Sun.Oct 15, 2023

article thumbnail

Canada Gets the Memo: It’s Time to Come to Grips with the AI/Copyright Conundrum

Hugh Stephens Blog

Warning: this blog post has a long opening sentence, so take a deep breath.

Copyright 182
article thumbnail

The Major Pirate IPTV & Free Sports Streaming Sites Labeled “Notorious”

TorrentFreak

Following a request by the Office of the United States Trade Representative for stakeholders to identify so-called ‘notorious markets’ involved in large-scale infringement, submissions are now publicly available. After reporting on submissions by the Motion Picture Association (MPA) ( 1 ) and Recording Industry Association of America (RIAA) ( 2 ) this week, today we present a roundup of three key submissions, all of which target the pirate IPTV / live sports streaming ecosystem.

Reporting 123
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Too square

Likelihood of Confusion

We all understood by now that under Wal-Mart, trade dress that is deemed to be “product packaging” — unlike “product configuration” — “may be inherently distinctive and therefore, registrable, without. The post Too square appeared first on LIKELIHOOD OF CONFUSION™.

article thumbnail

How the U.S. Chamber’s IP Principles Can Reset the IP Debate: A Conversation with Patrick Kilbride

IP Watchdog

Last month, the U.S. Chamber of Commerce’s Global Innovation Policy Center (GIPC) announced that it had joined with 30 other signatories to publish a framework of intellectual property principles designed to reshape the narrative around intellectual property (IP) rights and maintain America’s global lead in innovation. Broadly speaking, the principles focus on five primary goals to be achieved by American lawmakers and policymakers: 1) national security, 2) technological leadership, 3) fostering

IP 80
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Swedish court requests CJEU to clarify notion of ‘author’s own intellectual creation’ when assessing EU originality standard

The IPKat

When assessing whether a work of applied art affords exclusive rights granted through copyright, what factors should be considered? Should the originality requirement focus on factors related to the creative process and the author’s account of the actual choices that they made, or rather factors concerning the work itself and the final result of the creative process?

Art 70
article thumbnail

Reforming the Existing IP Legal Research Methodology- an Insight into the Intersection of Empirical and Socio-Legal Research

SpicyIP

It’s no news that there is a dearth of empirical research in the Indian IP landscape. As explained by Swaraj here , it’s a particularly perplexing situation as when one is able to find some data on a specific issue, there is no certainty that the data is accurate or that the data has come out of rigorous methodology. Exploring the idea of reforming the current IP legal research methodology, we are pleased to bring to you this guest post by Niharika Salar, arguing in favor of “mixed” socio-legal

IP 69
article thumbnail

Mitigating CyberSecurity Risks to your Business [2023] ? Commentary

LexBlog IP

This blog article is the by-product of the refinement of my initial draft responses to a series of interview questions asked by a journalist who was preparing to write an article about steps to safeguard against emerging cybersecurity risks. In a nutshell, this article is being offered to you as commentary to both cyber-protect your business & gain a cyber-competitive advantage.