Cullen & Dykman Sees Colleges Calling for Title IX Help v
Legal Minute: Cybersecurity Reporting Requirements for Government Contractors
Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Advanced manufacturing companies increasingly implement “Intellectual Property Plus,” an expanded view of IP assets and risks. Through this lens, companies incorporate customer expectations and preferences in new product...more
In the second video of a three-part series, Fenwick attorney Paul Smith talks about the growing anticipation surrounding this strong, conductive and flexible material.
Why the excitement? Simply put, graphene is easy. It’s...more
The technology and life sciences communities alike have been raving about new "wonder material" graphene for the past year. From applications for wearable devices to the creation of lightweight, bendable televisions and...more
Bird deaths, contracts cases, Lindsay Lohan, IP and more in the BLG Monthly Update for April 2013...more
With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more
?Are you looking to guard your company's “secret sauce?” Fenwick’s Robert Brownstone says companies should safeguard their data by limiting the number of employees with access to certain confidential information. Following up...more
Your company has been sued – what do you need to consider to comply with data preservation requirements? How do you address litigation holds, ediscovery and data retention? Robert Brownstone, litigation attorney and chair of...more
For New York and New Jersey businesses, 2013 is slated to be a big year for intellectual property law. In addition to the further implementation of the America Invents Act, several important copyright, trademark, and patent...more
Cyber-attacks against U.S. companies have been skyrocketing in recent years, with 2011 seeing an increase of nearly 44 percent according to the National Security Agency. While many businesses have implemented and continue to...more
application. The case highlights the evolution of publicity rights in the face of social media.
Publicity rights have been protected since the advent of the Hollywood celebrity in the second half of the 20th century. In...more
The Federal Trade Commission (“FTC”) announced the release of revised “Green Guides” on October 1, 2012. The Green Guides are intended to help marketers avoid making misleading environmental claims.
The Green Guides are...more
Moving data to the cloud has been the critical data security challenge confronting organizations in the past few years.
With the cloud transition well underway, the spotlight has turned to securing end-user devices like...more
The attorneys of Wendel Rosen’s Technology Practice Group have compiled this list of 10 common mistakes they’ve seen in the trenches. Smart companies will take the time to address these issues early in formation to prevent a...more
The article outlines the basic features of Armenian corporate law. Fundamentals of corporate formation, administration and other aspects of corporate activities are summarized in a few short paragraphs....more
RESOLVE TO SAFEGUARD COMPANY INFORMATION IN 2012
For many businesses, employees are the biggest investment and the primary safeguard of their confidential, proprietary and competitive information. For some employees,...more
A reader asks: With all of the buzz surrounding Google +, I’ve been contemplating using it to replace my company’s intranet. I realize there are likely some risks that go with the savings this will create, but are there any...more
Table of Contents
•Smith v. Summit Entertainment LLC
•Armstrong v. NBC Universal, Inc.
Smith v. Summit Entertainment LLC, USDC ND Ohio, June 6, 2011
•District Court refuses to dismiss copyright owner’s claims for (1)...more
In This Issue:
Opening the Floodgates: The Dodd-Frank Whistleblower Provisions’ Impact on Corporate America . . . Page 1, 8-9
Recent Cases Demonstrate Risks of Sharing Online Users’ Data with Third Parties. . . Page...more
Doing business in the cloud poses inherent risks.
In this Corp! Magazine article, Robert J. Scott, Managing Partner of intellectual property and technology law firm, Scott & Scott, LLP addresses four main risk categories...more
The FTC has received a lot of press attention lately for its investigations of Apple, Facebook, and Google, but the actions that could affect you the most have not. In particular are the FTC's extension of the Red Flags Rule...more
"Rely on TDS" is the quarterly newsletter by the Manitoba, Canada based law firm, Thompson Dorfman Sweatman LLP. The newsletter is a collection of articles from a variety of subject matters targeted to the business...more
LEGISLATIVE ALERT! Proposed Federal Online Privacy Law will change compliance requirements for website disclosures and opt in requirements. ...more
Corporate brand management, or what we lawyers call intellecutal property, is only worth the amount of money someone spends on copyrighting or trademarking it. Prosecution, either in civil or criminal court, for infringement...more
You cannot afford to have your trade secrets and critical customer or technical information walk out the door. Armstrong Teasdale is partnering with companies to help them protect trade secrets, confidential information and...more
In This Issue
LAW NOTES provide an excellent summary of a variety of interesting topics, including managing corporate reputation, business initiatives for innovators and entrepreneurs, and a look at biologics as a new...more
Find a Privacy Author »
Back to Top