Viewers will learn about what technology transfer is, the federal research apparatus that underpins its origins, the Bayh-Dole Act, and other legislation leading to the field’s proliferation, the path to commercialization, licensing from universities, and illustrative examples of successful technology transfer.
The presentation will discuss important concepts such as freedom to operate and patent infringement, how patents compare with trade secrets, and monetizing patents.
Join us for an exciting session on how AI is driving another patent boom. We’ll take a deep dive into the various interdisciplinary fields of AI, including computer vision, deep learning, robotic process automation, and neural networks. Learn what differentiates these categories in terms of utility and patent eligibility.
In this session, we will explore the proliferation of automated workflow tools in patent drafting & prosecution. Case studies will detail how patent lawyers are successfully leveraging these tools, as well as some of the limitations and hype surrounding automation. We will also examine the downward economics of depleting patent law practices, and how automation can be utilized to revamp workflow & revenues.
f you’re head’s spinning while trying to keep up with the recent explosion of legal AI companies & capraise pressers of the past couple years, this session will slow things down for you. We’ll map out the new LegalTech landscape, key innovations, trendlines, and of course all the expectations that come with that hype. We’ll also profile the biggest players in the VC space and how they’re reshaping our profession.
This program will examine the basics of CDA 230 and its day to day affect for those who advise internet businesses as well as those who litigate against them. It will give practical guidance as to what extend internet companies can or should edit or censor the information their users contribute to their sites and to what extent those users will actually be liable.
This session will explore best practices of data management and issues post-acquisition relating to document retention, records management, litigation hold policies, legal preservation, data privacy, and discovery management.
A data breach occurs, whats next? Once it is determined that a breach has occurred there are a series of steps the legal department should take to determine the size of the impact, how the attack occurred, and how to prevent future attacks. This process will involve an investigation and potentially litigation. Therefore, having a strategic plan in place prior to a breach is imperative.