Issues and developments related to IP, AI, and OM, examined in the IP and tech ethics graduate courses I teach at the University of Pittsburgh School of Computing and Information. My Bloomsbury book "Ethics, Information, and Technology", coming in Summer 2025, includes major chapters on IP, AI, OM, and other emerging technologies (IoT, drones, robots, autonomous vehicles, VR/AR). Kip Currier, PhD, JD
Showing posts with label NDAs. Show all posts
Showing posts with label NDAs. Show all posts
Thursday, December 6, 2018
3 Types of Documents Every Company Needs to Have in Place; Lexology, October 23, 2018
"Documents for Protection of the Company’s Intellectual Property
In addition to formal employment terms and conditions and formal consulting and advisor agreements, the most important agreement for most emerging companies to have shortly after formation is a non-disclosure agreement. This agreement is usually entered into with unrelated third parties who may come in contact with the company’s proprietary information and is intended to protect the company’s rights to its intellectual property."
Monday, July 30, 2018
10 Effective Ways To Protect Your Intellectual Property; Forbes Technology Council, July 23, 2018
Forbes Technology Council; 10 Effective Ways To Protect Your Intellectual Property
"As your new invention comes to
light, your initial thought may be to let the world know. While shouting
your success from the rooftops is appealing, before you do, you need to
consider how best to protect what you have worked so hard to develop.
Patents and copyrights can offer you some security, but
don’t always mean that your design is completely protected, as copies
can certainly emerge. There are, however, a number of other options
available to you, each with their own strengths.
Below, 10 members of Forbes Technology Council weigh in on some less-common, yet still effective, ways to protect your intellectual property. Here’s what they recommend:"
Thursday, September 8, 2016
Trade secret law: A brief guide for in-house counsel; Inside Counsel, 8/18/16
Ben Berkowitz, Briggs Matheson, Inside Counsel; Trade secret law: A brief guide for in-house counsel:
"What information does trade secret law protect? Forty-seven states have adopted some form of the Uniform Trade Secrets Act (“UTSA”), with New York, Massachusetts, and North Carolina as the only exceptions. Under the UTSA, there is a two-prong test for determining whether information may be subject to trade secret protection. First, trade secret information must be information that “derive[s] independent economic value” from not being publicly known (See, e.g., Cal. Civ. Code § 3426.1(d)). That is, the information is valuable because it is a secret that others, including competitors, do not possess. Second, the information must be “the subject of efforts that are reasonable under the circumstances to maintain its secrecy.” (Id.) “The determination of whether ‘reasonable efforts’ have been taken is quintessentially fact-specific,” and “‘depends on a balancing of costs and benefits that will vary from case to case.’” (Rockwell Graphic Systems, Inc. v. DEV Industries, Inc.) “Reasonable efforts” may include adopting confidentiality policies, entering into non-disclosure agreements, and establishing digital and physical security infrastructure. (Religious Tech. Ctr. Netcom On-Line Commc’n Servs.)"
Subscribe to:
Posts (Atom)