plans.  According to published reports, in many instances the difference between those companies forced to close their doors, and those able to continue doing business, was well planned …