What can I do if someone posts mean things about me online?
FCPA Compliance and Ethics Report-Episode 184-Marc Bohn on the Mead Johnson FCPA Enforcement Action
FCPA Compliance and Ethics Report-Episode 182-Kate Atkinson on the Miller Chevalier Summer 2015 FCPA Report
Polsinelli Podcast - Federal Circuit Delays Sandoz Biosimilar Launch
Talking PTAB with Bob Steinberg
Indefiniteness Before the PTAB
Compiling Successful IP Solutions for Software Developers
Protecting IP Through Employment Law
Collaborating Before The PTAB
Is Biotech Patentable Subject Matter?
The U.S. Trademark Use Requirement and Associated Risks and Strategies for Chinese Applicants
Wearables and the Future of Intellectual Property Law
BakerHostetler Partner Paul Karlsgodt Discusses Privacy Class Actions
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
BakerHostetler Partner Alan Friel Talks Big Data and Data Collection
Is The Deck Stacked Against Patent Owners In The PTAB?
BakerHostetler's Tanya Forsheit Discusses Cloud Computing
Drafting Software Patents In A Post-Alice World
Enforcement Challenges For Biotech Patents
PATIENT PRIVACY IN AN ERA OF SOCIAL MEDIA
In July, a group of hackers identifying themselves as the Impact Team took over the computer systems of Avid Life Media (“ALM”), the parent company of the adultery-oriented website Ashley Madison, threatening to release the...more
In last week’s blog, we discussed developing trends in e-discovery law in the Asia-Pacific region. This week, we explore five trends that will continue to spur the growth of e-discovery in this region over the next few years....more
For technology startups, maintaining strong security controls remains vital to winning new business opportunities and strengthening existing relationships. Despite the global spike in cybersecurity attacks (there were 42.8...more
Protecting Trade Secrets in the Era of the Data Breach -
The prevalence of data breaches cannot be ignored. New data breaches continue to occur one after an-other. In the first half of 2015 alone there were reports of...more
As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more
Welcome to the dog days of summer 2015. Three privacy & security bits and bytes to start your week (if you are reading this on vacation … good for you!)
1. ICYMI: Massive Data Breach at OPM Claims Victim — The Director...more
There are only two types of companies left in the United States: those that have been hacked and those that will be hacked. In the last year alone, forty-three percent (43%) of U.S. companies experienced a data breach,...more
As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more
The recent hacking of the sensitive personal information of millions of American public servants at the Office of Personnel Management (OPM) points out a noteworthy distinction in how the U.S. government views some types of...more
In this Presentation:
- Chocolate, Cookies, Coffee and Biscuits
- Privacy, Legislation, Underworld behaviour
- Even manufacturers have secrets to protect!
- Invention, 1%’ers and...more
St. Louis Cardinals owner Bill DeWitt, Jr. threw staff members under the bus following the breaking story last week that the Cardinals have been hacking into the Astros’ database for up to three years. According to DeWitt, a...more
In Parts One and Two of this e-alert series, we discussed the federal Computer Fraud And Abuse Act ("CFAA") and its California corollary the California Computer Data Access And Fraud Act (CDAFA). In Part Three, we provide a...more
In this Presentation:
- Internet of Things - definition
- But what is it all about?
- But not just that...
- The IoT market in figures...
- Beecham Research - view of the World
- The Connected...more
The Internet of Things: EU vs US guidance -
Reports from the European Commission and the FTC on privacy and security best practices for IoT - key issues and highlights...
Are IPRs impacting the pharmaceutical...more
Health care startups are expected to attract billions in venture capital in the next few years. Despite the pace and excitement this surge of investment creates, these next-wave digital disruptors need to keep three legal...more
Information security is a growing concern for companies and legal teams around the world. The rising tide of cybersecurity issues and insider threats pose great risks to a company’s crown jewels: its intellectual property....more
Space: The final frontier. For millennia, people have wanted to explore the great unknown of outer space, and series like Star Trek and Star Wars continue to our fuel our fantasies about what lies beyond our stratosphere. ...more
SPECIAL FOCUS: The Impact of the Supreme Court’s Octane Fitness Decision on Lanham Act Litigation -
For the second time in recent years, a Supreme Court decision in a patent case is having a major impact on Lanham Act...more
College and universities, like many other businesses and organizations, defend against millions of cyberattacks each day. Most recently, Penn State’s College of Engineering discovered a multi-year long cyberattack seeking...more
As post-Snowden America well knows, for some years now the National Security Agency (NSA) has been collecting bulk telephone metadata under the authority of Section 215 of the PATRIOT Act and aggregating it into data banks...more
In the past two years, Rightscorp, Inc. has sought the identity of thousands of Internet subscribers across the country, in order to obtain settlements for alleged violations of its clients’ copyrights. ...more
Belgium: Even a world famous painter needs to respect copyright - It has been held that the well-known Belgian painter Luc Tuymans breached professional photographer Katrijn Van Giel's copyright through his...more
On April 29, 2015, the Cybersecurity Unit in the Computer Crime and Intellectual Property Section (CCIPS) of the U.S. Department of Justice released a best practices document (Document) for victims of cyber incidents. The...more
The big fight may be over, but the implications of Mayweather vs. Pacquiao with respect to real-time, one-to-many streaming of video through apps like Meerkat and Periscope are still rippling through the media industry. In...more
Tanya Forsheit, Partner with BakerHostetler's Privacy and Data Protection team discusses cloud computing and privacy issues....more
Find an Intellectual Property Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top