We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.
In cooperation with Association of Corporate Counsel
  Request new password

Search results

Order by most recent / most popular / relevance

Results: 1-10 of 194

ALJ gildea sets procedural schedule in Inv. No. 337-TA-778

  • McDermott Will & Emery
  • -
  • USA
  • -
  • July 26 2011

On July 25, 2011, ALJ Gildea set the procedural schedule for Investigation No. 337-TA-778, Certain Equipment for Communication Networks Including Switches, Routers, Gateways, Bridges, Wireless Access Points, Cable Modems, IP Phones, and Products Containing Same

In with the new, part III: 2014 privacy, advertising and digital media predictions

  • McDermott Will & Emery
  • -
  • USA
  • -
  • January 31 2014

Boston-based litigation partner Matt Turnell shares his predictions about class action litigation under the Telephone Consumer Protection Act (TCPA

Broad injunctive relief and damage award for misappropriation of trade secrets upheld

  • McDermott Will & Emery
  • -
  • USA
  • -
  • July 31 2011

Considering a jury verdict holding that the defendants had misappropriated the plaintiff’s trade secrets by using the plaintiff’s source code to create competing audio conferencing products, the U.S. Court of Appeals for the Tenth Circuit affirmed the judgment for the plaintiff and scope of injunctive relief and the award of exemplary damages

Bilski-based rejections of computer-implemented claims continue to be issued by board of appeals

  • McDermott Will & Emery
  • -
  • USA
  • -
  • January 30 2010

In a decision applying the Bilski "machine-or-transformation test" (see IP Update, Vol. 11, No. 11), the U.S. Patent and Trademark Office’s Board of Patent Appeals and Interferences (the Board) continued its practice of invalidating computer implemented method claims under 101

OCR issues proposed modifications to HIPAA privacy and security rules to implement HITECH Act

  • McDermott Will & Emery
  • -
  • USA
  • -
  • July 27 2010

On July 14, 2010, the Office for Civil Rights (OCR) of the U.S. Department of Health and Human Services (HHS), issued a proposed rule (Proposed Rule) containing modifications to the privacy standards (Privacy Rule), security standards (Security Rule) and enforcement regulations (Enforcement Rule) under the Health Insurance Portability and Accountability Act of 1996 (HIPAA

Innocent bystanders of cybersquatting: neutral domain name registrars

  • McDermott Will & Emery
  • -
  • USA
  • -
  • December 31 2013

Addressing for the first time the issue of whether the Anticybersquatting Consumer Protection Act (ACPA), which added two cybersquatting causes of

Administrative law judge finds employer unlawfully discharged employees based on Facebook posts

  • McDermott Will & Emery
  • -
  • USA
  • -
  • September 22 2011

In a first of its kind ruling, a National Labor Relations Board (NLRB) Administrative Law Judge (ALJ) found that an employer unlawfully terminated five employees because they posted comments on Facebook related to working conditions

New complaint filed by Freescale Semiconductor Inc.

  • McDermott Will & Emery
  • -
  • USA
  • -
  • June 10 2011

Freescale Semiconductor Inc. filed a letter on June 8, 2011, requesting the International Trade Commission to conduct an investigation under section 337 covering Certain Integrated Circuit, Chipsets, and Products Containing Same Including Televisions

Commission finds no violation, terminates investigation 337-TA-670

  • McDermott Will & Emery
  • -
  • USA
  • -
  • July 11 2010

The Commission has found no violation of Section 337 in Inv. No. 337-TA-670, Certain Adjustable Keyboard Support Systems and Components Thereof, and terminated the investigation

HIPAA de-identification guidance

  • McDermott Will & Emery
  • -
  • USA
  • -
  • December 11 2012

Office of Civil Rights has released additional guidance addressing the de-identification of protected health information in accordance with the HIPAA Privacy Rule