Intellectual Property Privacy Science, Computers & Technology

Read Intellectual Property Law updates, alerts, news, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Is Ashley Madison abusing the Digital Millennium Copyright Act in the Wake of Hack?

In July, a group of hackers identifying themselves as the Impact Team took over the computer systems of Avid Life Media (“ALM”), the parent company of the adultery-oriented website Ashley Madison, threatening to release the...more

Five Drivers of E-Discovery in the APAC Region

In last week’s blog, we discussed developing trends in e-discovery law in the Asia-Pacific region. This week, we explore five trends that will continue to spur the growth of e-discovery in this region over the next few years....more

Cybersecurity for Startups Now a Cost of Entry for Consideration by Larger Clients: What is Your Company's Plan?

For technology startups, maintaining strong security controls remains vital to winning new business opportunities and strengthening existing relationships. Despite the global spike in cybersecurity attacks (there were 42.8...more

Intellectual Property Newsletter - July - August 2015

Protecting Trade Secrets in the Era of the Data Breach - The prevalence of data breaches cannot be ignored. New data breaches continue to occur one after an-other. In the first half of 2015 alone there were reports of...more

Trade Secrets, Security, and Cloud Computing: Best Practices Now

As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more

Privacy Monday – July 2015

Welcome to the dog days of summer 2015. Three privacy & security bits and bytes to start your week (if you are reading this on vacation … good for you!) 1. ICYMI: Massive Data Breach at OPM Claims Victim — The Director...more

Data Breach Decisions Setting A Higher Threshold For Standing For Plaintiffs Do Not Mean Businesses Are Off The Hook

There are only two types of companies left in the United States: those that have been hacked and those that will be hacked. In the last year alone, forty-three percent (43%) of U.S. companies experienced a data breach,...more

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

OPM and Where The Lines Are

The recent hacking of the sensitive personal information of millions of American public servants at the Office of Personnel Management (OPM) points out a noteworthy distinction in how the U.S. government views some types of...more

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

Cardinals Hacking Update

St. Louis Cardinals owner Bill DeWitt, Jr. threw staff members under the bus following the breaking story last week that the Cardinals have been hacking into the Astros’ database for up to three years. According to DeWitt, a...more

Strategies For Businesses Protecting Electronic Data Within California: Part Three

In Parts One and Two of this e-alert series, we discussed the federal Computer Fraud And Abuse Act ("CFAA") and its California corollary the California Computer Data Access And Fraud Act (CDAFA). In Part Three, we provide a...more

The Internet of Things

In this Presentation: - Internet of Things - definition - But what is it all about? - But not just that... - The IoT market in figures... - Beecham Research - view of the World - The Connected...more

Intellectual Property and Technology News (North America), Issue 26, Q2 2015

The Internet of Things: EU vs US guidance - Reports from the European Commission and the FTC on privacy and security best practices for IoT - key issues and highlights... Are IPRs impacting the pharmaceutical...more

[Webinar] Digital Health Update: Focus on Health Tech Startups - June 23, 1:00 CDT

Health care startups are expected to attract billions in venture capital in the next few years. Despite the pace and excitement this surge of investment creates, these next-wave digital disruptors need to keep three legal...more

[Webinar] Cyber Threats and the Crown Jewels: Practical Steps to Protect Corporate Assets - June 24, 9 a.m. EDT

Information security is a growing concern for companies and legal teams around the world. The rising tide of cybersecurity issues and insider threats pose great risks to a company’s crown jewels: its intellectual property....more

The New Space Race: Protecting Trade Secrets on the Final Frontier

Space: The final frontier. For millennia, people have wanted to explore the great unknown of outer space, and series like Star Trek and Star Wars continue to our fuel our fantasies about what lies beyond our stratosphere. ...more

Advertising Law - May 2015 #4

SPECIAL FOCUS: The Impact of the Supreme Court’s Octane Fitness Decision on Lanham Act Litigation - For the second time in recent years, a Supreme Court decision in a patent case is having a major impact on Lanham Act...more

Hackers seek to access intellectual property assets of higher educational institutions

College and universities, like many other businesses and organizations, defend against millions of cyberattacks each day. Most recently, Penn State’s College of Engineering discovered a multi-year long cyberattack seeking...more

Snowden Strikes Back: Mass Collection of Telephony Metadata Struck Down By the Second Circuit

As post-Snowden America well knows, for some years now the National Security Agency (NSA) has been collecting bulk telephone metadata under the authority of Section 215 of the PATRIOT Act and aggregating it into data banks...more

Entertainment Industry Agent Rightscorp Seeks Personally Identifiable Information of Thousands of Internet Users

In the past two years, Rightscorp, Inc. has sought the identity of thousands of Internet subscribers across the country, in order to obtain settlements for alleged violations of its clients’ copyrights. ...more

Sports, Media and Entertainment Intelligence - May 2015 (Global)

COPYRIGHT - Belgium: Even a world famous painter needs to respect copyright - It has been held that the well-known Belgian painter Luc Tuymans breached professional photographer Katrijn Van Giel's copyright through his...more

DOJ Guidance for Victims of Cybercrime: The Dos and Do Nots of Cyber Preparedness

On April 29, 2015, the Cybersecurity Unit in the Computer Crime and Intellectual Property Section (CCIPS) of the U.S. Department of Justice released a best practices document (Document) for victims of cyber incidents. The...more

Emergence of Live Streaming Apps Brings Up Copyright, Privacy, Legal Concerns

The big fight may be over, but the implications of Mayweather vs. Pacquiao with respect to real-time, one-to-many streaming of video through apps like Meerkat and Periscope are still rippling through the media industry. In...more

BakerHostetler's Tanya Forsheit Discusses Cloud Computing [Video]

Tanya Forsheit, Partner with BakerHostetler's Privacy and Data Protection team discusses cloud computing and privacy issues....more

231 Results
|
View per page
Page: of 10

Follow Intellectual Property Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×