Volume 18

Apr
17

With the rapid growth of technological innovations in today’s society, manufacturers are in constant competition with one another to produce the best looking and most distinct products on the consumer market. To prevent an inventor’s new and unique design from replication, Congress established the design patent to protect the appearance of any new, original, and

Apr
17

On July 21, 2015, in light of emerging technology involving autonomous driving vehicles, the United States Senate proposed Senate Bill 1806, or the Security and Privacy in Your Car Act, to address issues surrounding these technologies. The “SPY Car Act” attempts to address issues surrounding cybersecurity, data privacy, and hacking of autonomous driving vehicles. The

Apr
17

For nearly the past decade, Bitcoin has found itself in a state of non-regulation, ambiguous regulation, and conflicting regulation, with several interested agencies vying for effective regulation of an often misunderstood technology. Early run-ins with large-scale criminal enterprises in large part created the multi-directional regulatory attention Bitcoin “enjoys” today. Even while many businesses and individuals

Dec
23

The United States Congress recently passed the U.S. Commercial Space Launch Competitiveness Act (“CSLCA”). Title IV of the Act ultimately recognized commercial property rights in resources extracted from extraterrestrial bodies. Consequently, the passage of such legislation has once again brought property rights in outer space to the forefront of legal discussion. Although some have said

Dec
23

Today’s universities and colleges offer a multitude of programs focused on innovation, product development, and entrepreneurship. Students and faculty members are encouraged to create products that can be commercialized. 2 Universities nurture innovation and entrepreneurship in order to foster economic growth and create jobs in their communities and regions. They see entrepreneurship as a new

Dec
23

Central Intelligence Agency Director, Leon Panetta, states in his Secretary of Defense confirmation testimony before the Senate Armed Services Committee that, “[t]he next Pearl Harbor that we confront could very well be a cyberattack that cripples America’s electrical grid and its security and financial systems.” Cyberattacks have become a daily threat to businesses, consumers, and all

Dec
23

For years the world of software programming has been operating under the assumption that both the declaration code and the structure, sequence, and organization (SSO) of Java application program interfaces (APIs) were not copyrightable and were therefore free for all to use. However, when Oracle sued Google in 2014 for Google’s use of Java APIs

Dec
23

The drug industry is one of the most lucrative in the United States. Drug manufacturers routinely find themselves thrust into patent infringement litigation against generic manufacturers who are motivated by high potential returns from the marketplace. In lieu of expensive and time-consuming litigation, brand and generic manufacturers will often enter into settlement agreements; however, these

Categories