Sat.Sep 21, 2024

article thumbnail

X Loses Battle to Protect Genshin Impact Leaker’s First Amendment Anonymity

TorrentFreak

In November 2023, the publisher of hit videogame Genshin Impact obtained a DMCA subpoena at a California district court to unmask an anonymous alleged infringer. Cognosphere’s aim was to compel X/Twitter to “disclose the identity, including the name(s), address(es), telephone number(s), and e-mail addresses(es)” of an individual in control of four ‘X’ accounts: @HutaoLoverGI, @GIHutaoLover, @HutaoLover77, and @FurinaaLover.

Artwork 115
article thumbnail

What’s your poison? Copyright infringement.

Likelihood of Confusion

Originally posted 2013-10-15 11:38:13. Republished by Blog Post PromoterYou’ve heard the tale in one form or another: A bar plays a recorded song over its sound system (without permission), then gets sued for violating the public performance right of the musical composition’s copyright holder. But it’s just an urban legend, right? Wrong. It happens.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Deciding Product by Process: The Dilemma lingers on

SpicyIP

Image from here The Calcutta HC in West Bengal Chemical Industries Limited v. M/s. GTZ (India) Pvt. Ltd. , decided on 25 June, refused to grant injunction relief to the Patentee since it could not make out a prima facie case and did not satisfy the balance of convenience. Besides from being short on reasoning (only 3.5 page devoted to analysis out of 23 pages), I argue that the Court fails to distinguish between product, process and product by process patent.

article thumbnail

Sunday Surprises

The IPKat

The IPKat proudly presents the Kat news of the past week. WIPO Classification Helpdesk Having trouble with correctly classifying your goods and services in your trade mark application? Despair not! Contact WIPO’s new Classification Helpdesk instead. WIPO promises a rapid response, expert guidance and comprehensive support to get your trade mark application off to a good start.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Release Me: Interview Consents and Multiple Uses

Dear Rich IP Blog

Dear Rich: If a reporter has consent to interview someone, can that reporter also play that recording during an interview on air? The reporter can probably play the interview on air, but the answer depends on several factors. Consent: Oral, implied, or written. A consent to interview (also known as a 'release') is a promise by the interview subject not to sue over various legal claims -- for example, invasion of privacy, defamation, copyright infringement, and emotional distress.

article thumbnail

Revocation of “ICE” EUTM: thousands of pages of evidence do not necessarily establish genuine use

The IPKat

Proving genuine use of a trade mark is not necessarily an easy task. It is essential to exercise a certain degree of rigour when selecting evidence. On this very topic, this Kat has found a recent decision issued by the Board of Appeal (BOA) concerning the EUTM “ICE” belonging to Gilmar S.P.A. , an Italian Group best known for its fashion brand ICEBERG.