𝐈𝐧𝐬𝐢𝐠𝐡𝐭𝐬 𝐨𝐧 𝐈𝐧𝐝𝐞𝐩𝐞𝐧𝐝𝐞𝐧𝐭 𝐂𝐨𝐮𝐧𝐬𝐞𝐥𝐥𝐨𝐫𝐬, 𝐂𝐨𝐧𝐟𝐢𝐝𝐞𝐧𝐭𝐢𝐚𝐥 𝐈𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐚𝐧𝐝 𝐭𝐡𝐞 𝐒𝐭𝐚𝐭𝐞𝐦𝐞𝐧𝐭 𝐨𝐟 𝐂𝐥𝐚𝐢𝐦 𝘐𝘯 𝘵𝘸𝘰 𝘰𝘳𝘥𝘦𝘳𝘴 𝘣𝘦𝘵𝘸𝘦𝘦𝘯 𝘔𝘪𝘤𝘳𝘰𝘴𝘰𝘧𝘵 𝘢𝘯𝘥 𝘚𝘶𝘪𝘯𝘯𝘰 𝘔𝘰𝘣𝘪𝘭𝘦 & 𝘈𝘐 𝘛𝘦𝘤𝘩𝘯𝘰𝘭𝘰𝘨𝘪𝘦𝘴 (ORD_33379/2024 (https://shorturl.at/JVvXC) & ORD_27206/2024 (https://shorturl.at/pUfrh)), 𝘵𝘩𝘦 𝘗𝘢𝘳𝘪𝘴 𝘊𝘦𝘯𝘵𝘳𝘢𝘭 𝘋𝘪𝘷𝘪𝘴𝘪𝘰𝘯 𝘤𝘭𝘢𝘳𝘪𝘧𝘪𝘦𝘴 𝘵𝘩𝘢𝘵 𝘢 𝘣𝘳𝘦𝘢𝘤𝘩 𝘰𝘧 𝘵𝘩𝘦 𝘊𝘰𝘥𝘦 𝘰𝘧 𝘊𝘰𝘯𝘥𝘶𝘤𝘵 𝘰𝘯 𝘵𝘩𝘦 𝘪𝘯𝘥𝘦𝘱𝘦𝘯𝘥𝘦𝘯𝘤𝘦 𝘰𝘧 𝘤𝘰𝘶𝘯𝘴𝘦𝘭𝘭𝘰𝘳𝘴 𝘤𝘢𝘯𝘯𝘰𝘵 𝘣𝘦 𝘢𝘴𝘴𝘦𝘳𝘵𝘦𝘥 𝘣𝘺 𝘰𝘱𝘱𝘰𝘴𝘪𝘯𝘨 𝘱𝘢𝘳𝘵𝘪𝘦𝘴 (R. 8.1 RoP, R. 290.2 RoP and Art. 48 UPCA). 𝘍𝘶𝘳𝘵𝘩𝘦𝘳𝘮𝘰𝘳𝘦: (1) 𝘵𝘩𝘦 𝘊𝘋 𝘢𝘭𝘭𝘰𝘸𝘴 𝘚𝘶𝘪𝘯𝘯𝘰’𝘴 𝘳𝘦𝘲𝘶𝘦𝘴𝘵 𝘧𝘰𝘳 𝘱𝘳𝘰𝘵𝘦𝘤𝘵𝘪𝘰𝘯 𝘰𝘧 𝘤𝘰𝘯𝘧𝘪𝘥𝘦𝘯𝘵𝘪𝘢𝘭 𝘪𝘯𝘧𝘰𝘳𝘮𝘢𝘵𝘪𝘰𝘯, 𝘢𝘯𝘥 (2) 𝘚𝘶𝘪𝘯𝘯𝘰’𝘴 𝘴𝘵𝘢𝘵𝘦𝘮𝘦𝘯𝘵 𝘰𝘧 𝘤𝘭𝘢𝘪𝘮 𝘮𝘦𝘦𝘵𝘴 𝘵𝘩𝘦 𝘳𝘦𝘲𝘶𝘪𝘳𝘦𝘮𝘦𝘯𝘵𝘴 𝘰𝘧 𝘙𝘶𝘭𝘦 13(1)(𝘬) 𝘙𝘰𝘗. ▪ The obligation to act as an independent counsellor protects the effectiveness of the party’s right to defence in court. ▪ Lack of independence must not be assessed in an absolute sense, but must be assessed with reference to the possible harm to the interests of the party on whose behalf the professional acts. ▪ Due to the instrumental nature of the obligation of independence to protect a party’s right to an effective defence in courts, a possible violation cannot be asserted by the opposing party who has no interest in such a finding. ▪ Additionally, the claims were not supported by evidence that shows that the representative used their right for other purposes than granted. ▪ Therefore, Microsoft’s objection of inadmissibility is denied. 𝐅𝐮𝐫𝐭𝐡𝐞𝐫𝐦𝐨𝐫𝐞: ▪ C̳o̳n̳f̳i̳d̳e̳n̳t̳i̳a̳l̳ ̳i̳n̳f̳o̳r̳m̳a̳t̳i̳o̳n̳ ̳(̳a̳r̳t̳.̳ ̳5̳8̳ ̳U̳P̳C̳A̳ ̳a̳n̳d̳ ̳R̳.̳2̳6̳2̳A̳ ̳R̳o̳P̳)̳: A request for the protection of confidential information involves balancing both the efficient protection of information (even from the opposing party) and ensuring open access for presenting a proper defense. In this case Suinno’s application is granted; access to the license agreements is restricted to Microsoft attorneys and Microsoft directors with a legitimate need to access the information. ▪ C̳o̳n̳t̳e̳n̳t̳ ̳o̳f̳ ̳t̳h̳e̳ ̳s̳t̳a̳t̳e̳m̳e̳n̳t̳ ̳o̳f̳ ̳c̳l̳a̳i̳m̳ ̳(̳R̳u̳l̳e̳ ̳1̳3̳(̳1̳)̳(̳k̳)̳)̳: Microsoft’s claim that the information given in the statement of claim is insufficiently concrete and specific is denied. The ‘nature’ of the order of the remedy sought, and the request to determine and award past damages (April 2019 and later) with interest are clearly indicated. ----- For more information about our UPC Cooperation, please visit our website: www.vossiusbrinkhof.eu #upc #news #unifiedpatentcourt #litigation #microsoft Brinkhof N.V. VOSSIUS
VOSSIUS & BRINKHOF UPC LITIGATORS’ Post
More Relevant Posts
-
When you overlook confidentiality in investigations, you risk compromising sensitive information and trust. Ensure privacy and confidentiality with best practices. For tailored financial and legal solutions, visit our website. Share your thoughts on confidentiality below! 🔒💼 #Confidentiality #BestPractices Made with mymarky.ai
To view or add a comment, sign in
-
Is your agency prepared to handle data preservation and legal holds effectively? Join Exterro and DGI on Oct 17 for an insightful webinar designed for government professionals, where we’ll cover strategies to enhance compliance, reduce risks, and increase defensibility in your legal processes. Sign up now!
To view or add a comment, sign in
-
Data loss can severely impact any business. Keeping your knowledge and systems up to date is key to avoiding critical mistakes. We’ve pulled together some tips to help you understand the risks, dangers, and problems faced by the legal sector. Learn how to better protect your legal firm today by downloading our FREE resources: https://lnkd.in/eEA8rAWS
To view or add a comment, sign in
-
SECRECY VS TRANSPARENCY Official Secrets: The secrecy versus transparency debate in the context of government is essentially a discussion on the old versus the new. Two laws exemplify this: the Official Secrets Act, of 1923, and the Right to Information Act, of 2005. The coverage of the Official Secrets Act is very limited, contrary to perceptions about its wider applicability. The Act is primarily about espionage and helping the enemies of the State with information. While ‘secret’ is not defined, there is a long list of prohibited places, mostly defence-related installations, factories, etc. The theme being national security, there is some sanctity to the secret information, which may be in the form of any reference to a place belonging to or occupied by the government, documents, photographs, sketches, maps, plans, models, official codes, or passwords. The Second Administrative Reforms Commission, headed by Veerappa Moily, had recommended that the relevant provisions of this Act could be incorporated as a separate chapter in the National Security Act, of 1980. Here again, the difficulty is that the National Security Act deals with preventive detention only. Whether it is the Official Secrets Act or the National Security Act, the nomenclature does not always reflect the real content of the law! The connotation of names can be misleading in law as well.
To view or add a comment, sign in
-
Is your agency prepared to handle data preservation and legal holds effectively? Join Exterro and DGI on Oct 17 for an insightful webinar designed for government professionals, where we’ll cover strategies to enhance compliance, reduce risks, and increase defensibility in your legal processes. Sign up now!
Preserve and Protect: The Essentials of Legal Holds & Preservation for Government Agencies
https://digitalgovernment.com
To view or add a comment, sign in
-
Tomorrow, we’re diving into the essentials of managing subject access requests as part of our Data Protection Webinar series. Join partner Tom Llewellyn and solicitor Hugh Houlston for a session which will equip you with up-to-date legal insights and practical tools to identify and manage these requests. With subject access requests becoming more frequent and nuanced, staying ahead of the latest developments is essential. There is still time to register for this webinar - find out more and RSVP here: https://lnkd.in/eN3YQjhY #DataProtection #Webinar #SubjectAccessRequest
To view or add a comment, sign in
-
Someone attacks you or your business online. What do you do? Many people’s first instinct is to send a nastygram from a lawyer - also known as a cease and desist letter. While there are instances where a cease and desist letter is helpful or even required, they can also backfire, increasing and prolonging negative publicity. Here are some things to consider: 1. Verify the Infringement Ensure that there is a clear violation of your rights, whether it’s intellectual property, defamation, or breach of contract. 2. Gather Evidence Document all instances of the infringement. This will be crucial if the matter escalates. Take screen shots and print webpages in case the informant is later taken down. 3. Consider the Relationship and the Instigator Think about the potential impact on your relationship with the recipient, their mental state, and the likely outcome or consequence of the letter. Sometimes, a direct conversation can resolve the issue more amicably. Sometimes ignoring the statement is the best response. ** 4. Consider the Unintended Consequences Understand that sending a cease and desist can escalate the situation. Be prepared for the possibility of legal pushback. The recipient posting the cease and desist letter online. The recipient increasing their attacks knowing that their actions are receiving a response. 5. Seek Legal Advice Consult with an attorney to help analyze whether a letter should be sent, what it should state, and what happens if the recipient continues. Make sure you are fully prepared on the next possible steps before sending the letter.
To view or add a comment, sign in
-
Looking to safeguard your confidential documents and information? Look no further! From document shredding to hard drive destruction, we have you covered. Our services come with a transparent pricing policy - no hidden fees, just one simple and consistent price for all your needs. Say goodbye to unexpected charges and give us a call today! 📲 1-866-747-3387 #confidentiality #informationsecurity #transparency
To view or add a comment, sign in
-
E & O Question - Do you have paper & electronic files in your agency? If you do, scan all your paper files and then shred them. A smart lawyer will say, "if you don't trust your electronic files, why should this court?" Our members have access to more E & O tips at www.iiabaz.com. Check them out.
Should Agencies Keep Both Paper and Electronic Copies of Files?
iamagazine.com
To view or add a comment, sign in
-
Is your agency prepared to handle data preservation and legal holds effectively? Join Exterro and DGI on Oct 17 for an insightful webinar designed for government professionals, where we’ll cover strategies to enhance compliance, reduce risks, and increase defensibility in your legal processes. Sign up now!
Preserve and Protect: The Essentials of Legal Holds & Preservation for Government Agencies
https://digitalgovernment.com
To view or add a comment, sign in
527 followers
Patent lawyer, litigator / UPC Representative at Brinkhof and Vossius&Brinkhof
5moValuable and important UPC insights!