Money-Saving Licensing Tips for Startups
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Cease and Desist Letters: Protecting Your Intellectual Property the Right Way
PODCAST: PODCAST: Williams Mullen's Trending Now: An IP Podcast - Cease and Desist Letters: Protecting Your Intellectual Property the Right Way
A Counterintuitive Approach to Winning Without Litigation: One-on-One with Haley Morrison
SkadBytes Podcast | Tech’s Shifting Landscape: Five Trends Shaping the Conversation
Tips for Conducting a Trade Secret Assessment with Rob Jensen
Will I Get Sued if I Create Another Hospital Drama? — No Infringement Intended Podcast
Essential Steps to Sell Your Business
Mickey Mouse: un ratón con abogado
(Podcast) The Briefing: The Ninth Circuit Puts the Brakes on Eleanor’s Copyright Claim
The Briefing: The Ninth Circuit Puts the Brakes on Eleanor’s Copyright Claim
Unexpected Paths to IP Law with Dan Young and Colin White
Why Can't I Clean the Graffiti Off My Walls? — No Infringement Intended Podcast
(Podcast) The Briefing: Trademark Smoked: The Fall of General Cigar’s COHIBA Registration
The Briefing: Trademark Smoked: The Fall of General Cigar’s COHIBA Registration
PODCAST: Williams Mullen's Trending Now: An IP Podcast - NCAA Name, Image, Likeness (NIL) Update – Effects of House Settlement
How IP Can Fuel Your Startup's Growth
Tariffs and Trade Series: What Senior Management Teams Need to Know
5 Key Takeaways | AI and Your Patent Management, Strategy & Portfolio
Two Key Considerations in NIL Deals
When planning a major design development project, whether it’s a corporate campus, data center, or mixed-use facility, deciding how much to invest in security can be a complex question. A practical, risk-based approach to...more
Spring has arrived, and in addition to cleaning, it’s a good time to reassess how your company is handling its trade secrets. Far from being static, trade secret innovations, processes, and data evolve over time. Business...more
What exactly is data exfiltration, and why should organizations be concerned about it? Data exfiltration is the movement or migration of company-owned trade secrets or intellectual property outside of the enterprise. It...more
Artificial Intelligence (AI) has been touted as the answer to a multitude of business challenges. However, AI – along with machine learning and large language models (LLMs) – is still fraught with technical and regulatory...more
Last week I had the pleasure of sitting down and discussing the legal implications of AI with a group of General Counsels. This group of GCs represented companies from the Fortune 100 all the way to mid-size enterprises. That...more
One of our recent posts discussed the uptick in AI risks reported in SEC filings, as analyzed by Arize AI. There, we highlighted the importance of strong governance for mitigating some of these risks, but we didn’t address...more
With the 2020 proxy and annual reporting season upon us, this Legal Update provides 10 tips for companies to consider when drafting annual reports on Form 10-K and proxy statements for filing with the US Securities and...more
Artificial Intelligence (AI) systems, including the use of algorithms and computer software to analyze complex data and perform certain decision making functions without direct human involvement, are rapidly developing in...more
Last month we hosted our annual ‘Intellectual Values’ seminar in London which this year focused on the ‘connected world’. Sarah Turner, an IP partner in our Tech Hub, gave a talk on the steps companies can take to improve...more
On October 11, 2017, the National Association of Insurance Commissioners and the Stanford Cyber Initiative held a joint conference on various topics related to cyber insurance. Below are key takeaways and hot topics discussed...more
With the 2016 holiday shopping season in full swing, the risk of litigation heightens for retailers. We created our own version of a “holiday list” to identify the top-10 risk areas where retailers may be vulnerable to claims...more
With the rapid pace of innovation and deployment of intelligent transportation systems (ITS) to enhance existing transportation infrastructure, transportation officials frequently procure and manage sophisticated systems that...more
Protecting Trade Secrets in the Era of the Data Breach - The prevalence of data breaches cannot be ignored. New data breaches continue to occur one after an-other. In the first half of 2015 alone there were reports of...more