Search Results (2170)
Documents on computer software
Show: results per page
|Cloud Computing with Export-Controlled Data|
Jonathan T. Cain; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
April 15, 2013, previously published on March 12, 2013Security and privacy are the most frequently expressed concerns about cloud computing (defined for this article to include software as a service, platform as a service and storage as a service), but for companies that engage in research, design, development, manufacturing and servicing of items...
|Apps on Smart Devices and Data Protection: February 27, 2013 Opinion of the Article 29 Working Party Provides Valuable Guidance|
Crowell Moring LLP;
April 3, 2013, previously published on March 28, 2013Apps on mobile devices collect large quantities of data from the device and process these (i) in order to provide services to the end-user, but also (ii) for other purposes that are often unknown or unwanted by the end-user. Many of the data processed, such as location data, contact data, unique...
|The Hazard of Having a Dominate Customer (And How to Keep Your Biggest Customer From Controlling You)|
Michael Lasky; Burr & Forman LLP;
March 18, 2013, previously published on March 14, 2013Let’s suppose you want to break Apple’s grip on the smart phone market. So you build a similar operating system and give it away to everyone for free (keeping the right to advertising revenue, of course). It works spectacularly. You beat Apple at its own game but then, just when you...
|CIPO Issues Examiner Guideline for Computer-Implemented Inventions (PN 2013-03)|
Bennett Jones LLP;
March 18, 2013, previously published on March 14, 2013After some prior iterations and commentary from the patent bar, the Canadian Intellectual Property Office (CIPO) published a practice note dealing with computer-implemented inventions on March 8, 2013. The practice note is meant to clarify the position of Examiners in light of the recent Amazon.com...
|How to Be Anti-Troll Without Being Antitrust|
Dinsmore Shohl LLP;
March 11, 2013, previously published on March 5, 2013The U.S. District Court for the Northern District of California recently addressed whether a “patent aggregator” (a.k.a. “anti-troll”), which is an organization formed by operating companies to protect against “non-practicing entities” (NPEs, a.k.a. “patent...
|Software Copyright - New Developments in the UK|
Mayer Brown LLP;
March 11, 2013, previously published on February 2013The UK Courts have recently decided a high-profile software copyright case, following clarification on some key issues from the European Court. The SAS Institute case examines whether software programming languages, data file formats and other program elements are protected by copyright.
|Texas Executive Convicted of Hacking Former Employer’s Computer Network|
Haynes Boone LLP;
March 8, 2013, previously published on March 6, 2013A federal jury in the Northern District of Texas has convicted Michael Musacchio, a former logistics company executive, of violating the federal Computer Fraud and Abuse Act. The evidence presented at trial showed that Musacchio engaged in a conspiracy to hack into his former employer’s...
|UK: New Security for Sub-Licensees?|
Edwards Wildman Palmer LLP;
March 7, 2013, previously published on February 2013The conventional view in the UK has been that a sub-licensee has no greater rights than his sub-licensor and so a sub-licence ends when the sub-licensor’s rights terminate. This is questioned by the recent case of VLM Holdings Limited v Ravensworth Digital Services Limited  EWHC 228...
|CBP Issues Guidance on Country of Origin|
Drinker Biddle Reath LLP;
March 7, 2013, previously published on February 22, 2013Despite software’s intrusion into almost every aspect of our lives, U.S. Customs and Border Protection (CBP) has issued very little guidance on how to determine a software’s country of origin, particularly in situations where a substantial transformation may have occurred. CBP guidance...
|You Can Jailbreak Phones But Not Tablets: New DMCA Rules Roll Back Fair Use in Favor of Software Owners’ Rights|
Thomas C. Carey; Sunstein Kann Murphy & Timbers LLP;
February 21, 2013, previously published on January 2013The Digital Millennium Copyright Act (DMCA) bans the circumvention of technological measures that restrict access to works that are copyright-protected. E-books, music, movies and software all benefit from this legal protection, which does not require copying of the protected material to trigger a...