top of page

Blog
Search


Rosie Burbidge
May 1, 20212 min read
Can you consent to a database extraction breach of confidence?
This was a complex dispute concerning a claims management database. It involved alleged infringement of a database right, misuse of...


Rosie Burbidge
May 1, 20213 min read
Can you protect XML Schema with IP?
Disputes relating to software are often complex, with multiple parties and issues involved. However, they can also illuminate important...


Rosie Burbidge
Nov 25, 20187 min read
How can you protect data?
Data was described by The Economist as as the new oil. Every valuable asset tends to be protected by IP in some shape or form and data is no
bottom of page