Who’s in Charge of What We’re Doing Online? Section 230 of the Communications Decency Act is a little-known statutory provision that is far more powerful and important than most casual internet users realize. Section 230, as its commonly known, is part of the Communications Decency Act of 1996, a law passed before the internet functioned […]
The Federal Circuit just ruled that the “scandalous” clause of the Lanham Act is unconstitutional in view of the Supreme Court decision in Matal v. Tam. The Lanham Act is also known as the Trademark Act. Recapping The Slants’ Fight for Trademarkability in Matal v. Tam As a refresher, Matal v. Tam involved the Asian-American […]
Acceptable Trademark Disparagement… or Disparagement at all? People try to trademark all types of names, brands and slogans. The U.S. government, however, acts as the gatekeeper applying trademark law to decide whether or not those names or brands are worthy of protection or if they constitute trademark disparagement. One of the most newsworthy parts of […]
On May 22, 2017, the Supreme Court issued a decision in TC Heartland v. Kraft Foods Group Brands. Now, it is much harder for “patent trolls” to file their cases in the Eastern District of Texas.What Are “Patent Trolls?” Why Marshall, TX?A patent troll is a derogatory term for a company that obtains the rights […]
Your business’ trademark is a valuable asset. Protecting that asset is a practice in which every business owner should invest—the security of your business, its intellectual property rights and its reputation are at stake.
Like most things, the so-called Intellectual Property clause isn’t as clear as we’d like. Experts often refer to this clause as the patent and copyright clause, because “science and useful arts” refer only to patented and copyrighted creations.
Intellectual property and cybersecurity affect our lives more than most people are aware. Learning the basics of both provides a unique perspective on just how much both topics influence the world around us and help color the decisions we make — from business decisions to financial decisions to the use of technology in our personal lives. This column hopes to teach readers the basics of intellectual property and cybersecurity through real world examples.