This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
By: Sharon Urias, Esq. Coach, the luxury handbag manufacturer, began Operation Turnlock in 2009, an anti-counterfeiting campaign. Since the inception of Operation Turnlock, Coach has had success and received monetary awards against the knock-off artists who have been selling counterfeit Coach handbags. Just in July of this year, a mother and daughter team of counterfeiters were hit with a $44 million judgment, and their operation was shut down by a Manhattan judge for trademark infringement.
Colleges and universities, however, have a major trump card to play to reduce the costs of higher education: they can reverse their longstanding custom against claiming work made for hire status. Instead, they could claim copyright ownership in scholarship as a way to avoid the scholarly publications crisis, and at once, justify this policy change as a way to cut the costs of education.
By: Sharon Urias, Esq. On November 27, the U.S. Immigration and Customs Enforcement (ICE) seized 132 counterfeit websites in its ‘Cyber Monday’ crackdown. Sites that were seized included those that sold clothing, jewelry, sporting goods, DVD’s, music, software and luxury goods. The Examiner reports this is the third year that ICE and European countries have worked together on ‘Cyber Monday’ to shut down websites that sell counterfeit goods to consumers.
By: Sharon Urias, Esq. There has been a trademark battle raging for more than a year-and-a-half over the term “App Store.” When some consumers hear the term, they think of Apple’s iTunes section for apps; however, when others hear the term, they see it as a more generic term for application store. Apple filed a trademark lawsuit against Amazon over the “App Store” term claiming they have excusive rights to the term.
Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?
We organize all of the trending information in your field so you don't have to. Join 9,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content