Sat.Mar 02, 2019 - Fri.Mar 08, 2019

article thumbnail

Museums that Give Away Open Access Images of Public Domain Work

Creative Law Center

Innovative museums share their collections with high resolution open access images that can be used by anyone for anything. The post Museums that Give Away Open Access Images of Public Domain Work appeared first on Creative Law Center.

article thumbnail

Avoid Other Unintended Consequences of Protecting Against Cyber-Criminals

GDB Firm Blog

Earlier this week, I wrote about not accidentally discriminating against the disabled when implementing cybersecurity systems. Financial Institutions also need to be careful when implementing systems that protect confidentiality of emails and website disclosures by prohibiting printing them. Most federal and state disclosure laws that permit the electronic delivery of disclosures require that the recipient must be able to print the disclosures.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Supernus: Delays Out of the Applicant’s Hands Are Not Applicant Delays

More Than Your Mark

The term of a U.S. patent is typically twenty years. However, the patent term can be altered as a result of certain Patent Office delays (patent term adjustment) and certain regulatory delays (patent term extensions). For the former, the Patent Office will adjust the term on a day?for?day basis: one day of delay results in one day of adjustment. That said, the Patent Office has historically reduced any such adjustment if the patent applicant was the cause of the delay.

article thumbnail

Damages For Delay? - Still No

GDB Firm Blog

A bill out of the New York State Senate which would have amended the state finance law to permit contractors to recover delay damages on public work when caused by an act or omission of the public entity was shot down by Governor Cuomo. Contracts can still provide that there are "no damages for delay.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Don't Violate the Americans with Disabilities Act by Accident

GDB Firm Blog

The Department of Financial Services cybersecurity regulations just reached another phase-in milestone, so let's discuss the relationship between high security and disabled customers. One cybersecurity system that vendors offer automatically deletes messages you send so they can't be stolen by hackers. Messages with confidential information can't be printed and can't be saved on the recipient's computer.

article thumbnail

No Pet Rules vs. Dogs

GDB Firm Blog

In the ongoing battle between no-pet rules and dogs, the legal system does not make it easy to enforce no-pet rules. In addition to the New York City Dog Law, which requires that an action to remove a dog must be commenced within 90 days of a landlord learning that a tenant has a dog, the civil rights laws protect certain dogs owned by people with disabilities.

Law 40