News & Analysis as of

Trademarks Data Security Patents

A Trademark is a legally registered distinctive mark or sign which identifies goods, products or services that originate or are associated with a particular person or enterprise . A typical example of a trademark... more +
A Trademark is a legally registered distinctive mark or sign which identifies goods, products or services that originate or are associated with a particular person or enterprise . A typical example of a trademark would be a company's logo such as the Nike "Check" or McDonald's "Golden Arches."  less -
Mintz - Intellectual Property Viewpoints

Navigating AI Integration: USPTO's New Guidance for Patent and Trademark Practices

The United States Patent and Trademark Office (USPTO) has issued a pivotal guidance document, effective April 11, on the use of Artificial Intelligence (AI) tools within patent and trademark practices. This guidance signals a...more

Erise IP

The Metaverse Gold Rush: What Smart Brands Should Do (And Not Do) Now

Erise IP on

It is hard to escape the buzzword “metaverse” these days. Major tech companies are betting on the virtual future, with Facebook even re-naming itself “META” in homage to the concept. Traditional brick-and-mortar based...more

Verrill

Trademark and Patent Owners Beware: Misleading Solicitations on the Rise

Verrill on

After successfully registering your trademark or receiving your issued patent, a notice from a private company requesting additional watch, renewal, or registration services appears in your mailbox or inbox. The offer might...more

Fenwick & West LLP

Intellectual Property Bulletin - Fall 2018

Fenwick & West LLP on

In This Issue - Gender Diversity in Patenting: Current Landscape and Recommendations - The gender gap in patenting is a current challenge that companies face. While this issue seems pervasive, companies and lawyers can...more

Robins Kaplan LLP

Trade Secrets, Security, and Cloud Computing: Best Practices Now

Robins Kaplan LLP on

As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide