Keeping in Shape – Trademark Protection of Product ConfigurationsThe development of unique and distinctive product configurations allows the producer of the product to achieve more bang for its marketing dollar. The consumer not only cognitively associates the manufacturer’s word mark with the product, but also its configuration. In this context, the oft cited example is the Coca-Cola bottle shape ...
The English Court of Appeal has thrown out an attempt to appeal a decision in favour of Dyson about spare parts for Dyson vacuum cleaners. Dyson sued spare parts supplier Qualtex for infringement of Dyson's unregistered design rights (UDR) in 14 spare parts manufactured by Qualtex. The spare parts were deliberately designed to look like the originals, known as "pattern parts" in the trade ...
The Police and Justice Bill was put before the House of Commons on 25 January 2006. The main aim of the Bill is to improve the powers and scope of the police force but there are a number of sections which look to update the Computer Misuse Act 1990 (CMA) and in particular to make Denial of Service (DOS) Attacks illegal. DOS attacks can take many forms but are essentially an attempt to disrupt the use of a computer, server or website ...
Captains of private and commercial yachts (and owners) have civil and criminal law duties most of which are concerned with the safe operation of the vessel. As the captain is regarded in law as being the owner’s agent, he is the person unfortunately on the spot. It is the captain who becomes personally liable in the first instance for any fine imposed on the vessel. Owners or charterers have no legal obligation to compensate him even though the offence may have occurred due to their fault ...
Dominant companies have special responsibility to ensure that the way they do business doesn’t prevent competition on the merits and does not harm consumers and innovation», said European Competition Commissioner Mário Monti, regarding the Commission’s Microsoft decision dated March 24th, 2004 ...
The interoperability information on Microsoft’s decision deserves special attention by the undertakings that have a dominant position in the market. Intellectual property rights, granted as an incentive for the creation of innovation and as a tool to recoup the investments made by companies, used to be understood as providing several rights to its owners ...
The legal concept that one can arrest a vessel and prevent it moving is unusual to say the least. An arrest in the UK (and other jurisdictions) is practically undertaken by serving upon the vessel a “Warrant of Arrest”, a very similar concept to criminal proceedings albeit this form of arrest is a civil law admiralty procedure and for very different reasons ...
Captains of private and commercial yachts (and owners) have civil and criminal law duties most of which are concerned with the safe operation of the vessel. As the captain is regarded in law as being the owner’s agent, he is the person unfortunately on the spot. It is the captain who becomes personally liable in the first instance for any fine imposed on the vessel. Owners or charterers have no legal obligation to compensate him even though the offence may have occurred due to their fault ...
Complaints by foreign businesses regarding protection of intellectual property rights in China have been a consistent feature in media reports since large scale foreign investment commenced some 20 years ago. However, China's economic revolution over the same period means that opinions based on negative experiences in the past must be constantly reassessed ...
Internet telephones are set to take the global communications industry by storm. Big names like Microsoft, AOL, Yahoo! and eBay are piling into the market and former state-run telecoms providers like BT are also investing. The technology was first developed by the US Defense Department as part of a research project on interconnection in the 1970s. But until recently only techno-geeks have had the interest and ability to make any use of it. But times have changed ...
On 1 May 2004 a new and revised Technology Transfer Block Exemption Regulation (the TTBER) entered into force - Regulation No. 772/2004. The TTBER will provide block exemptions for IP licensing agreements, ensuring that certain technology transfer agreements are automatically exempt from the application of Article 81(1) of the EC Treaty, which prohibits anti-competitive agreements ...
The European Union has recently launched a new ccTLD (country code top level domain). Instead of using the various national European ccTLD's, such as .fr for French companies, .de for German companies, and .co.uk for U.K. companies, the EU has made available the .eu suffix as a Community-wide ccTLD. The new domain extension has already proved widely popular, with more than 100,000 applications for domain names filed thus far ...
Germany. November 9, 1938. Kristallnacht. “The Night of Broken Glass.” Nazi secret police and the Hitler youth swarm over Jewish businesses and homes, terrorizing and victimizing helpless individuals all over the country.1 SS leadership orchestrates attacks on every vestige of Jewish culture as “punishment” for fictitious crimes that will never be recognized by the rest of the world ...
At the end of June, the US entertainment industry won a long fought victory to help bring file swappers to heel ...
The European Parliament dealt a blow to programmers seeking clarity on the patentability of computer-implemented inventions last month when it rejected a draft European Directive on the subject (the "CII Directive") by an overwhelming majority ...
Summary ‡ Information security “breaches” take many forms and occur in a wide variety of settings. However, contrary to recent press reports, they do not appear to be increasing. ‡ Research indicates that only a small percentage of breaches result in any harmful use of data. ‡ Account fraud and true identity fraud — the two identity-based frauds most feared by consumers and policy makers — are actually declining ...
The Ministry of Information Industry ("MII") promulgated the Measures for the Administration of the Filing for the Record of Non-Commercial Internet Information Services (the "Recordal Measures") on 8 February 2005. The Recordal Measures took effect on 20 March 2005. It provides detailed guidelines on recordal filings for non-commercial websites ...
When it comes to the patentability of computer-implemented inventions, Europe and the United States have differing and diverse opinions. The United States has a liberal approach to the patentability of computer software and will therefore grant patents for such inventions. Not so in Europe though, where computer programs are patentable only if they make a “technical contribution” to the state of the art ...
ICC Publishes Paper on Internet Governance The Internet Corporation for Assigned Names and Numbers (ICANN), a private sector body based in California, currently operates the allocation of domain names and Internet Protocol addresses on a worldwide basis. At the World Summit on the Information Society in Geneva in December 2003, the issue of transferring ICANN’s role to the United Nations was raised by a number of developing countries ...
A trademark is any sign which, in the course of trade, can distinguish the goods or services from those of other undertakings. Trademarks are often also used as indications of a certain quality or life style (such as Lancome® trademark represents the luxury cosmetics) or as a marketing tool (such as the IKEA® and VOLVO® marks, which are featured not only on furniture but also on their services) ...
The Standing Committee of the 10th National People's Congress passed the Law of the People's Republic of China on Electronic Signatures on 28 August 2004. The Law, which was promulgated on 28 August by President Hu Jintao, will enter into effect on 1 April 2005 and provides a legal basis for electronic transactions. Electronic data text The Law applies to electronic signatures in electronic data text ...
California Law Requires Telling Your Customers That You've Been Hacked A new California Law (Assembly Bill No. 700, Chapter 1054) went into effect on July 1, 2002 that requires companies who conduct business in California to notify their California-resident customers if their unencrypted personel information may have been stolen as a result of a security breach ...
Technology Update Authors Brian D. Barnard Randall E. Colson M. Ann Newton Related Practice Groups Intellectual Property A new California Law (Assembly Bill No. 700, Chapter 1054) went into effect on July 1, 2002 that requires companies who conduct business in California to notify their California-resident customers if their unencrypted personel information may have been stolen as a result of a security breach ...
Five years ago your CEO told you that your company had to have a “web” strategy. So, you learned everything about the Internet. You hired specialty law firms, bought software, and entered into web development and hosting agreements. You mastered all the web lingo. Now, all of that is passé ...