Welcome to the BAT-Nicoventure Trading Video-Based Training Library
Presented by Executive IP
Please click on a title to view the material
Intellectual Property | ||||
15 | Intellectual Property and Innovation | 40 Videos | ||
Modules (~3 to 18 minutes) | Info | Duration | ||
15-1 | Intellectual Property General Awareness | This module will provide users with a high-level overview of patents, copyrights, trademarks, trade secrets, and confidentiality. It is generally intended as an introduction to more detailed programs for each. | 18:54 | |
15-31 | Importance of Lab Notebooks Post America Invents Act (AIA) | A look at five good reasons for maintaining lab notebooks after the passage of the American Invents Act. | 8:03 | |
15-32 | Importance of Lab Notebooks | A look at five good reasons for maintaining lab notebooks. | 6:05 | |
15-33 | IP Contamination | A look at IP contamination. What is it, how is it harmful, and how can you avoid it? | 4:53 | |
15-34 | Product Contamination | What is product contamination? How does it occur, what are the risks, and how can you avoid it? | 5:07 | |
15-35 | Why Should Everyone Care About Intellectual Property? | A look at intellectual property. Why is it important, and how can it help your business to succeed? | 3:45 | |
15-36 | Why Should Sales Professionals Care About IP? | A look at intellectual property. Why is it important to sales professionals, and how can it help them to succeed? | 4:32 | |
15-37 | What to Do with Unsolicited Business Ideas | A look at intellectual property. Why is it important to sales professionals, and how can it help them to succeed? | 4:51 | |
15-38 | Considerations for IP Decisions in Connection with Innovative Ideas | What are the common considerations for IP decisions in connection with innovative ideas? A look at the four main options are: a patent application. a trade secret, a defensive publication, fourth, nothing. | 12:55 | |
15-39 | IP Risks and Opportunities Touch Every Part of a Business | 8:13 | ||
15-40 | IP Risks Associated with Copying Competitive Products | 6:40 | ||
Micro Modules (~1 minute) | Duration | |||
15-2 | What is Intellectual Property? | 0:44 | ||
15-3 | What Types of Intellectual Property Are there? | 0:56 | ||
15-4 | Can a Product or Process be Protected by More than One Kind of Intellectual Property? | 0:59 | ||
15-5 | What is the Difference Between a Patent and a Trade Secret? | 0:54 | ||
15-6 | What is the Difference Between a Patent and a Trademark? | 1:10 | ||
15-7 | Who Owns the Intellectual Property in a Joint Development Relationship? | 1:29 | ||
15-8 | Who Owns the Intellectual Property in a Services Relationship? | 1:14 | ||
15-9 | Why Do You Need an IP Strategy as an Embedded Part of Your Business Strategy? | 1:09 | ||
15-10 | Why is Being Religiously Tied to a “Not Invented Here” Mentality Dangerous? | 1:11 | ||
Vignettes (~1 to 6 minutes) | Info | Duration | ||
15-11 | Introduction to IP Ownership Issues | An introduction to the scenarios. | 3:38 | |
15-12 | When Should You Start Thinking About Intellectual Property? | A discussion of when you should begin to think about IP protection in connection with product development. | 2:39 | |
15-13 | What is a Patent? | A discussion about patents. | 2:31 | |
15-14 | What is a Patent Claim? - Example | A discussion of patent claims. | 2:28 | |
15-15 | What is the Process when Dealing with Patent Examiners? | A discussion of the process in dealing with patent examiners. | 0:56 | |
15-16 | What is Prior Art? | A discussion of prior art. | 3:27 | |
15-17 | Involve IP Counsel as Early as Possible | A discussion of the need to contact IP counsel as early as possible. | 1:57 | |
15-18 | Do You Have to Be an Inventor to Be Listed as an Inventor on a Patent? | A discussion of the need to be an inventor to be listed as an inventor on a patent? | 1:44 | |
15-19 | Careful Communications | A discussion of being careful in emails and other written exchanges. | 3:16 | |
15-20 | What Are Your Options if You Are Potentially Infringing a Patent? | A discussion of options if you are potentially infringing a patent. | 4:43 | |
15-21 | What is a Product Clearance Search? | A discussion of product clearance searching. | 0:56 | |
15-22 | What is a Trade Secret? | A discussion of trade secrets. | 3:45 | |
15-23 | What is a Trademark? | A discussion of trademarks. | 3:09 | |
15-24 | What is a Copyright? | A discussion of copyrights. | 3:53 | |
15-25 | Open Source and Free Software | A discussion of Open Source & Free Software. | 1:29 | |
15-26 | Confidential Information and NDAs | A discussion of Confidential information and NDAs. | 4:53 | |
15-27 | IP Ownership Issues | A discussion of IP Ownership Issues. | 6:08 | |
15-28 | Categories of IP Ownership in Contracts | A discussion of Categories of IP Ownership in Contracts. | 7:12 | |
15-29 | How to Avoid Invisible Risks with Indirect Contractors | A discussion of How to avoid Invisible Risks with indirect contractors. | 2:22 | |
15-30-120-1 | IP: The Movie | A movie describing all aspects of IP fundamentals. | 1:11:45 | |
20 | Patent Fundamentals | 112 Videos | ||
Modules (~3 to 19 minutes) | Info | Duration | ||
20-1 | What is a Patent? | What is a patent? What are savvy companies doing with patents? Why should you be concerned about competitive patents or patents owned by non-practicing entities? Where is the power in the patent? As a general matter, what is a claim, and how does it work? | 5:49 | |
20-2 | What is Patent Infringement? | How do you infringe a patent? How do you design around a patent? We will use a simple product example to show this; a chair. A chair is a useful product example because it is well known, it has obvious components, and with a chair, executives will be able to easily understand the concept of infringement and designing around patents. | 8:16 | |
20-3 | How Can You Have a Patent and Still not be Able to Make Your Patented Product? | A brief description of the concept that a patent does not give the assignee or patentee the right to make, use, or sell, but only the right to exclude others from making, using, and selling. We will continue with the with chair example and describe situations where you can own a patent on a chair, and can still infringe another, more broad chair patent by making your own patented chair. And, we will discuss the value of having a narrow patent. For example, even though the owner of the broader patent can block you, with your narrower patent, you can also block that broad patent owner from making your patented chair. | 3:24 | |
20-4 | What is a Patent Fence and What Can You Do About it? | A brief description of the patent fence concept using simple examples with our chair. Our core patent claim will be an apparatus for sitting comprised of a back, a seat, and one or more legs. We will demonstrate a patent fence by having a competitor invent and patent a chair with the various extra features such as a footrest, a headrest, and wheels on the base. And we will demonstrate how that competitive patent fence can devalue our broad patent. | 5:12 | |
20-5 | What Are Patent Trolls and Why Should they Scare You to Death? | The worldwide landscape is covered with predators. Who is coming after you? What is a troll or non-practicing entity? Where does the term come from? Can they legally do what they do? What are their strengths? What are their weaknesses? What are some basic defenses that can be used to block trolls? | 12:18 | |
20-6 | Publishing and Defensive Publications | This module will briefly respond to the following Questions: What is publication and why can it result in the loss of your own patent rights? Trade Secret rights? What is publication clearance and why is it useful? What is defensive publishing? How can it help to block competitive patents? How can it reduce worldwide patent costs? What are the best practices for defensive publishing? | 7:54 | |
20-7-60-1 | What is Prior Art and Why is it Important to My Business? | What is prior art searching and competitive landscaping, and how do these functions relate to your business? We will discuss Freedom to Operate (FTO), Invalidity, Patentability, patents for competitive intelligence, and general reports for these functional needs. | 6:44 | |
20-8 | What is a Design Patent? | What is a design patent? How do design patents overlap with trademarks? A comparison of design patents with utility patents. What are some examples of design patents? What are the Key differences between copyrights and design patents? | 9:58 | |
20-9 | Inventorship | We will talk about your status as an inventor on a patent; a topic some people call inventorship. Who should be listed as an inventor on a patent? We will use several examples to illustrate the appropriate inventorship designation. | 6:31 | |
20-10 | What You Put in Writing Could Adversely Impact Litigation | In this module, we will discuss how putting your thoughts and ideas in writing can adversely impact an outcome of litigation (pending or future). We will also discuss terms you should avoid in memos, emails, or other written communications. | 7:38 | |
20-11 | Software Patents | In this module, we describe the state of software patents; what typically can and cannot be patented related to software, and what you can do to increase your chances of securing patent protection. | 10:05 | |
20-12 | Provisional Patent Applications | In this module, we will discuss provisional patent applications in terms of both what they are and what they are not, including risks associated with using provisional patent applications to seek patent protection | 5:32 | |
20-72 | Patent Marking in the US | What are the pros and cons of marking patented products? How can you mark patented products? What is false patent marking? | 5:50 | |
20-73 | Patent Marking | What are the pros and cons of marking patented products? How can you mark patented products? What is false patent marking? | 5:11 | |
30-3-20-81-37-1 | What is a Patent Claim? | A look at claims of utility patents. What is the difference between an independent claim and a dependent claim? | 3:34 | |
20-83 | Why You’re Needed for PTO Office Actions | 5:51 | ||
20-84 | Why You’re Needed to Support Patent Application Review | 6:01 | ||
20-85 | How Does Claim Deletion Impact Inventorship | 3:03 | ||
20-86 | Divisional Patent Applications | 5:04 | ||
20-87 | Continuation and Continuation-in-Part Patent Applications | 7:22 | ||
20-88 | Continuation Patent Applications | 6:08 | ||
20-89 | Why is it Critical to File US Patent Applications Before Engaging Suppliers, Vendors, and Customers? | 2:09 | ||
20-90 | Contributory Infringement | 4:15 | ||
20-91 | Willful Patent Infringement | 5:20 | ||
20-92 | Benefits of a Provisional Patent Application (US) | 3:15 | ||
20-93 | How Does Plant Variety Protection (PVP) Compare to a Patent in the US? | 18:49 | ||
27-7-20-94 | How Does an EU community Design Compare to a US Design Patent | 4:53 | ||
20-95 | What is a Standard Essential Patent (SEP)? | 10:44 | ||
20-96 | Can I Talk Publicly About My Patent Pending or Patented Technology? | 5:55 | ||
20-97 | Who Owns the Patent for an Employee’s Invention in France? | 3:20 | ||
20-98 | Who Owns the Patent for an Employee’s Invention in Germany? | 4:06 | ||
20-99 | Who Owns the Patent for an Employee’s Invention in the United Kingdom? | 2:56 | ||
20-100 | Who Owns the Patent for an Employee’s Invention in the Netherlands? | 2:39 | ||
20-101 | Who Owns the Patent for an Employee’s Invention in Belgium? | 3:53 | ||
20-102 | Who Owns the Patent for an Employee’s Invention in Switzerland? | 4:33 | ||
20-103 | Who Owns the Patent for a Contractor’s Invention in France? | 1:16 | ||
20-104 | Who Owns the Patent for a Contractor’s Invention in the United Kingdom? | 1:15 | ||
20-105 | What is a Foreign Filing License? | 8:37 | ||
20-106 | Selling Products with Patented Features | 9:37 | ||
20-107 | What is the Prior Use Defense in Patent Infringement Actions? | 8:14 | ||
20-108 | What Is a European Unitary Patent? | 6:24 | ||
20-109 | What is an Ex-Parte Patent Reexamination? | 12:23 | ||
20-110 | Why Are Claims Decisions Different Depending on Where You File? | 2:33 | ||
20-111 | Do Not Fear the Non-Obvious Inventive Step Patentability Requirement | 6:24 | ||
20-113 | What Are the Basic Requirements for Patentability? | 5:16 | ||
Micro Modules (~1 to 2 minutes) | Duration | |||
20-13 | What is a Patent? | 0:58 | ||
20-14 | What Are the Basic Requirements of Patentability? | 1:32 | ||
20-15 | How Can Patents Benefit Your Business? | 1:22 | ||
20-16 | What is the Life of a US Utility Patent? | 0:57 | ||
20-17 | How Much Does it Cost to Prepare, File, and Maintain a US Utility Patent? | 1:23 | ||
20-18 | How Expensive is it to Enforce Your Patent? | 0:53 | ||
20-19 | What is a Patent Fence? | 2:20 | ||
20-20 | How Do You Prevent a Patent Fence? | 1:04 | ||
20-21 | What is a Patent Troll? | 1:03 | ||
20-22 | What is Patent Infringement? | 0:47 | ||
20-23 | Who Are the Plaintiff and Defendant in a Patent Infringement Litigation? | 0:29 | ||
20-24 | What is an Invention Disclosure? | 0:50 | ||
20-25 | What Are the Main Defenses to a Patent Infringement Action? | 1:18 | ||
20-26 | Does Having a Patent Give Me the Right to Make and Sell My Patent Product? | 1:17 | ||
20-27 | How Do You Decide Who Should be Named as an Inventor on a Patent Application? | 2:08 | ||
20-28 | How is Patent Ownership Determined? | 0:38 | ||
20-29 | What is the Difference Between Ownership and Co-Ownership of US Patent Rights? | 1:07 | ||
20-30 | What is a Patent Assignment? | 0:58 | ||
20-31 | What is a Patent License? | 0:55 | ||
20-32 | What is the Difference Between an IP Licensor and an IP Licensee? | 0:22 | ||
20-33 | What is a Patent Royalty? | 0:29 | ||
20-34 | What is the Difference Between Patent In-Licensing and Out-Licensing? | 0:27 | ||
20-35 | How Can Rights be Licensed Under a Patent? | 1:11 | ||
20-36 | What is the Difference Between an Exclusive and non-Exclusive Patent License? | 1:16 | ||
20-37 | What is a Design Patent? | 1:15 | ||
20-38 | How Do Design Patents Compare with Utility Patents? | 1:27 | ||
20-39 | How Do Design Patents Compare with Copyrights in the US? | 1:43 | ||
20-40 | How Can Publications Harm Your Potential Patent Rights? | 1:16 | ||
20-41 | Where is the US Patent Office? | 0:25 | ||
20-42 | What Kinds of Things Do Patents Protect? | 1:13 | ||
20-43 | Are there Different types of US Patents? | 0:52 | ||
20-44 | What is the Difference Between a Patent Application and a Patent? | 0:53 | ||
20-45 | What Are the Requirements for Getting a Patent? | 1:47 | ||
20-46 | What Happens if I Publicly Disclose My Invention Before I File a Patent Application on the Invention? | 0:51 | ||
20-47 | Can I Get a Patent for My Invention with no Intention of Making or Selling Products Covered by My Patent? | 0:35 | ||
20-48 | Can a Product be Protected by More than One Patent? | 0:49 | ||
20-49 | When Can an Owner of a US Patent Sue Someone for Patent Infringement in the US? | 1:03 | ||
20-50 | How Much Does it Cost to Get a US Patent? | 1:47 | ||
20-51 | How Long Does it Take to Get a Patent? | 0:55 | ||
20-52 | What is the Process for Getting a US Utility Patent? | 1:33 | ||
20-53 | How Do I Know if I Should be Named as an Inventor on a Patent? | 0:57 | ||
20-54 | How Do I Know if My Invention is Patentable as a Utility Patent in the US? | 1:35 | ||
20-55 | Who Are US Patent Attorneys and what Do they Do? | 1:17 | ||
20-56 | Who Are US Patent Agents and what Do they Do? | 0:44 | ||
20-57 | What is the Difference Between a US Patent Attorney and a US Patent Agent? | 0:52 | ||
20-58 | Can there be More than One Inventor for a Patentable Invention? | 0:41 | ||
20-59 | What is the Patent Cooperation Treaty and Why is it Important? | 1:14 | ||
20-60 | Does Every Country Have the Same Laws Regarding Patents? | 0:43 | ||
20-61 | How Can I Determine the Value of a Patent? | 0:56 | ||
20-62 | Can a Patent be Bought or Sold? | 0:29 | ||
20-63 | Can a Patent Application be Bought or Sold? | 0:31 | ||
20-64 | What is a Provisional Patent Application? | 1:55 | ||
20-65 | Can a Patent Infringe Another Patent? | 0:58 | ||
20-66 | Is there Value in Filing a Patent Application, Even if it Never Becomes a Patent? | 1:15 | ||
20-67 | Why Should You Become a Named Inventor on a Patent? | 1:50 | ||
20-68 | Why Are Brainstorming Sessions and Patents Critical to Innovation? | 1:05 | ||
20-69 | Why is it Critical to File Patent Applications Before Engaging with Suppliers, Vendors, and Customers? | 1:11 | ||
20-70 | Can You Obtain Valuable Knowledge from Patents? | 1:24 | ||
20-71 | Can Patents help You Find Hard-to-Find Competitors? | 1:08 | ||
20-74 | First to File in the US | 1:37 | ||
20-75 | First to File International | 1:14 | ||
20-76 | How Do You Properly Mark Your Patented Products? | 1:50 | ||
20-77 | What Are Pre-Issuance Damages for Patent Infringement in the US? | 2:06 | ||
20-78 | What if You Mark a Product with an Expired Patent Number in the US | 0:55 | ||
20-79 | What Are the Key Elements of a False Patent Marking Claim | 0:41 | ||
20-80 | What is Patent Marking? | 1:07 | ||
20-82 | Protecting Software Inventions | 3:16 | ||
25 | EPO Patents and Oppositions | 7 Videos | ||
Micro Modules (~2 to 8 minutes) | Duration | |||
25-1 | Introduction to the European Patent Office | 3:53 | ||
25-2 | What is the Process for getting an EPO Patent | 9:08 | ||
25-3 | Oppositions at the European Patent Office EPO | 4:13 | ||
25-4 | Advantages of Filing an EPO Opposition | 2:09 | ||
25-5 | Who May File an EPO Opposition? | 1:53 | ||
25-6 | When Should You Avoid Filing an EPO Opposition? | 3:28 | ||
25-7 | What is the Procedure for an EPO Opposition? | 7:21 | ||
27 | EU Community Designs | 7 Videos | ||
Micro Modules (~2 to 7 minutes) | Duration | |||
27-1 | What is a Community Design in the European Union? | 6:20 | ||
27-2 | Which Products Can You Protect with an EU Community Design? | 1:31 | ||
27-3 | What are Exceptions to EU Community Design Protection? | 3:51 | ||
27-4 | Who Owns the Rights to a Community Design in the EU? | 1:34 | ||
27-5 | What is a Registered Community Design in the EU | 4:21 | ||
27-6 | What is an Unregistered Community Design in the EU? | 3:07 | ||
27-7-20-94 | How Does an EU community Design Compare to a US Design Patent? | 4:53 | ||
30 | How to Read a Patent | 9 Videos | ||
Micro Modules (~3 to 4 minutes) | Info | Duration | ||
30-1 | The Front Page of a Utility Patent | A look at the front page of a utility patent. What information is there, and how is that information useful? | 3:25 | |
30-2 | Between the Front Page and Claims of a Utility Patent | A look at the components of a patent specification between the front page and the claims. What information is found there? | 3:28 | |
30-3-20-81-37-1 | What is a Patent Claim? | We use visualizations and a simple example to provide training on patent claims, both independent and dependent. | 3:34 | |
30-4 | How to Read a Patent for Patentability | How can you read a patent to assess patentability? Why would you want to? | 3:27 | |
30-5 | How to Read a Patent for Invalidity | How can you read a patent for invalidity, and when would you want to? | 4:06 | |
30-6 | How to Read a Patent for Freedom to Operate | How can you read a patent for freedom to operate? When would you want to? | 4:00 | |
30-7 | Claim Drafting - A Girl and Her Trike | 9:04 | ||
30-8 | Anatomy of a Patent Claim | 9:53 | ||
30-9 | Patentability and Infringement | 7:40 | ||
35 | Patent Cooperation Treaty (PCT) | 5 Videos | ||
Micro Modules (~1 to 3 minutes) | Info | Duration | ||
35-1 | What is a PCT Application? | We provide an overview of the PCT system including the basics on the PCT filing process. | 3:35 | |
35-2 | What Are the Key Steps in PCT Filing? | We provide a description of the Key steps in the PCT filing process. | 3:45 | |
35-3 | What Are the Typical Costs for PCT Filing? | We provide an overview of the Key costs associated with the PCT application system. | 1:34 | |
35-4 | Why is a PCT Application Advantageous? | We provide the Key advantages associated with filing PCT applications. | 2:36 | |
35-5 | Important Considerations with PCT | We provide a description of Keys risks/challenges associated with PCT filings. | 1:41 | |
37 | Patent Claims | 6 Videos | ||
Modules (~3 to 9 minutes) | Info | Duration | ||
30-3-20-81-37-1 | What is a Patent Claim? | We use visualizations and a simple example to provide training on patent claims, both independent and dependent. | 3:34 | |
30-7-37-2 | Claim Drafting - A Girl and Her Trike | 9:04 | ||
30-8-37-3 | Anatomy of a Patent Claim | 9:53 | ||
30-9-37-4 | Patentability and Infringement | Most legal rights give a person an affirmative right to do something. Such is not the case with patent rights. A patent gives you the right to exclude others from doing something. Specifically, a patent gives you the right to keep others from making, using, selling or offering the patented product for sale. | 7:40 | |
Scenarios (~23 minutes) | Duration | |||
37-5 | Chess Claims with Thomas Colson and Bob Simpson | 21:58 | ||
37-6 | Slider Claims with Thomas Colson and Bob Simpson | 22:58 | ||
40 | Trademarks | 43 Videos | ||
Modules (~3 to 13 minutes) | Info | Duration | ||
40-1 | What is a Trademark? | What is a trademark? Why is it useful for a company to have trademarks? How does a trademark compare to a business name? What are the practical distinctions between domain names and trademarks? | 8:16 | |
40-2 | What is Inherent Distinctiveness of a Trademark? | We start with the basic mentality of getting a trademark. What is distinctiveness and why is it important to getting a Trademark? How do we assess the distinctiveness of your mark? What is inherent distinctiveness and actual distinctiveness? What are Fanciful, Arbitrary, Suggestive, Descriptive, and Generic Trademarks? | 11:24 | |
40-3 | What is Actual Distinctiveness of a Trademark? | What is actual distinctiveness? How distinctive is your mark relative to other marks in the marketplace? What is the difference between a registered and non-registered mark? | 5:43 | |
40-4 | What is Trademark Infringement? | How do you infringe a trademark? What is likelihood of confusion to source? What are some basic steps you can take to avoid trademark infringement? | 13:31 | |
40-5 | Benefits of a US Federal Trademark Registration | In this module, we will discuss the benefits of obtaining a US federal trademark registration; such as the use of a Circle R, geographic enforceability, registration with US Customs and Border Protection, bringing actions in federal court, and inclusion in trademark databases. | 2:51 | |
40-35 | The Use of Trademarks in Marketing Material | A look at using trademarks in marketing material. What are some tips for creating a successful trademark? | 6:18 | |
40-36 | Trademark Dilution | 5:32 | ||
40-37 | What is a Trademark Clearance Search? | 4:54 | ||
40-38 | Considerations for Trademark Usage in Multiple Languages | 3:01 | ||
40-39 | Avoid Product Packaging that Diminishes Your Trademark | 5:25 | ||
40-40 | How to Keep a US Trademark Alive | 3:01 | ||
40-41 | When Is Non-Use of a US Trademark Excusable? | 4:54 | ||
40-42 | How to Keep an EU Trademark Alive | 3:01 | ||
40-43 | What is a TM Clearance Search, and How to Conduct One? | 10:36 | ||
Micro Modules (~1 to 2 minutes) | Duration | |||
40-6 | What is a Trademark? | 0:30 | ||
40-7 | What is the Duration of a US Trademark? | 0:42 | ||
40-8 | What Are the Advantages of a US Trademark Registration Versus Common Law Trademark Rights? | 1:16 | ||
40-9 | Can Sounds be Protected as US Trademarks? | 0:47 | ||
40-10 | Can Colors be Protected by US Trademarks? | 1:10 | ||
40-11 | Can You Get a US Trademark on a Scent? | 0:50 | ||
40-12 | Can the Shape of a Product be the Subject of Trademark Protection? | 0:45 | ||
40-13 | What’s the Difference Between a Trademark and a Business Name? | 1:06 | ||
40-14 | What’s the Difference Between a Trademark and a Domain Name? | 0:48 | ||
40-15 | Is it Necessary to Use a Trademark in Commerce? | 0:49 | ||
40-16 | What is Trademark Distinctiveness? | 0:54 | ||
40-17 | What Are the Categories of Inherent Distinctiveness for Trademarks? | 1:42 | ||
40-18 | What is Actual Distinctiveness of a Trademark? | 0:33 | ||
40-19 | What Are the Factors Typically Considered in Determining Actual Distinctiveness of a Trademark? | 1:10 | ||
40-20 | When Can You Use a Circle R in Connection with Your Trademark? | 0:22 | ||
40-21 | What Are the two Main Causes of Action for Trademark Infringement? | 0:17 | ||
40-22 | What is a Cause of Action for Trademark Infringement Based Upon Likelihood of Confusion? | 0:55 | ||
40-23 | What is a Cause of Action for Trademark Infringement Based Upon Dilution? | 1:11 | ||
40-24 | What Factors Are Typically Considered in a Trademark Infringement Analysis Based Upon Likelihood of Confusion? | 1:26 | ||
40-25 | Why Are Trademarks Important to a Company? | 0:53 | ||
40-26 | How Expensive is Trademark Infringement Litigation? | 0:57 | ||
40-27 | Who Are the Plaintiff and Defendant in a Trademark Infringement Litigation? | 0:25 | ||
40-28 | What Kinds of Things Do Trademarks Protect? | 0:39 | ||
40-29 | What is the Difference Between a US Trademark Application and a US Trademark? | 1:12 | ||
40-30 | What Are the Requirements for Getting a US Trademark? | 1:16 | ||
40-31 | Can a Product be Protected by More than One Trademark? | 0:43 | ||
40-32 | What is a US Trademark License? | 1:23 | ||
40-33 | Can a Trademark be Bought or Sold? | 0:26 | ||
40-34 | Can a Trademark Application be Bought or Sold? | 0:29 | ||
45 | Trade Dress | 8 Videos | ||
Micro Modules (~1 to 5 minutes) | Info | Duration | ||
45-1 | What is Trade Dress? | We provide a brief overview of Trade Dress in terms of their benefits and comparison with trademarks. | 2:13 | |
45-2 | The Trade Dress Functional Prohibition | We provide a breif description of the "Funcational" prohibition associated with Trade Dress with two examples. | 3:21 | |
45-3 | Look for Advertising to Support Trade Dress Enforcement | We provide a brief description of the importance of "Look For" advertising to establish Trade Dress rights. | 1:15 | |
45-4 | Trade Dress Examples | The best way to understand Trade Dress is with examples. So, we provide six examples of actual Trade Dress. | 5:11 | |
45-5 | What is the Difference Between Trade Dress and a Design Patent? | We provide a brief comparison of Trade Dress and Design patents. | 2:45 | |
45-6 | What is the Difference Between Trade Dress and Trademarks? | We provide a brief comparison of Trade Dress and Trademarks. | 1:11 | |
45-7 | Can Functional Aspects of Products be Protected by Trade Dress? | We provide a brief description of the functional prohibition in connection with Trade Dress. | 1:13 | |
45-8 | Acquired Distinctiveness in Trade Dress | A look at trade dress distinctiveness. When is it inherent, and when is it acquired or earned? | 5:18 | |
47 | Anti-Counterfeiting of Intellectual Property | 25 Videos | ||
Micro Modules (~1 to 10 minutes) | Duration | |||
47-1 | An Overview of Counterfeiting | 9:15 | ||
47-2 | Introduction to Counterfeiting | 3:05 | ||
47-3 | Counterfeit Goods vs. Knockoffs | 2:11 | ||
47-4 | Counterfeit Goods vs. Pirated Goods | 3:10 | ||
47-5 | Counterfeiting vs. Trademark Infringement | 2:35 | ||
47-6 | Counterfeiting vs. Patent Infringement | 2:21 | ||
47-7 | Counterfeiting vs. Copyright Infringement | 2:47 | ||
47-8 | Trafficking in Counterfeit Goods or Services (US) | 3:16 | ||
47-9 | “Counterfeit Marks” under the US Offense of Trafficking in Counterfeit Goods or Services | 1:49 | ||
47-10 | Penalties for Trafficking in Counterfeit Goods or Services (US) | 1:59 | ||
47-11 | Trafficking in Counterfeit Goods or Services | 2:18 | ||
47-12 | “Trafficking” under the US Offense of Trafficking in Counterfeit Goods or Services | 3:00 | ||
47-13 | What is a Counterfeit Military Good or Service in the US? | 1:51 | ||
47-14 | Transshipment and Exportation of Counterfeit Goods or Services under Section 42 of the US Lanham Act | 5:48 | ||
47-15 | Civil Damages for Intentional Use of a Counterfeit Trademark under the US Lanham Act | 4:57 | ||
47-16 | Trafficking in Counterfeit Labels, Illicit Labels, or Counterfeit Documentation or Packaging (US) | 3:06 | ||
47-17 | Penalties and Remedies for Trafficking in Counterfeit Labels, Illicit Labels, or Counterfeit Documentation or Packaging (US) | 2:21 | ||
47-18 | Anti-Counterfeit Measures under EU Regulation 608-2013 | 2:47 | ||
47-19 | “Counterfeit Goods” under EU Regulation 608-2013 | 3:16 | ||
47-20 | “Geographical Indications” under EU Regulation 608-2013 | 1:49 | ||
47-21 | “Pirated Goods” under EU Regulation 608-2013 | 1:00 | ||
47-22 | “Goods Suspected of Infringing an Intellectual Property Right” under EU Regulation 608-2013 | 2:18 | ||
47-23 | Counterfeiting under the TRIPS Agreement | 3:16 | ||
47-24 | “Counterfeit Trademark Goods” under the TRIPS Agreement | 1:49 | ||
47-25 | “Pirated Copyright Goods” under the TRIPS Agreement | 1:59 | ||
50 | Copyrights | 46 Videos | ||
Modules (~3 to 8 minutes) | Info | Duration | ||
50-1 | Copyright Fundamentals | What are copyrights? What aren’t copyrights? What materials are available for copyright protection? What does a copyright give you the right to do? What are the exceptions of those rights? What is Fair Use? Do you need a federal copyright registration to have a valid copyright? What’s the life of a copyright registration? | 8:32 | |
50-2 | Beware of Copying Images from the Internet | This program describes IP risks associated with using digital images and videos from the web in connection with things like websites, presentations, publications, and brochures. Simply, just because you are able to copy an image or video from the web, it doesn’t mean you are legally permitted to do so, and the penalties can be severe. | 6:42 | |
50-21 | Advantages of a US Federal Copyright Registration | A look at the advantages of U.S. federal copyright registration. How does the government incentivize the registration of copyrights? | 3:04 | |
50-22 | Copyright Ownership in the US | A look at copyright ownership in the United States. How can you ensure you own copyrights for works completed by employees or contractors? | 3:00 | |
50-24 | Copyright Issues in Connection With Software | 2:43 | ||
50-32 | Can You Infringe a Copyright by Sending or Posting a Hyperlink (US) | 4:02 | ||
50-33 | Can You Infringe a Copyright by Sending or Posting a Hyperlink (EU) | 7:47 | ||
50-34 | Secondary Copyright Infringement (US) | 4:01 | ||
50-35 | What is a Copyright? (UK) | 4:13 | ||
50-36 | Who Owns the Copyrights to an Employee’s Work in France? | 3:14 | ||
50-37 | Who Owns the Copyrights to an Employee’s Work in Germany? | 2:10 | ||
50-38 | Who Owns the Copyrights to an Employee’s Work in the United Kingdom? | 2:18 | ||
50-39 | Who Owns the Copyrights to an Employee’s Work in the Netherlands? | 4:13 | ||
50-40 | Who Owns the Copyrights to an Employee’s Work in Belgium? | 3:03 | ||
50-41 | Who Owns the Copyrights to an Employee’s Work in Switzerland? | 3:01 | ||
50-42 | Who Owns the Copyrights to a Contractor’s Work in France? | 2:26 | ||
50-43 | Who Owns the Copyrights to a Contractor’s Work in Germany? | 2:21 | ||
50-44 | Who Owns the Copyrights to a Contractor’s Work in the United Kingdom? | 2:29 | ||
50-45 | Who Owns the Copyrights to a Contractor’s Work in the Netherlands? | 1:46 | ||
50-46 | Who Owns the Copyrights to a Contractor’s Work in Belgium? | 2:27 | ||
50-47 | Who Owns the Copyrights to a Contractor’s Work in Switzerland? | 2:33 | ||
Micro Modules (~1 to 2 minutes) | Duration | |||
50-3 | What is a Copyright? | 1:06 | ||
50-4 | How Long Does a US Copyright Last? | 0:48 | ||
50-5 | Do You Need a US Federal Copyright Registration to Have a Valid Copyright? | 0:32 | ||
50-6 | What Are the Advantages of a US Copyright Registration? | 1:11 | ||
50-7 | What is the Fair Use Exception to Copyright Laws? | 1:00 | ||
50-8 | How is Copyright Ownership Determined? | 0:51 | ||
50-9 | What is a “Work Made for Hire” Under Copyright Law? | 1:00 | ||
50-10 | What is a Derivative Work Under Copyright Law? | 1:02 | ||
50-11 | What Does a Copyright Give You the Right to Do? | 0:26 | ||
50-12 | How Expensive is Copyright Infringement Litigation? | 0:55 | ||
50-13 | Who Are the Plaintiff and Defendant in a Copyright Infringement Litigation? | 0:27 | ||
50-14 | Can we Freely Use Images, Videos, and Documents We Find on the Internet? | 1:08 | ||
50-15 | What Kinds of Things Do Copyrights Protect? | 1:06 | ||
50-16 | What Are the Requirements for Getting a US Copyright? | 1:19 | ||
50-17 | What is Copyright Infringement? | 1:20 | ||
50-18 | Does Every Nation Have the Same Laws Regarding Copyrights? | 1:03 | ||
50-19 | What is a US Copyright License? | 0:57 | ||
50-20 | Can a Copyright be Bought or Sold? | 0:17 | ||
50-25 | Secondary Copyright Infringement (UK) | 1:44 | ||
50-26 | Secondary Copyright Infringement- Importing an Infringing Copy (UK) | 1:00 | ||
50-27 | Secondary Copyright Infringement- Possessing or Dealing with an Infringing Copy (UK) | 1:20 | ||
50-28 | Secondary Copyright Infringement- Providing Means for Making Infringing Copies | 2:14 | ||
50-29 | Secondary Copyright Infringement- Permitting the Use of Premises for an Infringing Performance (UK) | 1:17 | ||
50-30 | Secondary Copyright Infringement- Provision of an Apparatus for an Infringing Performance (UK) | 1:57 | ||
50-31 | Secondary Copyright Infringement (Global) | 2:46 | ||
55 | Supplier Interactions | 6 Videos | ||
Modules (~3 to 8 minutes) | Duration | |||
55-1 | Reducing Risks Associated with Supplier Interactions | 8:30 | ||
55-2 | Copyright Infringement Issues with Suppliers Drawings | 2:52 | ||
55-5 | How to Protect Supplier Proprietary Information, and What if You Don't? | 5:51 | ||
Micro Modules (~1 to 3 minutes) | Duration | |||
55-3 | New Developments Under Build to Print Contracts Are Not Immune From Liability | 1:55 | ||
55-4 | What is Proprietary Information? | 1:17 | ||
55-6 | Beware of Suppliers with Patents | 2:09 | ||
60 | Prior Art | 10 Videos | ||
Module (~4 to 7 minutes) | Info | Duration | ||
60-1-20-7 | What is Prior Art and Why is Prior Art Important to My Business? | What is prior art searching and competitive landscaping, and how do these functions relate to your business? We will discuss Freedom to Operate (FTO), Invalidity, Patentability, patents for competitive intelligence, and general reports for these functional needs. | 6:44 | |
60-9 | What Do I Do About Patents Uncovered During an FTO Search | 6:09 | ||
60-10 | What is a Freedom to Operate Search and Why Are They Important? | 5:16 | ||
Micro Modules (~1 minute) | Duration | |||
60-2 | What is Prior Art? | 0:59 | ||
60-3 | What is a Patentability Search? | 1:06 | ||
60-4 | What is a Patent Invalidity Search? | 1:09 | ||
60-5 | What is a Freedom to Operate (FTO) or Product Clearance Search? | 1:03 | ||
60-6 | How Can Patent Information be Useful for Competitive Intelligence? | 1:07 | ||
60-7 | How Can Patent Information be Used to Find Patent Licensing Targets? | 0:55 | ||
60-8 | What is a Defensive Publication? | 0:53 | ||
70 | IP Ownership in Business Relationships | 7 Videos | ||
Modules (~5 to 13 minutes) | Info | Duration | ||
70-1 | Business Relationships and their Impact on IP Ownership | This module will briefly respond to the following Questions: What are the IP ownership risks that business and technical professionals should be concerned with in connection with relationships such as with universities, contractors, employees, joint development partners, and other like relationships? | 9:59 | |
70-2 | Patent Assignment and Licensing | What is patent licensing; both patent in-licensing and patent out-licensing? What is an assignment of a patent? What is the difference between an exclusive and non-exclusive license? What is a field-of-use license? Can licensed patents be enforced; exclusive or non-exclusive? What is open innovation and how can it impact your business? | 13:26 | |
70-3 | Risks of Open Source Software | In this module, we will discuss the risks associated with open-source software such as costs of developing enhancements, deployment, and maintenance, as well as the Infection Effect related to license obligations. | 5:27 | |
70-4-240-2 | Business Considerations and JDAs | In this module, we will discuss joint development agreements, including the objectives, the risks, and your goals in creating the right JDA such as getting the IP you need to advance your business goals. | 10:32 | |
70-7 | Data Ownership: The Internet of Things | In our world of Big Data and the Internet of Things, determining who owns the data produced by "things" can be confusing. We provide an overview of the ownership issues and tips on how to ensure you get the ownership rights you need to achieve your business goals. | 5:23 | |
Micro Modules (~1 minute) | Duration | |||
70-5 | What is Open-Source Software? | 1:12 | ||
70-6-240-5 | What is a Joint Development Agreement? | 1:15 | ||
75 | Monetizing Intellectual Property | 1 Video | ||
Modules (~9 minutes) | Duration | |||
75-1 | Introduction to Monetizing Intellectual Property | 8:33 | ||
80 | Interacting with Patent Counsel | 8 Videos | ||
Modules (~4 to 12 minutes) | Info | Duration | ||
80-1 | Interacting with Your Patent Department | This is important to you and your company. We will look at the final product; the patent. Then describe the basic pieces of information patent counsel typically need to produce a strong patent. | 6:22 | |
80-2 | When Should You Submit an Invention Disclosure? | This program describes the thought process of an innovator in connection with their decision to submit an invention disclosure to the IP department. Focus on Novelty and leave the question of Obviousness to the patent experts. | 5:23 | |
80-5 | Attorney-Client Privilege in US Intellectual Property Litigation | 6:43 | ||
80-6 | How to Comport Yourself During Deposition | 11:55 | ||
80-7 | How to Draft an Invention Disclosure | 4:16 | ||
Micro Modules (~1 to 3 minutes) | Duration | |||
80-3 | How "Finished" Does My Invention Have to Be Before I Submit to IP Counsel? | 1:17 | ||
80-4 | Why Should You Be Motivated to Interact With Patent Counsel | 1:40 | ||
80-8 | What is an Invention Disclosure and How Should You Draft One? | 2:59 | ||
90 | Trade Secrets | 31 Videos | ||
Modules (~6 to 14 minutes) | Info | Duration | ||
90-1 | What Is a Trade Secret? | This first trade secret module is intended to help business and technical professionals understand proprietary information and trade secrets, how they are interrelated and why they are each valuable to a business. | 7:08 | |
90-2 | How Are Trade Secrets Lost and What Are the Consequences? | This second trade secret module describes the considerations for enforceability of trade secrets. How do you know if you have an Enforceable trade secret? How are trade secrets typically lost, and what are the consequences if your trade secrets and lost or stolen? | 12:42 | |
90-3 | Considerations for Trade Secret Decisions and Disclosures | This third trade secret module describes the steps in deciding if information should be kept as a trade secret, how to treat trade secrets, and how to disclose trade secret information to vendors, customers, contractors, and partners. | 13:57 | |
90-4 | Trade Secret Non-Disclosure Agreements (NDAs) and Enforcement | This fourth trade secret module describes the use of Non-Disclosure agreements in connection with trade secrets, and enforcement of trade secrets in the event of theft. | 12:50 | |
90-5 | Defend Trade Secrets Act | In this module, we describe the US Defending Trade-Secret Act in terms the Key protections for both employees and employers. | 6:32 | |
Micro Modules (~1 to 7 minutes) | Duration | |||
90-6 | What is a Trade Secret? | 1:13 | ||
90-7 | How Long Does a Trade Secret Last? | 0:49 | ||
90-8 | What Are the Advantages of Trade Secrets over Patents? | 1:00 | ||
90-9 | What Are the Disadvantages of Trade Secrets Versus Patents? | 0:56 | ||
90-10 | What Questions Should be Asked when Considering Trade Secret Protection? | 1:17 | ||
90-11 | Is there a US Trade Secret Office? | 0:13 | ||
90-12 | Is there a Trade Secret Registration? | 0:43 | ||
90-13 | What Are the Key Factors in Determining Whether You Have an Enforceable Trade Secret? | 1:13 | ||
90-14 | Why Are Trade Secrets Valuable to a Company? | 0:41 | ||
90-15 | How Should You Typically Disclose Trade Secrets to Third Parties? | 1:16 | ||
90-16 | How Can You Enforce a US Trade Secret? | 1:09 | ||
90-17 | How Expensive is it to Litigate a Trade Secret Misappropriation Suit? | 0:59 | ||
90-18 | What Factors Should You Consider in Deciding Between a Patent and a Trade Secret? | 1:30 | ||
90-19 | How Are Trade Secrets Typically Lost? | 1:13 | ||
90-20 | What Kinds of Things Do Trade Secrets Protect? | 1:05 | ||
90-21 | What Are the Requirements for Getting a Trade Secret? | 0:51 | ||
90-22 | What is Trade Secret Misappropriation? | 0:55 | ||
90-23 | Does Every Country Have the Same Laws Regarding Trade Secrets? | 0:46 | ||
90-24 | What is a Trade Secret License? | 1:04 | ||
90-25 | Can a Trade Secret be Bought or Sold? | 0:32 | ||
90-26 | EU Trade Secrets Directive - Purpose and Definitions | 2:49 | ||
90-27 | EU Trade Secrets Directive - How Can Trade Secrets of Others be Lawfully Acquired? | 2:46 | ||
90-28 | EU Trade Secrets Directive - Unlawful Acquisition, Use, and Disclosure | 3:20 | ||
90-29 | EU Trade Secrets Directive - Measures, Procedures, and Remedies for Unlawful Acquisition, Use, or Disclosure | 7:44 | ||
90-30 | EU Trade Secrets Directive - Best Practices | 1:55 | ||
90-31 | Until You Know What It Is, Treat It as a Trade Secret | 3:06 | ||
100 | IP Rights with US Government Contracts | 13 Videos | ||
Modules (~3 to 12 minutes) | Info | Duration | ||
100-1 | Risks Associated with Improper Marking | This module describes some of the Key risks in failing to properly mark technical deliverables in connection with US government contracts, such as the loss of Trade Secrets. | 10:00 | |
100-2 | Categories of US Government Rights | This module describes the categories of US government rights including Unlimited, Limited Rights, Restricted Rights, Government Purpose Rights, and Specially Negotiated Rights. | 12:45 | |
100-3 | Key Terms when Marking | This module describes several Key terms associated with the marking rules such as Technical Data, Non-technical data, Deliverables, and Computer Software. | 6:20 | |
100-4 | Marking Best Practices | This module describes several Key terms and best practices associated with the marking such as Data Rights Assertion Table, Marking, and Portion Marking. | 11:57 | |
100-5 | Data Assertion Table- Tech Data & Software in USG DoD Contracts | 10:09 | ||
100-6 | Contractors' Rights to Patent With US Government Contracts | 10:19 | ||
100-7 | Patent Infringement Immunity for US government Contractors | 4:02 | ||
100-8 | Record Keeping Requirements for Tech Data Software Deliverables | 4:45 | ||
100-9 | Situations where the US Government is Entitled to Unlimited Rights | 4:45 | ||
100-10 | Sub-Contractor's IP Ownership | 4:08 | ||
100-11 | Can Different Rights be Granted for Different Components of Software and Technical Deliverables | 3:17 | ||
100-12 | Types of Government Rights and How They Arise | 4:56 | ||
100-13 | The Data Rights Assertion Table | 6:13 | ||
105 | False Advertising and Puffery | 4 Videos | ||
Micro Modules (~1 to 5 minutes) | Info | Duration | ||
105-1 | False Advertising vs Puffery | We compare False Advertising and Puffying with several examples. | 4:52 | |
105-2 | What is the Difference Between False Advertising and Puffery? | We compare False Advertising and Puffying with one example. | 1:20 | |
Scenarios (~1 minute) | Info | Duration | ||
105-3 | TropiCana's Puffery | We provide an overview of the Tropicana/Campbell's Soup False Advertising action. | 1:03 | |
105-4 | Shark Ninja | We provide an overview of the Shark Ninja/Dyson False Advertising action. | 1:40 | |
110 | IP and Social Media | 2 Videos | ||
Module (~6 minutes) | Info | Duration | ||
110-1 | IP and Social Media | In business today you would be a dinosaur if you weren’t leveraging social media to advance your objectives. But, nothing is free in this world, and with the benefits of social media comes substantial IP risks. This series provides an overview of the risks and what to do about them. | 6:36 | |
Micro Module (~1 minute) | Duration | |||
110-2 | Beware of Using Social Media to Broadcast Vacation Highlights | 1:15 | ||
111 | Right of Publicity | 8 Videos | ||
Micro Modules (~1 to 2 minutes) | Info | Duration | ||
111-1 | Introduction to Right of Publicity | We provide a brief overview of Publicity Rights, including a comparison with Copyrights and Trademark rights. | 2:36 | |
111-2 | Don't Forget to Get the Release | We dicusss the importance of securing releases when using people in advertising programs. | 0:57 | |
111-3 | Michael Jordan | We brieflly discuss the Right of Publicity action involving Michael Jordan and Jewel Food Stores. | 1:55 | |
111-4 | Bette Midler | We brieflly discuss the Right of Publicity action involving Bette Midler and an automobile company. | 1:39 | |
111-5 | Bus Driver in Milan | We brieflly discuss the Right of Publicity action involving a bus driver in Milan. | 1:37 | |
111-6 | College Football and EA Sports | We brieflly discuss the Right of Publicity action involving Ryan Hart and Electronic Arts. | 0:58 | |
111-7 | Michael Jordan in China | We brieflly discuss the Right of Publicity action involving Michael Jordan in China. | 0:55 | |
111-8 | Beware of Tweets | We brieflly discuss the Right of Publicity action involving Katherine Heigl and Duane Reade. | 1:01 | |
120 | Executive IP: The Movie | 1 Video | ||
120-1-15-30 | IP: The Movie | Intellectual property is changing everything for businesses. Massive IP opportunities and equally massive IP risks are everywhere. We all need to speak the language of IP. This movie will help you to do that. Watch as Imagine Enterprises realizes the importance of IP almost too late as they race to get to market. | 1:11:45 | |
Confidentiality | ||||
130 | Confidential Information | 12 Videos | ||
Modules (~3 to 15 minutes) | Info | Duration | ||
130-1 | Trade Secrets and Confidentiality | This module will briefly respond to the following Questions: What is confidential information, why is it important to keep it confidential, and what are the general steps in keeping it confidential? What is a trade-secret? Why are trade secrets valuable? What are the basic steps in turning secret information into a trade secret? How does a trade secret compare with a patent? | 11:08 | |
130-2 | Confidential Information of Current and Former Employers | In this module, we will discuss your general obligations in connection with confidential information of current and former employers. | 5:22 | |
130-3 | Exit Interview | This is a video that can be used with Exiting Employees to ensure they understand their obligations with respect to confidential information. | 2:51 | |
130-7 | Confidentiality in the World of Ubiquitous Video Conferencing | 7:55 | ||
130-30 | Keeping Confidentiality of Big Prototypes | 7:13 | ||
Micro Modules (~1 to 2 minutes) | Duration | |||
130-4 | What is Confidential Information? | 0:58 | ||
130-5 | What is Proprietary Information? | 0:16 | ||
130-6 | What is the Difference Between Confidential Information and Proprietary Information? | 1:14 | ||
Vignettes (~4 to 5 minutes) | Duration | |||
130-26 | Disclose Cautiously, Even Under NDA | 5:26 | ||
130-27 | Never Misappropriate the Trade Secrets of Former Employers | 4:03 | ||
130-28 | Patent Versus Trade Secret | 5:40 | ||
130-29 | Considerations When Your Trade Secrets are Misappropriated | 4:58 | ||
140 | Non-Disclosure Agreements | 33 Videos | ||
Modules (~4 to 15 minutes) | Info | Duration | ||
140-1 | Key Components to a Typical NDA | We need to understand the purpose of NDAs and why they must be used with every disclosure of confidential information. In this module, we will discuss the Key components of a typical NDA. | 11:49 | |
140-2 | Common NDA Mistakes to be Avoided | If you understand what you need to do to enforce an NDA in the future, you’ll have a better understanding of what you need to do throughout the process. This course will provide an overview of the common mistakes that can be avoided with an NDA. | 6:16 | |
140-28 | The NDA Drift | We provide a description of the risk associated with the parties of an NDA “drifting” into technical discussions that may lead to joint development when there is no Joint Development Agreement (JDA) in place (or any other document that defines the IP rights of the parties). | 3:23 | |
140-29 | If You Don’t Need an NDA, Don’t Sign One | 4:12 | ||
140-30 | Should You Use a 2-way, 1-way, or 1.5-way NDA? | 4:00 | ||
140-32 | What If the Other Party Refuses To Sign an NDA | 6:36 | ||
140-33 | How to Increase the Comfort of Third Party Disclosers of Confidential Information | 4:43 | ||
Vignettes (~1 to 3 minutes) | Info | Duration | ||
140-3 | Introduction to Non-Disclosure Agreements | We provide a brief overview of Non-Disclosure agreements as a lead-in to a series of vignettes which describes NDA scenarios. | 2:42 | |
140-4 | Summary of Non-Disclosure Agreements | We provide a summary of the Key points related to NDAs. | 3:14 | |
140-5 | Never Disclose Without an NDA | Vignette describing the importance of having an NDA in place before making a confidential disclosure. | 1:58 | |
140-6 | Be Ethical in Handling Confidential Information | Vignette describing the importance of ethical handling of Confidential Information. | 1:22 | |
140-7 | Take Need-to-Know Seriously | Vignette describing the importance of limiting internal disclosures of third-party confidential information to co-workers with a need-to-know. | 2:08 | |
140-8 | When Legal Issues Arise, Call Legal | Vignette describing the importance of immediately contacting your legal department when legal issues arise. | 2:14 | |
140-9 | Mark Your Confidential Disclosures | Vignette describing the importance of properly marking confidential disclosures. | 1:22 | |
140-10 | Oral Disclosures Must be Marked | Vignette describing the proper way to deal with oral disclosures made under NDA. | 1:34 | |
140-11 | Have Confidential Information Returned or Destroyed | Vignette describing the importance of requiring the return or destruction of your confidential information at the end of the disclosure period. | 2:16 | |
140-12 | Keep an NDA File | Vignette describing the importance of maintaining an NDA file for a recording both what you have disclosed and what has been disclosed to you…and when. | 2:45 | |
140-13 | Review Your NDA Before You Disclose | Vignette describing the importance of actually reviewing your NDA before each confidential disclosure to ensure that your disclosures will be covered. | 2:25 | |
140-14 | What to Do About Subpoenaed NDA Files | Vignette describing actions in response to a subpoena for confidential information. | 1:38 | |
140-15 | Shred Confidential Records | Vignette describing the importance of shredding confidential information. | 1:31 | |
140-16 | Beware of Reverse Engineering NDA Samples | Vignette describing the typical prohibition against reverse engineering confidential samples delivered under NDA. | 2:20 | |
140-17 | One-Way Versus Two-Way NDAs | Vignette describing the difference between a one-way and two-way NDA. | 2:19 | |
140-18 | Know Your Dates | Vignette describing the important dates associated with NDAs. | 3:42 | |
140-19 | NDA Overview (Vignettes with Quiz) | This is a full program containing all NDA vignettes. | 36:30 | |
Micro Modules (~1 to 2 minutes) | Duration | |||
140-20 | What is a Non-Disclosure Agreement (NDA)? | 1:01 | ||
140-21 | Which Dates Are Important in a Non-Disclosure Agreement? | 1:08 | ||
140-22 | Are Oral Disclosures Covered by Non-Disclosure Agreements? | 1:16 | ||
140-23 | Do All NDA's Protect the Confidential Disclosures of Both Parties? (Two-way Versus One-way) | 0:49 | ||
140-24 | How Should Confidential Material Received from a Party Under an NDA be Protected? | 0:48 | ||
140-25 | Should I Sign the Other Party’s NDA? | 0:47 | ||
140-26 | What isn’t a Non-Disclosure Agreement or NDA? | 1:37 | ||
140-27 | Why Are Non-Disclosure Agreements Important? | 1:22 | ||
140-31 | NDAs Do Not Prevent Unlawful Disclosures | 1:13 | ||
Contracts | ||||
240 | Contract Fundamentals | 14 Videos | ||
Modules (~2 to 10 minutes) | Info | Duration | ||
240-1 | Some Contract Basics You Need to Know | What do you need to know about contracts? When do you call in the experts? What is the difference between an oral and written contract? Why is an oral contract dangerous? What is significant about the signature on the contract? | 9:48 | |
240-2-70-4 | Business Considerations and JDAs | In this module, we will discuss joint development agreements, including the objectives, the risks, and your goals in creating the right JDA such as getting the IP you need to advance your business goals. | 10:32 | |
240-3 | Secondment | In this module, we describe the fundamentals of Secondments to provide seconded employees with information they need to understand their new role and how that impacts their relationship with their employer. | 8:14 | |
240-6 | What to Consider When Dealing With a Contract | 4:21 | ||
240-7 | Damages Provisions in Contracts | 3:16 | ||
240-8 | Contract Warranties and Remedies | 3:15 | ||
240-9 | Indemnity | 1:44 | ||
240-10 | Contract Provisions Related to Intellectual Property | 2:11 | ||
240-11 | Considerations Before Signing a Contract for the Sale of Goods or Services | 2:16 | ||
240-12 | Battle of the Forms in Contract Negotiations | 2:14 | ||
240-13 | What is a Material Transfer Agreement (MTA)? | 10:01 | ||
240-14 | Do I Need an MTA? | 7:01 | ||
Micro Modules (~1 to 2 minutes) | Duration | |||
240-4 | Do I Need Contracts in Connection With My New Invention? | 1:08 | ||
240-5-70-6 | What is a Joint Development Agreement? | 1:15 | ||
Cyber Security | ||||
250 | Cyber Awareness and Risk Reduction | 42 Videos | ||
Full Course (~1 hour 23 minutes) | Info | Duration | ||
250-43 | Cyber Security Awareness and Risk Reduction - Full Course | Cyber-crime is growing fast! More and more criminals are exploiting the speed, convenience, and anonymity of the Internet to commit a diverse range of criminal activities that know no borders, neither physical nor virtual. There are no organizations or people in the world who are impervious to the threat of cyber-crime. The success of our cyber-defense depends upon what we do, or fail to do, with our computers and devices. It can happen to anyone at any time. And if it happens, victims can lose everything; business secrets, intellectual property, identities, life savings, and everything in between. With this course, we will provide you with an overview of online behaviors that can substantially reduce your risk of being victimized by cyber-criminals. | 1:23:14 | |
Modules (~5 to 15 minutes) | Info | Duration | ||
250-18 | Introduction to Cyber Security | An introduction to the various topics related to Cyber Security. | 5:40 | |
250-1 | Fundamentals of Cyber Awareness to Reduce Cyber Risks | Cyber-crime is growing fast! More and more criminals are exploiting the speed, convenience, and anonymity of the Internet to commit a diverse range of criminal activities that know no borders, neither physical nor virtual. There are no organizations or people in the world who are impervious to the threat of cyber-crime. The success of our cyber-defense depends upon what we do, or fail to do, with our computers and devices. It can happen to anyone at any time. And if it happens, victims can lose everything; business secrets, intellectual property, identities, life savings, and everything in between. With this module, we will provide you with the right online behaviors to substantially reduce your risk of being victimized by cyber-criminals. | 12:42 | |
250-2 | Cyber Security and Business Travel | We are increasingly reliant on our portable electronic devices for timely access to digital information while travelling. But, at the same time, when we're on the road, we are more vulnerable than ever. And cyber-criminals know this. They rely upon our vulnerabilities as they stalk us through airports and hotels. All business and personal travelers need to appreciate the enhanced cyber risks they face on the road, and know what to do to reduce those risks. | 4:36 | |
Micro Modules (~1 to 4 minutes) | Info | Duration | ||
250-19 | Malware | What is malware? How does it effect us, and what can we do to avoid it? | 3:25 | |
250-20 | Social Engineering | How do hackers and cybercriminals use Social Engineering to cause us harm. | 4:42 | |
250-21 | Choosing Passwords for Cyber Security | What makes a good, secure password? | 2:01 | |
250-22 | Cyber Security and Your Computer | How can your computer become comprimised by cyber attacks and what can you do to prevent this from happening? | 3:01 | |
250-23 | Cyber Security and Email | How can your email become comprimised by cyber attacks and what can you do to prevent this from happening? | 1:33 | |
250-24 | Cyber Security and Your Mobile Devices | How can your mobile devices become comprimised by cyber attacks and what can you do to prevent this from happening? | 1:57 | |
250-25 | What to Do in the Event of a Cyber Breach | What are some guidelines for reacting to a cyber breach if you are affected? | 1:24 | |
250-39 | E-Skimming | What is e-skimming, and how can you avoid it from happening to you? | 1:11 | |
250-42 | Why Should we use Long, Complicated Passwords | Why are long, complicated passwords important for protecting yourself against hackers? | 2:30 | |
Scenarios (~1 to 2 minutes) | Info | Duration | ||
250-3 | Free USB Drive | A Cyber Awareness scenario related to the Free USB Drive scam. | 0:53 | |
250-4 | Malware on Mobile Devices | A Cyber Awareness scenario related to Malware on Mobile Devices. | 0:31 | |
250-5 | Spear Phishing | A Cyber Awareness scenario related to Spear Phishing. | 0:54 | |
250-6 | USB Charging | A Cyber Awareness scenario related to malware that is delivered through USB ports. | 1:40 | |
250-7 | 7 Year Old Hacker | A Cyber Awareness scenario related to the dangers of using public WiFi. | 0:56 | |
250-8 | Ransomware | A Cyber Awareness scenario related to the dangers of Ransomware. | 0:58 | |
250-9 | Data Breach | A Cyber Awareness scenario related to data breaches. | 1:16 | |
250-10 | Child Predator Email | A Cyber Awareness scenario related to the Child Predator Email scam. | 0:58 | |
250-11 | Stolen Laptop | A Cyber Awareness scenario related to the risks associated with the stolen laptop. | 1:16 | |
250-12 | What is a Link | A Cyber Awareness scenario related to the how links can be used to dupe users. | 1:01 | |
250-13 | Capitalizing on Big Data Breaches | A Cyber Awareness scenario related to how cyber criminals capitalize on big data breaches. | 1:17 | |
250-14 | Fake IT Department | A Cyber Awareness scenario related to the fake IT department scam. | 1:03 | |
250-15 | IRS Scam | A Cyber Awareness scenario related to the IRS scam. | 1:19 | |
250-16 | Democratic National Committee Hacked | A Cyber Awareness scenario related to how the Democratic National Committee Hacked. | 1:28 | |
250-17 | Do Not Share Passwords | A Cyber Awarenss scenario involving protection of passwords | 2:36 | |
250-26 | Malware - Virus | A Cyber Awarenss scenario about viruses- a kind of malware. | 1:07 | |
250-27 | Malware - Worm | A Cyber Awarenss scenario about worms- a kind of malware. | 1:28 | |
250-28 | Malware - Trojan | A Cyber Awarenss scenario about trojans- a kind of malware. | 1:34 | |
250-29 | Malware - Ransomware | A Cyber Awarenss scenario about ransomware- a kind of malware. | 1:45 | |
250-30 | Malware - Adware | A Cyber Awarenss scenario about adware- a kind of malware. | 0:50 | |
250-31 | Malware - Spyware | A Cyber Awarenss scenario about spyware- a kind of malware. | 1:15 | |
250-32 | Malware - Rootkit | A Cyber Awarenss scenario about rootkit- a kind of malware. | 1:03 | |
250-33 | Malware - Scareware | A Cyber Awarenss scenario about scareware- a kind of malware. | 1:28 | |
250-34 | Social Engineering - Baiting | A Cyber Awarenss scenario about a form of social engineering called "baiting." | 2:21 | |
250-35 | Social Engineering - Tailgating | A Cyber Awarenss scenario about a form of social engineering called "tailgating." | 1:36 | |
250-36 | Social Engineering - E-mail Contact Spamming | A Cyber Awarenss scenario about a form of social engineering called "e-mail contact spamming." | 1:17 | |
250-37 | Social Engineering - Pretexting | A Cyber Awarenss scenario about a form of social engineering called "pretexting." | 1:17 | |
250-41 | The Stolen SnapChat Account | A Cyber Awarenss scenario about a password scam that led to a stolen snapchat account. | 1:49 | |
IP Litigation | ||||
260 | IP Litigation | 14 Videos | ||
Module (~4 minutes) | Info | Duration | ||
260-1 | What is a Litigation Hold? | In this module, we describe litigation holds; what they are, why they are important, and main consequences for violating a litigation hold. | 3:54 | |
260-9 | Discovery in IP Litigation | 6:05 | ||
Vignettes (~2 to 3 minutes) | Info | Duration | ||
260-2 | Litigation Hold Means Hold | A scenario related to the definition of Litigation Hold. | 3:07 | |
260-3 | Document Retention Notices Are Not SPAM | A scenario describing the dangers of not taking document retention notices seriously. | 2:39 | |
260-4 | Do More Than Just Check a Box | A courtroom scene showing the penalties associated with violating litigation holds. | 3:31 | |
Micro Module (~1 minute) | Duration | |||
260-5 | What is a Litigation Hold? | 0:49 | ||
260-10 | Disclosure of Confidential Information During Litigation Discovery | 3:42 | ||
260-11 | What are the Basic Types of Subpoenas in Connection with Civil Litigation? | 2:06 | ||
260-12 | Custodians in IP Litigation | 2:44 | ||
260-13 | What is the Work Product Doctrine? | 3:04 | ||
260-14 | What is a Privilege Log? | 1:37 | ||
Power Skills | ||||
280 | Pitching Innovation | 5 Videos | ||
Full Course (~32 minutes) | Info | Duration | ||
280-6 | Public Speaking - Full Course | This is our full course on public speaking. The Pitching Innovation series is intended to teach professionals how to successfully present their innovative ideas to decision-makers. This full course covers our PDRA program; Preparation, Delivery, Response, and the Ask. | 31:38 | |
Micro Modules (~4 to 9 minutes) | Info | Duration | ||
280-1 | Introduction to Public Speaking (Pitching Innovation) | This is the introductory Pitching Innovation module. The Pitching Innovation series is intended to teach professionals how to successfully present their innovative ideas to decision-makers. This module introduces our general PDRA program; Preparation, Delivery, Response, and the Ask. | 4:17 | |
280-2 | Preparation | In this second Pitching Innovation module, we describe the Preparation component in terms of both its importance and the five Key steps for successful preparation. | 9:05 | |
280-3 | Delivery | In this third Pitching Innovation module, we describe the two main components of successful Delivery; Passion and Connection with your audience. | 8:26 | |
280-4 | Response | In this fourth Pitching Innovation module, we describe the five tools to give you an advantage in responding to Questions from your audience. | 5:26 | |
280-5 | The Ask | In this fifth Pitching Innovation module, we describe the final component of our PDRA program; the Ask. | 4:24 |
09-19-2022