Remove Business Remove Confidentiality Remove Copying Remove Litigation
article thumbnail

Minnesota’s Attempt to Copy California’s Constitutionally Defective Age Appropriate Design Code is an Utter Fail (Guest Blog Post)

Technology & Marketing Law Blog

Bill Requirements Identical to the California AADC, the bill applies to a “business that provides an online service, product, or feature likely to be accessed by a child.” The bill describes the following obligations for in-scope businesses: Data Protection Impact Assessments. Child” is defined as any user under 18.

Copying 127
article thumbnail

NDA: An Effective Way to Protect Confidential Information

LexBlog IP

Shi then left Elation to start a business marketing “similar, if not identical software” using replicated source code. A settlement agreement was reached where Elation could inspect the software developed by Shi and prevent the use of any trade secrets or confidential information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Intellectual Property Strategies for Development of AI in China

IP Tech Blog

Navigating these challenges in the proper way will be key to the selection of the appropriate business model for the exploitation and commercialization of the algorithms (e.g. licensing, assignment, JVs, cooperation and co-development etc.) But rights holders must be prepared.

article thumbnail

The Effect on Trade Secret Protection by the Federal Trade Commission’s Proposed Ban on Non-Compete Agreements

LexBlog IP

However, this proposal has raised concerns about how it may affect businesses and their ability to protect trade secrets. This employment restriction for former workers is used to prevent the former workers from using the business’s trade secrets, such as proprietary technology and customer lists, to benefit a competitor.

article thumbnail

Is the NLRB’s New Stance on Restrictive Covenants Mostly Bark With a Little Bite?

Trading Secrets

We also noted that this theory could wreak havoc on routine employee departure litigation by creating a turf war between the court system and the NLRB. Non-Compete/Non-Solicit Restriction The employee’s agreement included a combination non-solicit/non-acceptance of business covenant. Let’s go through the analysis for each provision.

article thumbnail

MarkMonitor Wants to Keep Court Transcript Away From “Pro-Piracy” Forces

TorrentFreak

“The transcript contains information and reference to MarkMonitor’s source code that is private, proprietary, confidential and commercially sensitive trade secret information regarding its antipiracy detection system,” MarkMonitor writes. It discusses proprietary code and includes evidence of a dispute between businesses.

article thumbnail

Mr Justice Zacaroli finds manufacturing software copyright infringed and confidence breached in ex-employee fight

The IPKat

When one hears the claims of copyright infringement, confidential information and employment claims one can readily assume that this is an employer/ex-employee dispute. US proceedings were filed by PQ against CyberMetrics in October 2017, Mr Aughton was deposed in October 2021 and the proceedings then settled on confidential terms.