a

Facebook

Twitter

Copyright 2023 Ernest Goodman Law Firm - Los Angeles - New York.
All Rights Reserved.

9:00 AM - 5:00 PM

Our Opening Hours Mon. - Fri.

+1818-858-0406

Call Us.

Facebook

Twitter

Search
Menu
 

Professional Tips Tag

Law Offices of Ernest Goodman > Posts tagged "Professional Tips"

Tips for IP Portfolio Management

a

An IP portfolio refers to the collection of intellectual property owned by an individual or a company, including patents, trademarks, copyrights, and trade secrets. It serves as a strategic asset for the business, providing protection for the company's products, processes, and ideas. An IP portfolio can be used to deter potential competitors from infringing on the company's intellectual property rights and can also be leveraged to generate revenue through licensing agreements or other commercial transactions....

Continue reading

The Privacy Law and Cyber Security Implications of Automobiles

Many people are unaware that modern cars come equipped with hundreds of sensors that record their every move. These devices have raised concerns about privacy as cars have become part of the Internet of Things (IoT). Gone are the days when cars were merely a means of transportation. In 2014, Jim Farley, an executive at Ford, admitted that the company could track drivers’ movements via GPS, stating, “We know everyone who breaks the law, we know when you’re doing it.” While Farley later clarified that Ford did not track customers without their approval or consent, the privacy concerns surrounding connected...

Continue reading

Overly broad interpretations of the Computer Fraud and Abuse Act (CFAA)

a

Ethical hacking involves utilizing mathematical and programming abilities to pinpoint weak areas or susceptibilities in information systems. The hacking realm is categorized based on purpose, with a white hat hacker being an ethical hacker with good intentions. These professionals specialize in penetration testing and other examination methodologies that guarantee the security of an organization's information systems. Most ethical hackers possess advanced knowledge in mathematics, computer programming, networking, and operating systems....

Continue reading