Because of the DTSA, trade secret misappropriation suits with an interstate component now can be filed in federal court. I probably will write, shortly, another post that discusses such suits and how trade secrets and misappropriation are defined. (more…)
17 U.S.C. Section 512(c)(1)(C) states that for a provider to be protected by the DMCA, it must respond to a valid takedown notice by “respond[ing] expeditiously to remove, or disable access to, the material that is claimed to be infringing….” (more…)
This post is based on a recent federal appellate case, Lenz v. Universal Music. That case held that one must consider fair use as a possible defense for an online service provider before sending a takedown notice under the Digital Millennium Copyright Act (DMCA).
In California, a “work made for hire” (WMFH) provision in a contract can convert a contractor to an employee. This post describes the statutory basis for this little-known area of the law.
Before providing details, I will note that the (likely unwanted) ability to convert a contractor to an employee will arise only under narrowly-defined circumstances.
- The independent contractor must be an individual rather than a legal entity (a corporation or limited liability company).
- The relevant contract must expressly specify WMFH treatment for the contractor’s work product.
- The contractual relationship must be governed by California law. (I don’t know whether any other states have similar laws.)
You probably have sung “Happy Birthday [to You]” countless times. This post is about a company that has been collecting royalties from that song and the possibility that those royalties soon may stop.
In 1893, sisters Mildred Jane Hill and Patty Smith Hill published a collection of children’s songs. One of the songs – with the tune that we now know for “Happy Birthday to You” – was “Good Morning to All”.
Good morning to you,
Good morning to you,
Good morning, dear children,
Good morning to all.
While no one knows for sure who wrote the “Happy Birthday” lyrics, their first known publication was in 1912. (more…)
This post about the origin of the copyright symbol (©) is based on my answer to a Quora question. See Why are the symbols of “©” and “®” used to identify copyrights and registered trademarks?
Copyright Symbol as Part of Copyright Notice
The copyright symbol “©” can be part of a copyright notice under current copyright law. See 17 USC Section 401(b). (For more information about copyright notices, see Copyright Protection in Once Easy Lesson .) (more…)
Earlier this month, the U.S. District Court for the Northern District of California ordered the author of a fraudulent takedown notice under the Digital Millennium Copyright Act to pay more than $25,000.
U.K. Student Journalist Oliver Hotham has a blog on WordPress.com, which is operated by San Francisco-based Automattic Inc. (more…)
Last week I explained what a security interest is and how it can be perfected, i.e., made effective against third parties. (See What is a Security Interest, and Why Should I Care?) This post discusses how to perfect an intellectual property security interest.
To recap, a security interest is an interest in an asset (the “collateral”) intended to secure performance of an obligation. Typically, that obligation is payment of a debt. Perfection typically consists of filing, with one of more secretaries of state, documents that identify the debtor, the creditor and the collateral. (more…)
I have written several times about ICANN’s longstanding Uniform Domain Name Dispute Resolution Policy (UDRP). This post discusses a more recent way to thwart some cybersquatters, namely, URS – Uniform Rapid Suspension.
According to ICANN explains, URS exists to “provide rapid relief to trademark holders for the most clear-cut cases of infringement“. Furthermore, URS is cheaper and faster than UDRP. (more…)