In this breakfast briefing, a distinguished panel of speakers including Representative Darrell Issa (R-Calif.), who has proposed legislation to amend remedies under U.S. patent law for false marking, will discuss this recent onslaught of false patent marking cases, the latest decisions from the courts in this area, and the legislative efforts underway to curtail these cases.
The panel will address:
- Where we are now — an update and status report of the latest court decisions in this area
- What do you do — implementing an effective and compliant patent marking policy
- What the future holds — updates on the legislative efforts to curtail this litigation
- How we got where we are — the statute and federal court decisions that paved the way for the flood of litigation
Guest Panelist
- Representative Darrell Issa (R-Calif.)
Foley Speaker
- Douglas Carsten, Partner and member, IP Litigation Practice
Foley will apply for CLE credit after the breakfast briefing.
Related Insights
27 May 2025
Events
The RIF Roadmap: Tools and Tactics for a Smooth and Compliant Transition
Join us for an insightful discussion on proactive workforce planning in today's dynamic economic and regulatory landscape.
16 May 2025
Manufacturing Industry Advisor
Reese’s Law: The Evolving Regulatory and Enforcement Landscape for Consumer Products Containing Button Cell or Coin Batteries
Over the past year, manufacturers, importers, distributors, and retailers of consumer products containing button cell and coin batteries (or products intended to contain them) have continued to adapt to the requirements of Reese’s Law and the Consumer Product Safety Commission’s corresponding enforcement efforts.
29 May 2025
Events
May 2025 Midwest Cyber Security Alliance Meeting | What Happens After a Breach: Practical Tips for the Notification Process
Join us on Thursday, May 29, 2025, at the next Midwest Cyber Security Alliance Meeting. Brandon Hollinder, Esq., and Adam Botter from Epiq will provide practical tips and insights on organizing the data mining and subsequent notification process after a cybersecurity breach.