Remove Confidentiality Remove Designs Remove Due Diligence Remove Information
article thumbnail

Infographic | Privacy enhancing technologies

Olartemoure Blog

Privacy-enhancing technologies are tools and techniques designed to protect users’ personal data and privacy by enabling the analysis and sharing of insights within data, without sharing the data itself. They allow people’s data to be extracted, but not to be tracked back to them, which increases the security of personal information.

Privacy 59
article thumbnail

Methods of Commercializing Intellectual Property – Part I

Intepat

The various forms of intellectual property are already well known- trademarks, patents, copyrights, industrial designs, trade secrets, domain names and geographical indications. Things to Keep in Mind Maintaining Secrecy – Only inventions and designs which are not previously disclosed can be registered for patents and industrial designs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Synergy Between Ipr And E-Commerce Platforms

IIPRD

Musical Arts, designs, pictures, software, material, and many other sorts of Intellectual Property can be transferred using an e-commerce platform in the digital age. However, it is challenging for legal systems to adjust to the needs of the contemporary information era. IP assets make up the vast majority of the corporate resources.

article thumbnail

Make Sure Your Vendor Cybersecurity Policies And Procedures Are Up To Snuff

GDB Firm Blog

You must have written policies and procedures designed to protect against cybersecurity risks posed by your vendors. You must cover both risks to your systems (disabling your network by inserting crypto-locker malware) and risks of the release of confidential information (vendors with customer data who let that data out onto the dark web).

article thumbnail

How to Protect Software as Intellectual Property

LexBlog IP

Trade Secrets for Discrete Information. Trademark protection can include a product or company’s name, a design, logo, color scheme, and identifying factors such as a unique sound played within an application (think of AOL’s famous “YOU’VE GOT MAIL”). Trade Secrets for Discrete Information.

article thumbnail

Fatal Mistakes Made By The ‘Bored Ape Yacht Club’ & ‘Crypto Punks’ NFT Projects

Traverse Legal Blog

A trademark can be any word or phrase symbol design combination of things that identifies your goods and services in the marketplace. Due diligence is critical. Obtain non-disclosure and non-compete agreements from all contractors, employees, partners, and investors before sharing confidential information.

article thumbnail

What is Blockchain Technology and has it been Patented?

Biswajit Sarkar Copyright Blog

It is basically an open ledge comprising of information that is used to track and store transactions and can also be verified and exchanged on a peer-to-peer network. The ledger consists of unalterable digitally recorded information in packages called blocks. An opt-in scheme could address the confidentiality concerns of IP owners.