TM is for Trademarks

Nearly two years ago we wrote about the Washington Redskins and its efforts to maintain their registration of REDSKINS, which the Trademark Trial and Appeal Board cancelled because it was disparaging of Native Americans.  The U.S. Supreme Court took up the cause in an unrelated case, Matal v. Tam, and held that section 2(a) of […]

Designs for patents

In last May’s newsletter we told you about proposed changes to the patent statute to, hopefully, correct some of the damage that the Supreme Court has done to the U.S. patent system over the last decade.  Among other things, the Supreme Court has expanded the judge-made categories of inventions that cannot be patented to include […]

Question on a Keyboard

Dear Doc: Lately I have been reading a lot about “deep fakes”, which seem to be photos and videos that have been edited for propaganda purposes. Isn’t it against the law to do that? Why don’t the copyright police put an end to such deceptions so that the public may once again be able to […]

Designs for patents

There are some great inventions that cannot be protected by patent.  Laws of nature, such as electromagnetism , cannot be patented.  Abstract ideas, such as mathematical formulae , cannot be patented.  Natural phenomena, such as a naturally occurring bacteria, cannot be patented.  These judge-made exceptions to ‘patentable subject matter’ do not appear in the statute.*   In recent years, the Supreme Court has issued decisions that […]

Internet Domains

The Amazon River is the longest, mightiest river in the world.  Its headwaters lie in the Andes of Peru but numerous rivers of the Amazon Basin drain into the Amazon River as it meanders towards the Atlantic Ocean. The Amazon Basin, or Amazonas, is massive, comprised of seven countries – Bolivia, Colombia, Ecuador, Guyana, Peru, […]

Internet Domains

Bad actors are after your data.  They want to turn your data into money any way that they can.  That may involve using your data to steal your online banking passwords and account numbers, or may involve stealing personal and contact data to make a phishing attack more convincing and effective.  Why?  So that you […]