SlideShare une entreprise Scribd logo
1  sur  32
A Tale of Two Small
Businesses & An IP
       Fracas

           Antigone Peyton
            Cloudigy Law
Setting the Stage
Doomsday has a patent covering parts of the Super Public Defender software
program

Doomsday hasn’t registered anything with the Copyright Office

Doomsday considers its customer list a trade secret

It uses a basic employee and contractor agreement that doesn’t say anything
about Intellectual Property rights

Doomsday thinks it’s wrong for Heaven’s Arms to use some of its website
material for a website associated with Heaven’s Arms’ games
Super Public
Defender Patent
Software Patents
Patent Analysis
 Compare Patent Claims to Final Appeal
 software product
 If product is covered, then it infringes
 the patent
 Doesn’t matter whether Heaven’s Gate
 knows about patent
 Doomsday can get money or an
 injunction
Heaven’s Arms
   Website
Website

No registrations
Copyright
  Text, Images, maybe some code
Trademark
  Icons, Logos, Images
Trade Secrets
Trade Secrets

Customer list can be a trade secret in
some circumstances
Depends on what Doomsday does to
protect it and whether it treats it like a
trade secret
Factors to Consider
Employee & contractor agreements
restrict access & use
Technical and practical steps taken to
protect it
Competitive advantage to business to
keep it a trade secret
Each situation is different
Jack Ryan’s Software
        Code
Employee Agreements

They don’t discuss what happens if
employees invent something, or create
something that is protectable by
trademark, copyright, or trade secret law
Problem!!
Jack Ryan’s Work
Code for several software games
made up some game images for the
company
created some artwork for several games
added potential customer contacts he
knew personally to the customer list
What We’ve Learned
Questions??

         Antigone Peyton, Esq.
   President & Founder, Cloudigy Law
                   (703) 436-2033
          antigone.peyton@cloudigylaw.com
       Twitter: @antigonepeyton; @cloudigylaw
  Facebook: http://www.facebook.com/CloudigyLaw
LinkedIn: http://www.linkedin.com/in/antigonepeyton
    Cloudigy blog: http://cloudigylaw.com/news/

Contenu connexe

Tendances

Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
Unlocking the Power of Bar & QR Codes for Your Business | Globibo
Unlocking the Power of Bar & QR Codes for Your Business | GlobiboUnlocking the Power of Bar & QR Codes for Your Business | Globibo
Unlocking the Power of Bar & QR Codes for Your Business | Globiboglobibo
 
Bhadale group of companies bfsi products catalogue
Bhadale group of companies bfsi products catalogueBhadale group of companies bfsi products catalogue
Bhadale group of companies bfsi products catalogueVijayananda Mohire
 
Identity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingIdentity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingForgeRock
 
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock
 
Webinar EIDI
Webinar EIDIWebinar EIDI
Webinar EIDIhagero
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyForgeRock
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Ping Identity
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
 
Secure your APIs using OAuth 2 and OpenID Connect
Secure your APIs using OAuth 2 and OpenID ConnectSecure your APIs using OAuth 2 and OpenID Connect
Secure your APIs using OAuth 2 and OpenID ConnectNordic APIs
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationForgeRock
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinForgeRock
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Ping Identity
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
Launching a Successful and Secure API
Launching a Successful and Secure APILaunching a Successful and Secure API
Launching a Successful and Secure APINordic APIs
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...ForgeRock
 
Identity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew LathamIdentity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew LathamForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...ForgeRock
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 

Tendances (20)

Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Unlocking the Power of Bar & QR Codes for Your Business | Globibo
Unlocking the Power of Bar & QR Codes for Your Business | GlobiboUnlocking the Power of Bar & QR Codes for Your Business | Globibo
Unlocking the Power of Bar & QR Codes for Your Business | Globibo
 
Bhadale group of companies bfsi products catalogue
Bhadale group of companies bfsi products catalogueBhadale group of companies bfsi products catalogue
Bhadale group of companies bfsi products catalogue
 
Identity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingIdentity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael Dowling
 
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
ForgeRock Open Identity Stack Summit - Kick-off by Mike Ellis
 
Webinar EIDI
Webinar EIDIWebinar EIDI
Webinar EIDI
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 
Secure your APIs using OAuth 2 and OpenID Connect
Secure your APIs using OAuth 2 and OpenID ConnectSecure your APIs using OAuth 2 and OpenID Connect
Secure your APIs using OAuth 2 and OpenID Connect
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Launching a Successful and Secure API
Launching a Successful and Secure APILaunching a Successful and Secure API
Launching a Successful and Secure API
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
 
Identity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew LathamIdentity Live Sydney 2017 - Andrew Latham
Identity Live Sydney 2017 - Andrew Latham
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
iXGuard
iXGuardiXGuard
iXGuard
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 

En vedette

Outsiders
OutsidersOutsiders
Outsidersnagel71
 
anheuser-busch 2004AR_MgmntDiscuss
anheuser-busch 2004AR_MgmntDiscussanheuser-busch 2004AR_MgmntDiscuss
anheuser-busch 2004AR_MgmntDiscussfinance15
 
Aplicación de airocide en cocinas industriales y cátering
Aplicación de airocide en cocinas industriales y cáteringAplicación de airocide en cocinas industriales y cátering
Aplicación de airocide en cocinas industriales y cáteringrobertolorente
 
Alicia Chouinard Print and Web Portfolio
Alicia Chouinard Print and Web PortfolioAlicia Chouinard Print and Web Portfolio
Alicia Chouinard Print and Web Portfolioasc52118
 
St. Edward's PRSSA Chapter
St. Edward's PRSSA Chapter  St. Edward's PRSSA Chapter
St. Edward's PRSSA Chapter bkniffin
 

En vedette (8)

Outsiders
OutsidersOutsiders
Outsiders
 
1 Peter 3g
1 Peter 3g1 Peter 3g
1 Peter 3g
 
Wedding Show
Wedding ShowWedding Show
Wedding Show
 
anheuser-busch 2004AR_MgmntDiscuss
anheuser-busch 2004AR_MgmntDiscussanheuser-busch 2004AR_MgmntDiscuss
anheuser-busch 2004AR_MgmntDiscuss
 
Aplicación de airocide en cocinas industriales y cátering
Aplicación de airocide en cocinas industriales y cáteringAplicación de airocide en cocinas industriales y cátering
Aplicación de airocide en cocinas industriales y cátering
 
Alicia Chouinard Print and Web Portfolio
Alicia Chouinard Print and Web PortfolioAlicia Chouinard Print and Web Portfolio
Alicia Chouinard Print and Web Portfolio
 
St. Edward's PRSSA Chapter
St. Edward's PRSSA Chapter  St. Edward's PRSSA Chapter
St. Edward's PRSSA Chapter
 
Gift of Joy
Gift of JoyGift of Joy
Gift of Joy
 

Similaire à Two Businessess & An IP Fracas

Trade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryTrade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryKyle Conklin
 
2018 android-security-udacity-morrison chang
2018 android-security-udacity-morrison chang2018 android-security-udacity-morrison chang
2018 android-security-udacity-morrison changmjchang
 
Intellectual Property When Working With 3rd Party Developers
Intellectual Property When Working With 3rd Party DevelopersIntellectual Property When Working With 3rd Party Developers
Intellectual Property When Working With 3rd Party DevelopersSoftjourn, Inc.
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
 
Building a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing BlueprintBuilding a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing BlueprintNowSecure
 
Zero trusted networks: Why permiterer security is dead
Zero trusted networks: Why permiterer security is deadZero trusted networks: Why permiterer security is dead
Zero trusted networks: Why permiterer security is deadJochen Kressin
 
Web Isolation 101: Securing Web Apps against data exfiltration and shielding ...
Web Isolation 101: Securing Web Apps against data exfiltration and shielding ...Web Isolation 101: Securing Web Apps against data exfiltration and shielding ...
Web Isolation 101: Securing Web Apps against data exfiltration and shielding ...DefCamp
 
AiLibrary Garage.com application review - by Gordon Kraft
AiLibrary Garage.com   application review - by Gordon Kraft AiLibrary Garage.com   application review - by Gordon Kraft
AiLibrary Garage.com application review - by Gordon Kraft Gordon Kraft
 
Android P Security Updates: What You Need to Know
Android P Security Updates: What You Need to KnowAndroid P Security Updates: What You Need to Know
Android P Security Updates: What You Need to KnowNowSecure
 
Inventor Boot Camp Thomas Franklin 10 17 2009
Inventor Boot Camp   Thomas Franklin   10 17 2009Inventor Boot Camp   Thomas Franklin   10 17 2009
Inventor Boot Camp Thomas Franklin 10 17 2009dr2tom
 
The Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication JourneysThe Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication JourneysForgeRock
 
Industrial IoT, Machine Learning, and Innovation in the AWS Cloud
Industrial IoT, Machine Learning, and Innovation in the AWS CloudIndustrial IoT, Machine Learning, and Innovation in the AWS Cloud
Industrial IoT, Machine Learning, and Innovation in the AWS CloudAmazon Web Services
 
Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...
Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...
Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...Amazon Web Services
 
What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...Giulio Coraggio
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
From Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in EssenceFrom Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in EssenceSatria Ady Pradana
 
Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018Greg Wartes, MCP
 

Similaire à Two Businessess & An IP Fracas (20)

Trade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryTrade Secrets in the Video Game Industry
Trade Secrets in the Video Game Industry
 
2018 android-security-udacity-morrison chang
2018 android-security-udacity-morrison chang2018 android-security-udacity-morrison chang
2018 android-security-udacity-morrison chang
 
NSW-IOT-Summit-July2018.pdf
NSW-IOT-Summit-July2018.pdfNSW-IOT-Summit-July2018.pdf
NSW-IOT-Summit-July2018.pdf
 
Intellectual Property When Working With 3rd Party Developers
Intellectual Property When Working With 3rd Party DevelopersIntellectual Property When Working With 3rd Party Developers
Intellectual Property When Working With 3rd Party Developers
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
Building a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing BlueprintBuilding a Mobile App Pen Testing Blueprint
Building a Mobile App Pen Testing Blueprint
 
Zero trusted networks: Why permiterer security is dead
Zero trusted networks: Why permiterer security is deadZero trusted networks: Why permiterer security is dead
Zero trusted networks: Why permiterer security is dead
 
Web Isolation 101: Securing Web Apps against data exfiltration and shielding ...
Web Isolation 101: Securing Web Apps against data exfiltration and shielding ...Web Isolation 101: Securing Web Apps against data exfiltration and shielding ...
Web Isolation 101: Securing Web Apps against data exfiltration and shielding ...
 
AiLibrary Garage.com application review - by Gordon Kraft
AiLibrary Garage.com   application review - by Gordon Kraft AiLibrary Garage.com   application review - by Gordon Kraft
AiLibrary Garage.com application review - by Gordon Kraft
 
Android P Security Updates: What You Need to Know
Android P Security Updates: What You Need to KnowAndroid P Security Updates: What You Need to Know
Android P Security Updates: What You Need to Know
 
Don’t Play with the Law
Don’t Play with the LawDon’t Play with the Law
Don’t Play with the Law
 
Inventor Boot Camp Thomas Franklin 10 17 2009
Inventor Boot Camp   Thomas Franklin   10 17 2009Inventor Boot Camp   Thomas Franklin   10 17 2009
Inventor Boot Camp Thomas Franklin 10 17 2009
 
The Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication JourneysThe Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication Journeys
 
Industrial IoT, Machine Learning, and Innovation in the AWS Cloud
Industrial IoT, Machine Learning, and Innovation in the AWS CloudIndustrial IoT, Machine Learning, and Innovation in the AWS Cloud
Industrial IoT, Machine Learning, and Innovation in the AWS Cloud
 
Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...
Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...
Supercharge GuardDuty with Partners: Threat Detection and Response at Scale (...
 
BeingSign blockchain-based online signing system|Introduction
BeingSign blockchain-based online signing system|IntroductionBeingSign blockchain-based online signing system|Introduction
BeingSign blockchain-based online signing system|Introduction
 
What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...What changes for Internet of Things technologies with the EU Data Protection ...
What changes for Internet of Things technologies with the EU Data Protection ...
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
From Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in EssenceFrom Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in Essence
 
Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018
 

Plus de Antigone Peyton

Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceKill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceAntigone Peyton
 
A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)Antigone Peyton
 
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Antigone Peyton
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsAntigone Peyton
 
Big Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIABig Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIAAntigone Peyton
 
Angel & Devil: Danger of Emerging Technologies
Angel & Devil: Danger of Emerging TechnologiesAngel & Devil: Danger of Emerging Technologies
Angel & Devil: Danger of Emerging TechnologiesAntigone Peyton
 
Social Media for Litigators
Social Media for LitigatorsSocial Media for Litigators
Social Media for LitigatorsAntigone Peyton
 
Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Antigone Peyton
 
Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)Antigone Peyton
 
KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)Antigone Peyton
 
Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Antigone Peyton
 

Plus de Antigone Peyton (13)

Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical CompetenceKill the Dinosaurs, and Other Tips for Achieving Technical Competence
Kill the Dinosaurs, and Other Tips for Achieving Technical Competence
 
A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)A Litigator's Guide to the Internet of Things (IoT)
A Litigator's Guide to the Internet of Things (IoT)
 
Lawyers in the Cloud
Lawyers in the CloudLawyers in the Cloud
Lawyers in the Cloud
 
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...Protect That IP! Or the Art of Doing Business with the Government if You Sell...
Protect That IP! Or the Art of Doing Business with the Government if You Sell...
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy Implications
 
2013 SBIR Presentation
2013 SBIR Presentation2013 SBIR Presentation
2013 SBIR Presentation
 
Big Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIABig Changes in Patent Laws: Implementing the AIA
Big Changes in Patent Laws: Implementing the AIA
 
Angel & Devil: Danger of Emerging Technologies
Angel & Devil: Danger of Emerging TechnologiesAngel & Devil: Danger of Emerging Technologies
Angel & Devil: Danger of Emerging Technologies
 
Social Media for Litigators
Social Media for LitigatorsSocial Media for Litigators
Social Media for Litigators
 
Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)Taking Your Practice Into the Cloud (2011)
Taking Your Practice Into the Cloud (2011)
 
Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)Litigators’ Tool Box: Social Media (2011)
Litigators’ Tool Box: Social Media (2011)
 
KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)KIPO/KIPA Presentation: Direct Infringement (2010)
KIPO/KIPA Presentation: Direct Infringement (2010)
 
Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)Spoliation Wars & Other ESI Highlights (2010)
Spoliation Wars & Other ESI Highlights (2010)
 

Dernier

How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Associazione Digital Days
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 

Dernier (20)

How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 

Two Businessess & An IP Fracas

  • 1. A Tale of Two Small Businesses & An IP Fracas Antigone Peyton Cloudigy Law
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Setting the Stage Doomsday has a patent covering parts of the Super Public Defender software program Doomsday hasn’t registered anything with the Copyright Office Doomsday considers its customer list a trade secret It uses a basic employee and contractor agreement that doesn’t say anything about Intellectual Property rights Doomsday thinks it’s wrong for Heaven’s Arms to use some of its website material for a website associated with Heaven’s Arms’ games
  • 21. Patent Analysis Compare Patent Claims to Final Appeal software product If product is covered, then it infringes the patent Doesn’t matter whether Heaven’s Gate knows about patent Doomsday can get money or an injunction
  • 22. Heaven’s Arms Website
  • 23.
  • 24. Website No registrations Copyright Text, Images, maybe some code Trademark Icons, Logos, Images
  • 26. Trade Secrets Customer list can be a trade secret in some circumstances Depends on what Doomsday does to protect it and whether it treats it like a trade secret
  • 27. Factors to Consider Employee & contractor agreements restrict access & use Technical and practical steps taken to protect it Competitive advantage to business to keep it a trade secret Each situation is different
  • 29. Employee Agreements They don’t discuss what happens if employees invent something, or create something that is protectable by trademark, copyright, or trade secret law Problem!!
  • 30. Jack Ryan’s Work Code for several software games made up some game images for the company created some artwork for several games added potential customer contacts he knew personally to the customer list
  • 32. Questions?? Antigone Peyton, Esq. President & Founder, Cloudigy Law (703) 436-2033 antigone.peyton@cloudigylaw.com Twitter: @antigonepeyton; @cloudigylaw Facebook: http://www.facebook.com/CloudigyLaw LinkedIn: http://www.linkedin.com/in/antigonepeyton Cloudigy blog: http://cloudigylaw.com/news/