• Vinayak Kohli
    Vinayak Kohli
    • over 8 years ago
    • Practical Guidance Journal
    • pa

    Planning & Managing a Data Breach

    By: Elizabeth C. Rogers , Greenberg Traurig, LLP. A data breach occurs when sensitive, protected, and/or confidential information is stolen, accessed, or used without authorization. The information may include an individual’s personally identifiable...
  • Sherica Celine
    Sherica Celine
    • over 3 years ago
    • Practical Guidance Journal
    • pa

    Defending Trade Secrets Under the Economic Espionage Act

    By: Eric E. Bensen. The Defend Trade Secrets Act (DTSA) 1 creates for the first time a federal private cause of action for trade secret misappropriation. 2 Prior to the DTSA’s enactment, private causes of action for trade secret misappropriation...
  • Vinayak Kohli
    Vinayak Kohli
    • over 9 years ago
    • Practical Guidance Journal
    • pa

    Challenges of Taxing the Sharing Economy

    By: Jessica L. Kerner IN 2007, A HOTEL ROOM SHORTAGE IN SAN FRANCISCO prompted two roommates to create a website to rent out air mattresses in their apartment. Less than eight years later, the company they founded, Airbnb, has been valued at more than...
  • Vinayak Kohli
    Vinayak Kohli
    • over 6 years ago
    • Practical Guidance Journal
    • pa

    Current Updates and Legal Developments—Summer 2018

    SUPREME COURT AFFIRMS CONSTITUTIONALITY OF AIA PATENT REVIEW PROCESS A PROVISION IN THE AMERICA INVENTS ACT (AIA) allowing for pre-trial review of existing patents does not violate Article III or the Seventh Amendment of the U.S. Constitution, the U...
  • Vinayak Kohli
    Vinayak Kohli
    • over 4 years ago
    • Practical Guidance Journal
    • pa

    IP Licensing in the Age of Coronavirus

    By: Catriona Collins , Lexis Practice Advisor While there have been no changes to U.S. intellectual property law as a direct result of the coronavirus crisis, the pandemic has changed the world in which intellectual property licenses operate. This article...
<>