Home » Category: 'Blogs' (Page 78)

Blogs

H&M sues Forever 21? Beach Please!

H&M sues Forever 21? Beach Please!

In an interesting twist, arguably the two most common fashion design piracy defendants are pitted against each other. H & M Hennes & Mauritz AB (“H&M”) has issued a complaint against Forever 21, Inc., in the US District Court Southern District of New York. Below is a comparative image of the tote bags at issue:

Means for Invalidating a Patent: Lessons from the Eon Corp v. AT&T Decision

Means for Invalidating a Patent: Lessons from the Eon Corp v. AT&T Decision

This article is cross-posted with permission from Bereskin & Parr. It is very important to provide adequate disclosure when using “means-plus-function” claims in a U.S. patent, particularly in the field of software. “Means-plus-function” claims include elements that are defined in a functional (as opposed to structural) manner, such as “means for tying a shoe”, and […]

How Authors Can Get Their Rights Back

How Authors Can Get Their Rights Back

The commercial lives of the overwhelming majority of books are remarkably short, particularly when you compare the commercial lives of books to the very long duration of copyright terms. When books are no longer making money for either the publisher or the author, or revenues have slowed to a trickle, authors who signed away their […]

U.S. Automakers Take the Wheel on Cybersecurity – But Can Canadian Manufacturers Hitch a Ride?

U.S. Automakers Take the Wheel on Cybersecurity – But Can Canadian Manufacturers Hitch a Ride?

The re-posting of this article is part of a cross-posting agreement with CyberLex. This summer, U.S. automakers pledged to ramp up motor vehicle cyber protection measures by launching a new centre for cybersecurity intelligence and analysis. This initiative, dubbed the Auto Information Sharing and Analysis Centre (Auto ISAC, one of a number of industry ISACs […]

Reporters’ Privilege: Comparative Perspectives and New Technologies Challenges

Reporters’ Privilege: Comparative Perspectives and New Technologies Challenges

The re-posting of this analysis is part of a cross-posting collaboration with MediaLaws: Law and Policy of the Media in a Comparative Perspective. The reporter’s privilege of protecting the identity of his sources, takes origin from the need to preserve the bases of a democratic society. Protection of journalistic sources is strictly connected with a […]

Lawyer or Librarian? Who Will Answer Your Copyright Question?

Lawyer or Librarian? Who Will Answer Your Copyright Question?

The full version of Lesley Ellen Harris' article is available in the upcoming issue of the Intellectual Property Journal (IPJ). In most organizations, if you have a legal question you head over to the legal department. When someone has a copyright question, however, they often head over to the library or information centre to discuss […]

How to Discipline Cyber-Snooping Employees

How to Discipline Cyber-Snooping Employees

The re-posting of this article is part of a cross-posting agreement with CyberLex. In a digitized world, it can be all too easy for unauthorized employees to access confidential information in the workplace, as recent breaches at the Saskatchewan Cancer Agency and some Ontario hospitals have shown. Employers should be prepared to take appropriate disciplinary […]