Avoid conflicts over intellectual property As I continue my research on intellectual property law developments in 2008, I came across an interesting (and sad) case that stimulated ideas that may be useful for both consultants and clients working together on ... Trademarks as keywords for targeted ads? I've been doing research for my annual review of intellectual property law and have had a great deal of fun learning about all sorts of interesting new developments. Here's a case that might interest readers who work in commercial organizations with valuable trademarks but that raises unexpected questions about freedom of speech. Abiding by the law: Blueport vs. U.S. I've been preparing my annual review of intellectual property law developments for my friend and colleague Prof. Tom Peltier's Peltier Effect (see the 2007 edition for a sample), and I ran across a startling case of the U.S. government's assertion of the doctrine of sovereign immunity. Swiss mix: Useful copyright resource I was updating one of my lectures on copyright law recently and ran across a useful site from the government of Switzerland's Federal Institute of Intellectual Property. The site, available in German, French, Italian, and English versions, has some stimulating materials about intellectual property that may be useful to readers involved in security-awareness campaigns. Some readers may also want to pass on the information to their children or to teachers in their local communities. Large tech firms praise patent reform bill Several large technology vendors praised a U.S. patent reform bill introduced this week, but other groups slammed the legislation, saying it would water down intellectual property rights. Copyright infringement and the CISSP, Part 2 In Part 1 of this series, security-awareness expert K Rudolph of Native Intelligence describes how she discovered that a CISSP-holder whom she is calling "Mud" submitted 11 of her posters to a contest after stripping ... Copyright infringement and the CISSP, Part 1 This story deals with lying, theft, social networking, law, mystery, and an uncertain outcome. My longtime friend and colleague, the distinguished security-awareness expert K Rudolph of Native Intelligence tells a tale ... Security management: 3 key considerations What should you ask when buying security information management software? Enter for a Microsoft training giveaway from New Horizons New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment