Sat.Aug 15, 2020 - Fri.Aug 21, 2020

article thumbnail

A guide to USPTO trademark acronyms

Erik K Pelton

The following is a podcast transcript; you can listen to the Tricks of the Trade(mark) episode here. The world of trademarks is full of acronyms and when I prepared for this and wrote down a list, I really couldn’t believe how many trademark world acronyms there are in dealing with the USPTO and protecting clients’ trademarks. I’m not going to have time to explain what each one is or what it means or what it does.

Trademark 130
article thumbnail

Is Street Photography Legal?

Art Law Journal

Steve Schlackman. Are street photographers protected when taking photos of strangers in public or are they invading the subject's right to privacy?

Privacy 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is Attribution Needed When Using Public Domain Materials?

Dear Rich IP Blog

Dear Rich: I have just finished writing a fantasy novel. I have used public domain quotes within the novel (from Aristotle, Lincoln, etc.), but because the world of the novel is not Earth, I claim the quotes are from some nonexistent book that fits in the novel's world. Is this hinky? Your suggested use is not hinky. According to the Supreme Court , there is no legal requirement to provide attribution when public domain works are copied and placed into new works.

article thumbnail

License/Access Agreements and Professional Fees

GDB Firm Blog

Building owners situated next door to a construction site should no longer assume that a license/access agreement will automatically entitle it to reimbursement of attorneys' or engineering fees.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Trademark protection for words versus logos

Erik K Pelton

The following is an edited transcript of my video, Protecting Words vs. Logos. One of the most popular questions I get asked among new or prospective clients is about filing at the US Patent and Trademark Office (USPTO) for a word versus a logo. It is only natural that many people think if the logo encompasses the words, they could save money and just protect the logo with one firing and that would encompass the words.

Trademark 130
article thumbnail

Sheltering a Brand Through the Storm

Erik K Pelton

With apologies to the wonderful Bob Dylan song, Shelter from the Storm, there are four key tools to help a brand weather the tempest, while waiting for the rainbow to emerge after the storm: core values: revisit and reflect them. adapt as needed: make changes, whether temporary or long-term, to adjust. clear communications: be honest and forthcoming. protect customers and employee: put people before profit, to ensure long term trust.

Branding 130