ITC Will Rule Over Apple’s Lawsuit Against Samsung Patent Infringement

apple in newsThe International Trade Commission (ITC) decided to take up Apple’s lawsuit against South Korean technology company, Samsung, for alleged patent infringements today.

According to Apple, several of Samsung’s smartphones and tablet devices are using  components and functions that Apple owns the rights to.  They requested that Samsung refrain from releasing their Galaxy Tab 10.1 in the United States and abroad until a model has been given to their legal team to investigate.

In fact, Apple is not only filing suit against Samsung in the United States alone, but also trying to attack them in their foreign markets.  Logic would dictate that Apple wants to insure Samsung isn’t selling their intellectual properties in markets they have yet to be tried in.

International Trade Commission Press Statement:

The U.S. International Trade Commission (USITC) has voted to institute an investigation of certain electronic digital media devices and components thereof. The products at issue in this investigation include mobile phone handsets and tablet computers, in addition to components such as software, touchpads, and hardware interfaces.

The investigation is based on a complaint filed by Apple Inc. of Cupertino, CA, on July 5, 2011. The complaint alleges violations of section 337 of the Tariff Act of 1930 in the importation into the United States and sale of certain electronic digital media devices and components thereof that infringe patents asserted by Apple. The complainant requests that the USITC issue an exclusion order and cease and desist orders.

This Isn’t Apple’s First Go-round

The ITC has had their hands full with Apple’s patent infringement cases of late–ruling on cases against HTC, Samsung and various other smaller companies.  If anything, it proves that Apple’s strategy is to protect their intellectual property at all costs.  Sometimes, hurting your competitors in the courtroom can be as effective as on the open market–especially if it can be proven that they are in fact stealing information.

SOURCEwww.macrumors.com       

Login

Comments

There are no comments yet, be the first!

Login

Reply