Monday, January 18, 2016

Our newsletter, The Sky Report, addresses trademarks and how business owners need to think about them. Click here:  "Don't use trademark as a verb:What is important in trademark law".

Thursday, July 16, 2015

Our firm is changing its name to Clear Sky Law Group, P.C.

We are changing our firm name to Clear Sky Law Group, P.C.  Here is our latest newsletter about our name change. 
The Morton Memo July 2015

Saturday, October 25, 2014

What is in a name may be false advertising. Newsletter October 2014

Our latest newsletter with an article on false advertising as it relates to trademarks.

Thursday, April 3, 2014

Confidentiality Agreements and small firms vs. big firms - Newsletter for April 2014

We just published the latest Morton Memo with articles about the enforceability of confidentiality agreements and small firms vs. big firms.

Sunday, January 26, 2014

Newsletter January 2014 - Trademarks; and Cell Phone Tower Lease Trends

Our latest newsletter.  Articles by Mike Ritter, on cell phone tower lease trends, and Anna Burnett, on trademarks.

Sunday, September 15, 2013

Employee Theft is Rampant

Employee theft has become a rampant problem.  Several our of clients have had employees steal customer lists, designs, website content, and other intellectual property.  Other clients have been embezzled. Thieving employees have become more sophisticated in looking for ways to access confidential information.

Once the theft has happened, it is almost impossible to undo the damage.  I have seen cases of substantial embezzlement of money not investigated by the police.  Intellectual property theft is never prosecuted.  IP theft is also difficult to litigate.  Trade secret theft is difficult to prove since proving something is a trade secret is difficult.  Trademarks and copyrights must be registered before they are infringed to effectively bring suit. Non-disclosure agreements and confidentiality agreements are often not enforceable.

Business owners must be very proactive today.  Some suggestions to business owners regarding their intellectual property:

1.  Assume your workers (employees, consultants, contractors) are going to rip you off.  Sooner or later, one of your workers is going to try to take confidential information or steal from you.

2.  Have all persons who work for you sign carefully drafted, detailed non-disclosure agreements, consulting contracts and employment contracts.  Do not make them over broad but tailor them to your business and IP that you have.

3.  Make an assessment of your IP. What do information, content, formulas, customer lists, etc. do you have? Look at where it is stored and who has access to it. How is it controlled?

4.  Make and implement and IP Protection Plan.  Your plan should include:

     a. Labeling trade secrets as such (e.g. putting a watermark labelled "Trade Secret of XYZ, Inc." on such information).
      b. Revising NDA's and other contracts to specify information that is confidential and not to be disclosed.  And, ensuring that such contracts are enforceable.  If such a contract is too restrictive, a court will find it violates California's anti-noncompete laws.
      c.  IP security.  Make sure that any sensitive information, designs, etc. are kept under lock and key (if tangible).  If in digital form, ensure that it can only be accessed by persons given permission - and they must have a password and username.
      d.  Assign and change usernames and passwords.  Assign usernames and passwords to workers for computer networks and email accounts.  Do not allow them to choose them or the ability to change usernames or passwords.  Change usernames and password frequently.
      e.  Strong computer use policy.  Have a clearly stated computer policy that prohibits the use of computers and email accounts for personal use.  There is no reason, in the age of smart phones, that employees will have any need to use work computers and email accounts for personal use.  There is no reason for a work email account to contain personal contact information. Strictly prohibit workers from giving their usernames and passwords to anyone else, including a fellow worker.

5.  Obtain IP registrations.  If a business has a large amount of content, particularly on a website, it should obtain copyright registrations.  Trademarks should be protected by trademark registrations.  Inventions that can be protected by patents should be unless the cost is prohibitive or not cost effective.

The above steps do not take into account employee theft of tangible property or embezzlement of company money. To prevent theft of tangible property, place controls on the use and possession of such property and follow up.  To prevent embezzlement, regularly review the books of the company and hire outside accountants to audit the financial records.  Do not allow anyone to have unfettered access to financial records or bank accounts.  Be familiar with the vendors of your company and what they charge.

The above steps and others will take time and money to implement.  Consultation with IT professionals, accounts and attorneys is also necessary.  However, it will be well worth it prevent the theft of valuable assets.

Wednesday, August 28, 2013

Newsletter - Protecting Privacy Data and Intent to Use trademark registrations

We published a newsletter today.  The articles are about protecting private data that companies may not know they have and Intent to Use trademark applications.
The Morton Memo August 2013