January 04, 2005 | New York Law Journal
'Perfect 10 vs. Google'Peter J. Pizzi, a partner in Connell Foley, asks: Could the right to search copyrighted images on the Internet be in jeopardy? That would be outcome if Perfect 10, Inc., a purveyor of adult entertainment, has its way.
By Peter J. Pizzi
12 minute read
March 08, 2005 | Legaltech News
Idea vs. Expression: Copyright Claim for Industrial Parts Vexes the 3rd CircuitFor more than a century, the idea/expression dichotomy in copyright law has troubled courts. Only the expression of an idea can be protected by copyright, not the idea itself. A recent 3rd Circuit decision wrestled with this elusive distinction in the rather mundane context of industrial fasteners. The ruling has implications for other industries, including computer hardware and software, because it may further limit protectable elements in those fields.
By Peter J. Pizzi and Noel D. Humphreys
10 minute read
September 15, 2006 | Law.com
Companies Fight Employee Data Theft With Computer Fraud and Abuse ActEmployers victimized by disloyal employees who have misappropriated sensitive computer data have successfully sued under the Computer Fraud and Abuse Act. Section 1030(g) of the act offers a right to injunctive relief and damages where the former employee "without authorization" has accessed the network in order to take proprietary information or interfere with the company's relationships. According to attorney Peter J. Pizzi of Connell Foley, the act turns on the meaning of "without authorization."
By Peter J. Pizzi
12 minute read
May 11, 2005 | Law.com
Tech Litigation Lessons From 'Uncle Henry'Attorney Peter J. Pizzi examines a recent 1st Circuit decision, Uncle Henry's Inc. v. Plaut Consulting, Inc., which demonstrates the litigation hazards that software and Web developers face when a project does not launch because, somewhere along the way, the working relationship between developer and customer utterly collapsed. See what lessons this case offers to other parties confronting similar situations.
By Peter J. Pizzi
10 minute read
August 08, 2005 | New Jersey Law Journal
Grokster Means More Litigation for Tech FirmsIf the evidence relied upon by the Court in Grokster is any indication, it will hardly take a "smoking gun" to find against the technology firm.
By Peter J. Pizzi
4 minute read
January 03, 2006 | New York Law Journal
Google's Book ProjectPeter J. Pizzi, a member of Connell Foley, writes that the ability of computers to create perfect copies and, through the Internet, to disperse copies instantly, has lead to continuing conflicts between "content" industries and the forces of Internet-based information technology.
By Peter J. Pizzi
12 minute read
May 11, 2005 | Legaltech News
Tech Litigation Lessons From 'Uncle Henry'Attorney Peter J. Pizzi examines a recent 1st Circuit decision, Uncle Henry's Inc. v. Plaut Consulting, Inc., which demonstrates the litigation hazards that software and Web developers face when a project does not launch because, somewhere along the way, the working relationship between developer and customer utterly collapsed. See what lessons this case offers to other parties confronting similar situations.
By Peter J. Pizzi
10 minute read
February 22, 2005 | New York Law Journal
Idea vs. ExpressionA recent en banc decision by the U.S. Court of Appeals for the Third Circuit wrestled with an elusive distinction in the rather mundane context of industrial fasteners.
By Peter J. Pizzi and Noel D. Humphreys
10 minute read
May 02, 2006 | New York Law Journal
Google Image SearchPeter J. Pizzi, a partner at Connell Foley, writes that adult material has always proliferated on the Internet. It is a safe bet that a nude photograph posted on a Web site will be copied and displayed on dozens of other sites within days of its original posting. If that image is copyrighted, each replication represents an act of infringement.
By Peter J. Pizzi
13 minute read
September 05, 2006 | New York Law Journal
Disloyal EmployeesPeter J. Pizzi, chair of Connell Foley's Internet and information law practice, writes that most courts have interpreted the Computer Fraud and Abuse Act, which offers injunctive relief and damages when a former employee "without authorization" has accessed a company's network in order to abscond with proprietary information, to include departing employees. Recently, a district court has gone against this precedent.
By Peter J. Pizzi
12 minute read
Trending Stories