Trademarks protect the usage of a name, phrase, logo or design that indicates the origin or source of goods or services. Brand names and signature logos are prime examples. Trademarks can often [...]
Movement to services is exploding across all business segments. One of the main motivators for this move is enhanced security as compared to on premise resources. However, cloud services come [...]
Take Care When Executing Electronically Signed Documents A favorite phishing ploy is the use of fake DocuSign or other electronic signature emails which, when you click on the link to the [...]
The Metaverse is coming. Is it the next Internet? Time will tell. But if history is a lesson for the future, it may be the wild west for IP rights in its early stages. I am sure many of you are [...]
On May 23, 2022, the United States Supreme Court issued a unanimous decision in Morgan v. Sundance, Inc., and rejected a court-created rule that benefitted defendants (typically employers), that [...]
Securing Sensitive Employee and Customer Information with a Written Plan
In Information and Business Technology, Intellectual Property PostedBusinesses are increasingly operating online and, as a result, are collecting more personal and confidential information. Because of this, it is more important than ever for businesses to be [...]
As of April 1, 2022, banking institutions now have 36 hours to report a computer-security incident to their federal regulators (FDIC, Office of the Comptroller of the Currency, or the Federal [...]
Pennsylvania Supreme Court Refuses to Expand Application of the Equitable Doctrine of Abandonment
In Energy PostedPennsylvania’s highest court recently refused to expand the equitable doctrine of abandonment to terminate an oil and gas lease. In SLT Holdings, LLC v. Mitch-Well Energy, Inc., 249 A.3d 888 (Pa. [...]
FBI: Business Owners to Take Responsibility for Cybersecurity – Now Multifactor Authentication is Now a Necessary Step
In Information and Business Technology PostedAdministration and law enforcement officials are warning that the Ukraine invasion necessitates heightened attention to possible Russian cyber attacks. “These threats are real” says Jen [...]
In Briggs v. Southwestern Energy Production Company, 224 A.3d 334 (Pa. 2020), the Pennsylvania Supreme Court considered whether the rule of capture immunizes an energy developer from liability in [...]