You click on an email. It looks like some sort of letterhead, maybe a law firm. You scroll down a little, in all caps and bold says “VIA PDF EMAIL AND US MAIL AS CERTIFIED LETTER.” You dismiss it, maybe glance at the RE: line, but you are busy. It may be junk or a […]
Uncategorized
Mastering IP Vocabulary
It can be important for CEOs and other business people to master intellectual property vocabulary. What really is the difference between data sovereignty, data rights, data protection, and data security? http://ow.ly/4n2Rw3
Tempestuous Negotiation?
Here are a few strategies to defuse the situation: http://ow.ly/4mNg0s
Negotiation Styles Around the World
Can paying attention to the cultural roots of behavior and communication patterns across the globe help us better prepare for a negotiation? http://ow.ly/10sqYs
Can a Language be Copyrighted?
CBS and Paramount have brought a copyright infringement suit against the creators of a Star Trek fan film, “Axanar.” One of their infringement claims involves use of the “Klingon” language, but can a language be copyrighted? Courts have yet to squarely resolve the issue. https://www.washingtonpost.com/news/volokh-conspiracy/wp/2016/03/24/to-boldly-go-where-no-copyright-suit-has-gone-before/
Common Goals Not Necessarily Needed for a Win-Win Negotiation
Knowing each party’s interests and designing options that satisfy those interests can lead to a win-win outcome even when common goals are not present in a negotiation: http://bit.ly/1RgvgSZ
Choosing Between Patents or Trade Secret Protection
The decision safeguard your invention with a patent or trade secret protection depends on a number of factors: http://blog.legalsolutions.thomsonreuters.com/small-law-firms/the-patent-or-padlock-dilemma-factors-in-choosing-between-patent-and-trade-secret-protection/
Apple continues fight with FBI over data security and encryption
Is compelling Apple to bypass its privacy technology unduly burdensome? http://www.bna.com/forcing-apple-bypass-n57982067672/
Information Security: The Beer, Burrito, and Bytes of Brand
By Martin Medeiros In college we used to go to the Black Rooster Pub on 1919 L Street in D.C. because they sold Bass Ale, one of a few European style beers around before the microbrewery revolution. Little did I know that in a few years I would learn that the Bass Ale red triangle […]
New Breach at Scottrade
Back from the annual Privacy.Security.Risk 2015 meeting in Las Vegas. Three days of intense review on cases, responses and trends. Looking at the case studies of breaches, it is interesting this headline is so fresh. There were many data reports from Bloomberg, law firms, security firms with data on the level of intrusion. I am […]