article thumbnail

Who holds copyright in 3D copies of repatriated cultural heritage?

Kluwer Copyright Blog

It is a common practice to make copies of deteriorating or far away cultural heritage. As of 2022, it is not even a new idea to use digital methods to copy heritage, considering that the mass digitisation of cultural heritage, especially books, started more than two decades ago. Photo by awsloley via Pixabay.

Copying 67
article thumbnail

[Guest post] Archival Authenticity or Iconic Copies? Some IP Thoughts on Dolce & Gabbana’s SS23 Collection Curated by Kim

The IPKat

Here’s what Felicia writes: Archival Authenticity or Iconic Copies? A focus on the past, and the success of heritage-focused events, collaborations and products , also raises the possibility that heritage can at times act as an extra-legal norm in negatives spaces of IP or even low-IP regimes. see this chapter.)

Copying 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Ransomware Attacks: Harmless Annoyances or Catastrophic Events?

Trading Secrets

In other words, unless data was copied or exfiltrated by the attacker, there is not a breach. The reasonableness of a business’ safeguards, the adequacy of its investigation, and the speed of its remediation response could all be subject to scrutiny in the event of litigation or a regulatory investigation.

Privacy 59
article thumbnail

Private Copying Levy for Social Purposes – Draft Changes in Poland and Compatibility with EU Law – Part I

Kluwer Copyright Blog

The Polish Ministry of Culture has announced draft changes to the Polish copyright law on the collection and division of the private copying levy (also known as the blank media tax or levy). In Part I of this set of posts, I describe draft changes to the Polish copyright law on the collection and division of the private copying levy.

Copying 56
article thumbnail

Ransomware Attacks: Harmless Annoyances or Catastrophic Events?

LexBlog IP

In other words, unless data was copied or exfiltrated by the attacker, there is not a breach. The reasonableness of a business’ safeguards, the adequacy of its investigation, and the speed of its remediation response could all be subject to scrutiny in the event of litigation or a regulatory investigation.

Privacy 52
article thumbnail

What is Software Escrow? An Overview

JD Supra Law

Under the Escrow Agreement, the software supplier periodically deposits a copy of the software’s source code and application materials for secure storage, provided by the escrow provider. If certain predetermined release events occur, By: NCC Group

Copying 68
article thumbnail

30% discount code on IPKat book now available

The IPKat

First, we are organizing a big event on 8 June , both online and in London. The goods news of the day is that there is now a 30% discount code available to use for those interested in purchasing their own copy (or copies!) Time flies when you are having. (IP) Indeed, as previously announced , in June The IPKat will turn 20.