Do you work with start-up companies and need a basic understanding of the various intellectual property issues that can arise?
I will be co-presenting in this online seminar that will help you:
- understand the trademark and copyright problems your client may encounter with branding;
- learn how to protect your client’s branding once established;
- familiarize your practice with patents, including what they protect, timing, and strategies to prevent inadvertent loss of patent rights before filing the application;
- understand trade secrets and the importance of non-disclosure and confidentiality agreements;
- recognize intellectual property issues relating to technology, including open source code and the cloud;
- establish a proactive approach toward intellectual property ownership between cofounders, employees, and vendors; understand business names, domain names, promotional issues, and website content concerns.
The program qualifies for 1.5 hours MCLE credit.
I would like to personally invite you to attend the upcoming Law Ed program titled, “Identifying Intellectual Property Issues in Start-Ups,” which I will be co-presenting via live webcast on Tuesday, May 27th.
Presented by the ISBA Business Advice and Financial Planning Section
Co-Sponsored by the ISBA Intellectual Property Section
September 19, 2013
A presentation on what goes into creating original designs and how these differ from copycats.
WHERE: Decoration & Design Building, J. Robert Scott Showroom, Suite 220
WHEN: Wednesday, October 2,2013 !2 p.m.
WHAT: From film to fashion, creative industries are taking steps to protect and promote original work. Designers and manufacturers need to know what steps they can take to protect their designs, their businesses, and their profits. The discussion will address issues related to how to protect original design (copyright & design patent) and the manufacturers (trademark, unfair competition).
INTERIORS Magazine Editorial Director Michael Wollaeger
J. Robert Scott Founder Sally Sirkin Lewis
Designer Laura Kirar [Web Site]
Intellectual Property lawyer David Adler
Showroom reception to follow.
Download the full Fall Decoration & Design Building Market Brochure Here.
On October 2, 2013, I will be attending the Decoration & Design Building Fall Market where I am giving a presentatIon on protecting original furniture & textile designs. Those in attendance share a belief that style and design matter.
As designers and purveyors of good taste, you may spend months developing a concept, selecting materials, agonizing over the exact curve of the arm of a chair. Manufacturers may refine the design, invest in tooling to build it, promote it, and get it to market. Merchandise buyers may spend months reading, researching, attending events such as this to obtain and fill your showrooms and catalogue with ineffable elements of style. This is original, authentic design. Authentic designs—pieces produced by designers or their authorized manufacturers—are investments.
Therein lies the problem for today’s furniture designers and retailers. It takes intellectual and financial capital to conceive, create and produce good design. Yet, today’s consumer driven, price-focused economy is making it more and more difficult for a designer to protect and profit from the investment of this intellectual capital.
This presentation will focus on why certain designs are protectable, how to protect them, and how to defend against knock-offs.
VIDEO: The Evolving Insider Threat- Dawn Cappelli, Randy Trzeciak of CMU’s Insider Threat Center
This video from RSA Conference 2013 discusses:
- Who typically commits insider crimes – and how;
- How employees are being victimized from outside;
- Why our critical infrastructure is at heightened risk.
Even if you are an employer using standard commercial verification measures, you should be cautious about misuse of any information by employees, managers and contractors. Accordingly, you should be careful with training and education and not on only newly-hired employees. Further, plan on how login credential and access to sensitive information will be handled and/or turned over when training or when terminating, suspending, withholding pay, lowering pay, or taking any other adverse action against an employee.