• Vinayak Kohli
    Vinayak Kohli
    • over 8 years ago
    • Practical Guidance Journal
    • pa

    Mobile App Privacy Considerations

    By: Mark W. Brennan , Hogan Lovells US LLP. AS THE USE OF MOBILE DEVICES SUCH AS SMARTPHONES and tablets has become increasingly prevalent, mobile applications (mobile apps or apps) have also proliferated. Consumers use mobile apps to access social...
  • Vinayak Kohli
    Vinayak Kohli
    • over 7 years ago
    • Practical Guidance Journal
    • pa

    Strategies for Bringing Counterclaims or Separate Lawsuits Against Plaintiff Employees

    By: Daniel A. Kaplan , FOLEY & LARDNER LLP This article provides guidance to employers on bringing counterclaims or separate lawsuits against plaintiff employees who have initiated claims against the employer. Employers and their attorneys are usually...
  • Sherica Celine
    Sherica Celine
    • over 2 years ago
    • Practical Guidance Journal
    • pa

    Expungement and Reexamination Proceedings under the Trademark Modernization Act

    By: Jessica D. Bradley JONES DAY LLP This article discusses ex parte expungement and reexamination proceedings at the U.S. Patent and Trademark Office (USPTO). SUCH PROCEEDINGS SEEK FULL OR PARTIAL CANCELLATION of federal trademark registrations that...
  • Sherica Celine
    Sherica Celine
    • over 3 years ago
    • Practical Guidance Journal
    • pa

    Defending Trade Secrets Under the Economic Espionage Act

    By: Eric E. Bensen. The Defend Trade Secrets Act (DTSA) 1 creates for the first time a federal private cause of action for trade secret misappropriation. 2 Prior to the DTSA’s enactment, private causes of action for trade secret misappropriation...
  • Vinayak Kohli
    Vinayak Kohli
    • over 8 years ago
    • Practical Guidance Journal
    • pa

    Helping Protect Clients from Cyber Threats

    By: Geoffrey H. Wold As cyber criminals become more sophisticated in their efforts to target cyber victims, organizations must also grow their capabilities to successfully combat and defeat them. The evolving nature of Internet crime presents a unique...
<>