Is My Guitar Pedal a Klone or a Counterfeit? — No Infringement Intended Podcast
Employment Law Now VIII-150 - The FTC Noncompete Rule is Dead: What Now?
Balch’s Decision Dive: Texas Trial Court Struck Down the FTC’s Noncompete Rule
5 Key Takeaways | Recent Developments in United States Trademark and Unfair Competition Law
The FTC Issued a New Rule to Ban All New Noncompete Agreements
3 Key Takeaways | New York State Bar Association IP Section Annual Meeting
Trade Secret Two-Step: Part 2
Trade Secret Two-Step: Part 1
PODCAST: Williams Mullen's Trending Now: An IP Podcast - False and Misleading Advertising, Label Review
JONES DAY TALKS®: 75 Years of the Lanham Act and Changes in U.S. Trademark Law
On June 27, 2025, China adopted a revised revision of its Anti-Unfair Competition Law (“AUCL”), which will take effect on October 15, 2025. As one of the two pillars of China’s competition law framework—alongside the...more
This monthly report outlines key developments in China’s data protection sector for May. The following events merit special attention...more
On January 13, 2025, California Attorney General (AG) Rob Bonta issued two legal advisories: one for businesses generally (General Advisory) and one specific to healthcare entities (Health Advisory). These advisories identify...more
On January 13, 2025, California Attorney General (“AG”) Rob Bonda issued an advisory describing providers’ and businesses’ obligations related to the development, sale, and use of artificial intelligence (“AI”) and automated...more
On May 15, 2024, the Federal Trade Commission Chair Lina M. Khan appeared before the House Appropriations Subcommittee on Financial Services and General Government to discuss the agency’s FY 2025 budget request and ongoing...more
Everyone is talking about the new rule approved by the Federal Trade Commission on April 23 (published on May 7 and set to take effect – pending legal challenges – on September 4, 2024 ). It is referred to as the...more
MIT Report Details New Cybersecurity Risks - “Cloud misconfigurations, more sophisticated ransomware, and vendor exploitation attacks are contributing to rising cyberattacks.” Why this is important: Worldwide spending...more
How do you protect trade secrets? You take reasonable efforts to maintain the secrecy of the information. As we have outlined in prior installments of this series, taking reasonable efforts to maintain secrecy is a key issue...more
Second Circuit Denies Settlement of Data Breach Case Due to Lack of Standing - As we previously reported, in April 2021, the Second Circuit became the latest federal circuit to hold that an individual may establish Article...more
As we face mounting data breaches and fears over loss of privacy, the article notes that, “as the public opinion evolves and increasingly concludes that merely possessing private data puts consumers at risk, consumers may...more
For many companies, customer information ranks among its most important assets. Yet these days, employees often keep this sensitive customer information in electronic locations that are not readily accessible to or controlled...more
On 4 February 2017, the Cyberspace Administration of China issued a draft of the Network Products and Services Security Review Measures (“Draft Measures”) for public comment: the Draft Measures remain open for comments until...more
Italy is renowned for its rich art, cuisine, history, fashion, and culture; its beautiful coastline and beaches; its mountains; and priceless ancient monuments. In fact, Italy is a top tourist destination and has more World...more