article thumbnail

Mr Justice Zacaroli finds manufacturing software copyright infringed and confidence breached in ex-employee fight

The IPKat

When one hears the claims of copyright infringement, confidential information and employment claims one can readily assume that this is an employer/ex-employee dispute. They develop, market and sell statistical process control (SPC) software and gauge management software.

article thumbnail

The Threat You’ve Never Heard of: The Modern-Day Counterfeiter 

Corsearch

Illegal markets continue to grow and are becoming smarter and more sophisticated, with criminal networks developing organized models to create and sell counterfeit goods. How counterfeiter behavior has evolved “To understand how counterfeiting has changed, we need to look back to market reforms that took place in the 1990’s.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Threat You’ve Never Heard of: The Modern-Day Counterfeiter 

Corsearch

Illegal markets continue to grow and are becoming smarter and more sophisticated, with criminal networks developing organized models to create and sell counterfeit goods. How counterfeiter behavior has evolved “To understand how counterfeiting has changed, we need to look back to market reforms that took place in the 1990’s.

article thumbnail

The Threat You’ve Never Heard of: The Modern-Day Counterfeiter 

Corsearch

Illegal markets continue to grow and are becoming smarter and more sophisticated, with criminal networks developing organized models to create and sell counterfeit goods. How counterfeiter behavior has evolved “To understand how counterfeiting has changed, we need to look back to market reforms that took place in the 1990’s.

article thumbnail

The Threat You’ve Never Heard of: The Modern-Day Counterfeiter 

Corsearch

Illegal markets continue to grow and are becoming smarter and more sophisticated, with criminal networks developing organized models to create and sell counterfeit goods. How counterfeiter behavior has evolved To understand how counterfeiting has changed, we need to look back to market reforms that took place in the 1990’s.

article thumbnail

Removing songs from Spotify could breach label’s duty to exploit: Four Tet v Domino

The IPKat

Permission was also sought to add an alternative claim relating to alleged restraint of trade and copyright infringement. Restraint of trade/copyright infringement Mr Hebden also sought permission to plead a restraint of trade, should his case that the contract imposed continuing obligations upon the Domino, fail.