{"version":"1.0","provider_name":"Baker &amp; Associates Blog","provider_url":"https:\/\/www.bakerslaw.com\/blogs\/8183","author_name":"doadmin","author_url":"https:\/\/www.bakerslaw.com\/blogs\/8183\/author\/doadmin\/","title":"A DIFFERENT APPROACH TO PROTECTING YOUR INTELLECTUAL PROPERTY - Baker &amp; Associates Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"6ZHjRMAz8W\"><a href=\"https:\/\/www.bakerslaw.com\/blogs\/8183\/a-different-approach-to-protecting-your-intellectual-property\/\">A DIFFERENT APPROACH TO PROTECTING YOUR INTELLECTUAL PROPERTY<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.bakerslaw.com\/blogs\/8183\/a-different-approach-to-protecting-your-intellectual-property\/embed\/#?secret=6ZHjRMAz8W\" width=\"600\" height=\"338\" title=\"&#8220;A DIFFERENT APPROACH TO PROTECTING YOUR INTELLECTUAL PROPERTY&#8221; &#8212; Baker &amp; Associates Blog\" data-secret=\"6ZHjRMAz8W\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.bakerslaw.com\/blogs\/8183\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"In previous posts, we have talked about the various tools business owners can utilize to protect their intellectual property: non-disclosure agreements, patents and copyrights among them. These measures can protect the originality of the work in question and help prevent others from unauthorized use. However, understand that people may still try to copy or recreate [&hellip;]"}