Developments and Directions in Intellectual Property Law

Developments and Directions in Intellectual Property Law
Author: Hayleigh Bosher
Publisher: Oxford University Press
Total Pages: 753
Release: 2023-05-24
Genre: Law
ISBN: 0192679678

Developments and Directions in Intellectual Property Law celebrates the 20th anniversary of award-winning intellectual property (IP) blog, The IPKat, originally founded in 2003. Over the past two decades, The IPKat has covered and commented on several of the most topical developments in the IP field from substantive, practical, and policy standpoints. Today, The IPKat is considered the “Most Popular Intellectual Property Law Blawg” of all time (source: Justia) and its readers are academics, members of the judiciary, policy and law-makers, practitioners, and students from all over the world. By bringing together several of the current and past contributors to The IPKat, this book reflects on the developments and directions that have emerged in the IP field over the past twenty years. Topics covered include changes within substantive IP rights, as well as IP law, policy, and practice broadly intended and from a global perspective. From copyright to trade marks, patents to designs, image and publicity rights to geographical indications, and developments in IP practice and the court system to contract drafting, readers of this book will find expert insights into some of the most notable developments in IP since the inception of The IPKat blog.

CYBERSECURITY LAW

CYBERSECURITY LAW
Author: MICHAEL S.. JR. MIRELES (JACK L. HOBAUGH.)
Publisher:
Total Pages:
Release: 2020
Genre:
ISBN: 9781647084561

Work in the Digital Age

Work in the Digital Age
Author: Miriam A. Cherry
Publisher: Aspen Publishing
Total Pages: 710
Release: 2021-01-31
Genre: Law
ISBN: 1543823289

The first of its kind, this coursebook examines the work of the future. Work in the Digital Age: A Coursebook on Labor, Technology, and Regulation focuses on certain technologies: the platform economy and gig work, big data and people analytics, gamification, artificial intelligence and algorithmic management, blockchain technology, drones, and 3D printing. The book provides perspectives on these new and emerging technologies from employers, unions, individual workers, national courts and governments, and international organizations. Altogether, the book questions whether current systems of labor and employment regulation are adequate and appropriate to respond to these new technologies. Finally, the book examines potential policy solutions to technological unemployment including universal basic income, shorter hours, and job guarantees. The best way to shape the future of work is to create the policy changes that we wish to see now, and this book provides a blueprint for thinking about a future of work that is productive, efficient, equitable, and sustainable. Professors and student will benefit from: A focus on certain technologies: The platform economy and gig work Big data and people analytics Gamification Artificial intelligence and algorithmic management Blockchain technology Drones 3D printing Global perspectives on these new and emerging technologies from employers, unions, individual workers, national courts and governments, and international organizations Exploration of whether new systems of labor and employment regulation are necessary to better respond to these new technologies Discussion of potential policy solutions to technological unemployment including universal basic income, shorter hours, and job guarantees Notes and Questions, Problems, Exercises, and Examples, to help reinforce concepts and issues

The Logic of the Transfer Taxes

The Logic of the Transfer Taxes
Author: Laura Cunningham
Publisher: West Academic Publishing
Total Pages: 253
Release: 2020-12-29
Genre:
ISBN: 9781647081133

The Logic of the Transfer Taxes: A Guide to the Federal Taxation of Wealth Transfers offers a broad survey of the federal transfer tax system. It thoroughly covers all of the fundamental rules of the gift, estate and generation skipping transfer taxes and provides numerous illustrative examples. It also offers a glimpse of some popular tax planning techniques, including FLPs, GRATS and IDGT'S, and the Special Valuation Rules of Chapter 14. It is appropriate for use as a coursebook for a two or three credit JD or LLM course, or as a reference for newcomers to the area. The Second Edition incorporates changes to the law made by the Tax Cuts and Jobs Act of 2017.

Cybersecurity Law

Cybersecurity Law
Author: Michael Salomon Mireles
Publisher:
Total Pages:
Release: 2022
Genre: Computer security
ISBN: 9781685610883

"This book provides a relatively comprehensive examination of cybersecurity related laws that would be helpful for lawyers, law students, and Chief Information Security Officers (CISOs) and other cybersecurity and privacy professionals. The book outlines and details the U.S. federal sectoral approach to cybersecurity, such as covering the Gramm-Leach-Bliley Act and regulations, and the Health Insurance Portability and Accountability Act Security Rule, as well as an examination of state laws impacting cybersecurity, such as data breach notification, privacy and state education laws. International issues as well as specific topics such as ransomware and the Internet of things are addressed. Notably, the book provides a review of the role of the cybersecurity professional, risk assessment as well as the National Institute of Standards and Technology (NIST) risk assessment framework, and laws related to hacking." -- Publisher.

Innovation and Its Discontents

Innovation and Its Discontents
Author: Adam B. Jaffe
Publisher: Princeton University Press
Total Pages: 253
Release: 2011-05-27
Genre: Business & Economics
ISBN: 1400837340

The United States patent system has become sand rather than lubricant in the wheels of American progress. Such is the premise behind this provocative and timely book by two of the nation's leading experts on patents and economic innovation. Innovation and Its Discontents tells the story of how recent changes in patenting--an institutional process that was created to nurture innovation--have wreaked havoc on innovators, businesses, and economic productivity. Jaffe and Lerner, who have spent the past two decades studying the patent system, show how legal changes initiated in the 1980s converted the system from a stimulator of innovation to a creator of litigation and uncertainty that threatens the innovation process itself. In one telling vignette, Jaffe and Lerner cite a patent litigation campaign brought by a a semi-conductor chip designer that claims control of an entire category of computer memory chips. The firm's claims are based on a modest 15-year old invention, whose scope and influenced were broadened by secretly manipulating an industry-wide cooperative standard-setting body. Such cases are largely the result of two changes in the patent climate, Jaffe and Lerner contend. First, new laws have made it easier for businesses and inventors to secure patents on products of all kinds, and second, the laws have tilted the table to favor patent holders, no matter how tenuous their claims. After analyzing the economic incentives created by the current policies, Jaffe and Lerner suggest a three-pronged solution for restoring the patent system: create incentives to motivate parties who have information about the novelty of a patent; provide multiple levels of patent review; and replace juries with judges and special masters to preside over certain aspects of infringement cases. Well-argued and engagingly written, Innovation and Its Discontents offers a fresh approach for enhancing both the nation's creativity and its economic growth.

Cybersecurity Law

Cybersecurity Law
Author: MICHAEL S.. HOBAUGH MIRELES (JACK L.)
Publisher: West Academic Publishing
Total Pages: 253
Release: 2021-07-26
Genre:
ISBN: 9781636590202

This book is for cybersecurity and privacy professionals, cybersecurity and privacy lawyers, law students, and anyone interested in learning the cybersecurity laws that apply to an entity based on the entity's business model(s) and data collection model(s). For example, what is the applicable Securities and Exchange Commission (SEC) cybersecurity law if an entity provides an alternate trading platform (ATP) with a daily trading volume of 50,000? The authors combine years of technical and legal experience in providing a map for cybersecurity counseling based on an understanding of the CISO's technical cybersecurity issues and how they fit into today's cybersecurity law challenges. The authors explain the difference and overlap between privacy law, cybersecurity law, and cybersecurity. Those interested in speaking the same cybersecurity language as a Chief Information Security Officer (CISO) will benefit. The first chapter provides a review of cybersecurity. For example, key to any discussion on cybersecurity is the Confidentiality, Integrity, and Availability (CIA) of data. Learn how to implement policy-based "reasonable security measures" frameworks for your organization that form a legal defense to cybersecurity-based actions brought by U.S. agencies such as the Federal Trade Commission (FTC) and state Attorney Generals. A high-level discussion of the National Institute of Science and Technology (NIST) cybersecurity frameworks is included as well as data breach laws, anti-hacking related laws and some international issues.

Cybersecurity Law, Standards and Regulations, 2nd Edition

Cybersecurity Law, Standards and Regulations, 2nd Edition
Author: Tari Schreider
Publisher: Rothstein Publishing
Total Pages: 325
Release: 2020-02-22
Genre: Law
ISBN: 1944480587

In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may not be a legal expert. Fortunately, in a few hours of reading, rather than months of classroom study, Tari Schreider’s Cybersecurity Law, Standards and Regulations (2nd Edition), lets you integrate legal issues into your security program. Tari Schreider, a board-certified information security practitioner with a criminal justice administration background, has written a much-needed book that bridges the gap between cybersecurity programs and cybersecurity law. He says, “My nearly 40 years in the fields of cybersecurity, risk management, and disaster recovery have taught me some immutable truths. One of these truths is that failure to consider the law when developing a cybersecurity program results in a protective façade or false sense of security.” In a friendly style, offering real-world business examples from his own experience supported by a wealth of court cases, Schreider covers the range of practical information you will need as you explore – and prepare to apply – cybersecurity law. His practical, easy-to-understand explanations help you to: Understand your legal duty to act reasonably and responsibly to protect assets and information. Identify which cybersecurity laws have the potential to impact your cybersecurity program. Upgrade cybersecurity policies to comply with state, federal, and regulatory statutes. Communicate effectively about cybersecurity law with corporate legal department and counsel. Understand the implications of emerging legislation for your cybersecurity program. Know how to avoid losing a cybersecurity court case on procedure – and develop strategies to handle a dispute out of court. Develop an international view of cybersecurity and data privacy – and international legal frameworks. Schreider takes you beyond security standards and regulatory controls to ensure that your current or future cybersecurity program complies with all laws and legal jurisdictions. Hundreds of citations and references allow you to dig deeper as you explore specific topics relevant to your organization or your studies. This book needs to be required reading before your next discussion with your corporate legal department. This new edition responds to the rapid changes in the cybersecurity industry, threat landscape and providers. It addresses the increasing risk of zero-day attacks, growth of state-sponsored adversaries and consolidation of cybersecurity products and services in addition to the substantial updates of standards, source links and cybersecurity products.