Close
Login to MyACC
ACC Members


Not a Member?

The Association of Corporate Counsel (ACC) is the world's largest organization serving the professional and business interests of attorneys who practice in the legal departments of corporations, associations, nonprofits and other private-sector organizations around the globe.

Join ACC

March 8, 2022 | 9:00 AM - 1:00 PM EST

Zoom Webinar

Pricing
Members: Complimentary

Overview (Program Summary)

A program hosted by:

ACC Greater Philadelphia
AGENDA:
  • 9:00 a.m. to 10:00 a.m. - Session I, Baker & Hostetler LLP

  • 10:00 a.m. to 10:30 a.m. - BREAK

  • 10:30 a.m. to 11:30 a.m. - Session II, Greenberg Traurig, LLP

  • 11:30 a.m. to 12:00 p.m. - BREAK

  • 12:00 p.m. to 1:00 p.m. - Session III, Womble Bond Dickinson (US) LLP

Session I – Extraterritorial Reach of United States Law in U.S. and Non-U.S. Patent Litigation

Join Partner Stephanie Lodise, Ph.D. of BakerHostetler and J. Eric Sumner of TEVA Pharmaceuticals as they give a summary of 35 USC 271(g), and how it’s used in US patent prosecution and litigation. Additionally, they will present a summary of how 28 USC 1782 has been used to obtain U.S. discovery in non-U.S. contested proceedings.

Session II – When Your Social Life Goes South: Best Practices for Protecting Your Brand in the World of Handle Hijacking

From hashtags to reposts, modern advertising is dominated by all things social media. While this medium provides unparalleled opportunities for brand owners to directly engage consumers, it also presents competitors and brand pirates with new ways to infringe or otherwise hijack legitimate brands.

Since the outbreak of the COVID-19 pandemic in 2020, brands have reasonably ramped up efforts to expand e-commerce verticals and connect with consumers via social media. Simultaneously, brand pirates have rapidly worked to expand their own efforts to commit online piracy. Such piracy increasingly involves brand hijackers hacking into a brand owner’s social media account or otherwise targeting brand owners’ legitimate social media accounts through nefarious means. Whether via hacking or by creating knock-off accounts and handles, pirates remain creative in the strategies they deploy to unlawfully commandeer the goodwill associated with legitimate brands.

To this end, it is more important than ever for brand owners to arm themselves with awareness of this growing trend and to understand strategies they themselves can proactively deploy to mitigate the threat and better enforce their brands.

This presentation will offer an overview of the current brand hijacking landscape, the technologies used by these brand pirates, the trends and emerging legal strategies for proactive mitigation to these threats.

Session III – Recent Developments in Trade Secret Law: May Three Keep a Secret if Two of Them Aren’t Dead?

As set forth in Poor Richard’s Almanac, Benjamin Franklin stated, "Three may keep a secret, if two of them are dead."  But how do secrets work in the real world context of an in-house lawyer trying to legally protect the trade secrets of his or her client in 2022?  When is something secret?  Who owns a secret?  When might a non-disclosure agreement defeat a claim of misappropriation of a secret?  What measures should you take to protect a secret?  Do you have any recourse if your competitor stole your client’s secret but has not yet launched its product?  We will answer these questions and more in the view of recent trade secret decisions in the Third Circuit and beyond.

Register below.  The Zoom link will be provided with your completed registration, and is also shown below.

 

https://accinhouse.zoom.us/j/91619306798

Interest Area(s): Intellectual Property

Speakers

Session I:
Session II:
Session III:

CLE

Credits: 3.0 hours
State: PA, NJ & DE
Category: Substantive

Contact (RSVP)

Sponsored By

ACC

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookies policy and our privacy policy.

Accept