What can I do if someone posts mean things about me online?
FCPA Compliance and Ethics Report-Episode 184-Marc Bohn on the Mead Johnson FCPA Enforcement Action
FCPA Compliance and Ethics Report-Episode 182-Kate Atkinson on the Miller Chevalier Summer 2015 FCPA Report
Polsinelli Podcast - Federal Circuit Delays Sandoz Biosimilar Launch
Talking PTAB with Bob Steinberg
Indefiniteness Before the PTAB
Compiling Successful IP Solutions for Software Developers
Protecting IP Through Employment Law
Collaborating Before The PTAB
Is Biotech Patentable Subject Matter?
The U.S. Trademark Use Requirement and Associated Risks and Strategies for Chinese Applicants
Wearables and the Future of Intellectual Property Law
BakerHostetler Partner Paul Karlsgodt Discusses Privacy Class Actions
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
BakerHostetler Partner Alan Friel Talks Big Data and Data Collection
Is The Deck Stacked Against Patent Owners In The PTAB?
BakerHostetler's Tanya Forsheit Discusses Cloud Computing
Drafting Software Patents In A Post-Alice World
Enforcement Challenges For Biotech Patents
PATIENT PRIVACY IN AN ERA OF SOCIAL MEDIA
In last week’s blog, we discussed developing trends in e-discovery law in the Asia-Pacific region. This week, we explore five trends that will continue to spur the growth of e-discovery in this region over the next few years....more
A few years back, we had a client – a manufacturing business – that decided to sue an ex-employee for stealing its trade secrets. Our client had developed a process that was unique. Using this process, it was able to...more
For technology startups, maintaining strong security controls remains vital to winning new business opportunities and strengthening existing relationships. Despite the global spike in cybersecurity attacks (there were 42.8...more
Protecting Trade Secrets in the Era of the Data Breach -
The prevalence of data breaches cannot be ignored. New data breaches continue to occur one after an-other. In the first half of 2015 alone there were reports of...more
Employers need clear policies in order to use a federal criminal law as a civil remedy against workers.
The recent decision in Allied Portables v. Youmans from the U.S. District Court for the Middle District of Florida...more
Welcome to the newest issue of Socially Aware, our Burton Award winning guide to the law and business of social media. In this edition, we present a “grand unifying theory” of today’s leading technologies and the legal...more
As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more
Welcome to the dog days of summer 2015. Three privacy & security bits and bytes to start your week (if you are reading this on vacation … good for you!)
1. ICYMI: Massive Data Breach at OPM Claims Victim — The Director...more
There are only two types of companies left in the United States: those that have been hacked and those that will be hacked. In the last year alone, forty-three percent (43%) of U.S. companies experienced a data breach,...more
As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more
The recent hacking of the sensitive personal information of millions of American public servants at the Office of Personnel Management (OPM) points out a noteworthy distinction in how the U.S. government views some types of...more
Raisins, radioactive wrists, Red Roof registries, and reformatory roughhousing were all on the Court's radar Monday (it's a very broad radar horizon), as it issued decisions in Horne v. Dep't of Agriculture (14-275), holding...more
In this Presentation:
- Chocolate, Cookies, Coffee and Biscuits
- Privacy, Legislation, Underworld behaviour
- Even manufacturers have secrets to protect!
- Invention, 1%’ers and...more
St. Louis Cardinals owner Bill DeWitt, Jr. threw staff members under the bus following the breaking story last week that the Cardinals have been hacking into the Astros’ database for up to three years. According to DeWitt, a...more
In Parts One and Two of this e-alert series, we discussed the federal Computer Fraud And Abuse Act ("CFAA") and its California corollary the California Computer Data Access And Fraud Act (CDAFA). In Part Three, we provide a...more
In This Issue:
- Debruge and Childs Alabama Law Survey on Employee Privacy Laws Published to Practical Law
- "WTF", Under the NLRB, Employers Should "Cut the Crap?"
- Tom Brady, Deflategate, and Florida...more
Early Monday morning you learn that Jane, your former employee, has stolen your company’s confidential information and her new employer is using it. You call your lawyer and tell her that you want to put Jane in jail. Your...more
In this Presentation:
- Internet of Things - definition
- But what is it all about?
- But not just that...
- The IoT market in figures...
- Beecham Research - view of the World
- The Connected...more
The Internet of Things: EU vs US guidance -
Reports from the European Commission and the FTC on privacy and security best practices for IoT - key issues and highlights...
Are IPRs impacting the pharmaceutical...more
Health care startups are expected to attract billions in venture capital in the next few years. Despite the pace and excitement this surge of investment creates, these next-wave digital disruptors need to keep three legal...more
As you have likely seen by now, on March 18, 2015, the National Labor Relations Board Office of the General Counsel ("GC") issued an extensive memorandum offering guidance on employer rules and handbooks. This memorandum...more
Do your employees understand the importance of intellectual property (IP) to your company and steps that they should be taking to protect it? Do they recognize that exposing proprietary information, such as product...more
Legislation and Regulation -
What are the principal statutes regulating advertising generally?
The principal federal statute regulating advertising in Canada is the Competition Act, which is a law of general...more
Information security is a growing concern for companies and legal teams around the world. The rising tide of cybersecurity issues and insider threats pose great risks to a company’s crown jewels: its intellectual property....more
Space: The final frontier. For millennia, people have wanted to explore the great unknown of outer space, and series like Star Trek and Star Wars continue to our fuel our fantasies about what lies beyond our stratosphere. ...more
Find an Intellectual Property Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top