Best Practices in IP Today — Practical Considerations from Both In-House and Outside Counsel
24 January 2008
Foley Intellectual Property Partner Victor de Gyarfas and Senior Counsel Ed Polk, Jr. spoke at the American Intellectual Property Law Association (AIPLA) Mid-Winter Institute Meeting, “Best Practices in IP Today — Practical Considerations from Both In-House and Outside Counsel.”
Mr. de Gyarfas spoke on the topic of Drafting Licensing Letters to Avoid Declaratory Judgment Actions, which covered the following:
- Effective licensing letters before MedImmune v. Genentech
- The Supreme Court’s dicta in footnote 11 of MedImmune
- Federal Circuit cases involving licensing letters since MedImmune
- What can be done to avoid a declaratory judgment action post MedImmune
- Licensing and declaratory judgment litigation post-MedImmune
Mr. Polk moderated a panel discussing hourly billing, creative alternatives, pitfalls to avoid, and practical solutions for these often difficult issues.
People
Related Insights
27 May 2025
Events
The RIF Roadmap: Tools and Tactics for a Smooth and Compliant Transition
Join us for an insightful discussion on proactive workforce planning in today's dynamic economic and regulatory landscape.
16 May 2025
Manufacturing Industry Advisor
Reese’s Law: The Evolving Regulatory and Enforcement Landscape for Consumer Products Containing Button Cell or Coin Batteries
Over the past year, manufacturers, importers, distributors, and retailers of consumer products containing button cell and coin batteries (or products intended to contain them) have continued to adapt to the requirements of Reese’s Law and the Consumer Product Safety Commission’s corresponding enforcement efforts.
29 May 2025
Events
May 2025 Midwest Cyber Security Alliance Meeting | What Happens After a Breach: Practical Tips for the Notification Process
Join us on Thursday, May 29, 2025, at the next Midwest Cyber Security Alliance Meeting. Brandon Hollinder, Esq., and Adam Botter from Epiq will provide practical tips and insights on organizing the data mining and subsequent notification process after a cybersecurity breach.