Remove Confidentiality Remove Copying Remove Privacy Remove Trademark
article thumbnail

Checklist of Issues on Generative IP

Kluwer Copyright Blog

It involves several IP rights, some of which overlap in some cases: copyright, trademarks, patents, trade secrets/confidential information, and the right of publicity (and similar rights with different names). Singapore (computational data analysis; user must not “use the copy for any other purpose”) f. Japan (Art. 3d 487 (N.Y.

IP 119
article thumbnail

SpicyIP Weekly Review (August 2 – 8)

SpicyIP

In the interim order, it was found that there is a prima facie case to uphold the petitioner’s RTBF, based on (1) the protection of his right to privacy and reputation both online and offline, and (2) providing an acquitted person the right to have their name redacted and stop being identified as an accused person. News from India.

Privacy 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Intellectual Property Rights For Fintech

IIPRD

Since FinTech is a dynamic concept and originated from the intellectual labour of its creator, the chief question running in the minds of stakeholders is “How to protect their work from copying”? Concerning infringement, a trademark is abused when a person adopts a corporation’s domain name without authorization.

article thumbnail

Think Keyword Metatags Are Dead? They Are (Except in Court)–Reflex v. Luxy

Technology & Marketing Law Blog

But trademark plaintiffs and judges are still partying like it’s 1999. Defendant has also used Plaintiffs’ trademarks “Seeking Millionaire,” “Seeking Arrangement,” “Whats Your Price,” “Carrot Dating,” and “Seeking” as search terms in the Apple Appstore and Google Play Store to yield LuxyApp as a search result.

article thumbnail

Legal Implications of IPR Protection ‘In The Cloud’: an Indian Analysis

IIPRD

3] held that the plaintiff’s trademark and trade dress was infringed by defendants. CONFIDENTIALITY, TRADE SECRETS AND SECURITY CONCERNS IN THE CLOUD Ensuring data security poses a major challenge for businesses, especially when operational data is stored in the cloud, raising concerns about safety and protection from manipulation.

article thumbnail

Copyright, Free Speech Clash in Dispute Over Cameron Boyce’s Final Film

Copyright Lately

Cameron Boyce ( Runt ) Wagging Tails claims that the threatened disclosures would violate Coakley’s confidentiality agreement. Other, perhaps more sympathetic, examples include attempts to protect one’s privacy in personal or intimate information. In one notable case, Balsley v. LFP , Inc. ,

article thumbnail

What is Blockchain Technology and has it been Patented?

Biswajit Sarkar Copyright Blog

The nodes authenticate transactions, add the data to their copy of the common ledger and transfer the ledger additions to all other nodes. It is basically a distributed database that can achieve independent verification of the ownership chain of any or every cryptocurrency (amount) as each node stores its own copy of the blockchain.