Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Competitor or Collaborator? What UpCounsel's Growth Means for BigLaw
Polsinelli Podcasts - Hedge Funds Now Using IPR Challenges
MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
Narrowing the application of covered business method (CBM) patent review, in two recent cases, the Patent Trial and Appeal Board (PTAB or Board) concluded that patents whose claims may apply to industries other than the...more
Addressing the issue of standing, the Patent Trial and Appeal Board (PTAB or Board) denied institution of a covered business method (CBM) patent review, finding that the petitioner failed to show sufficient proof...more
TVC operates an internet-based live stream service, carrying a number of broadcasters’ channels. ITV, Channel 4 and Channel 5 issued proceedings against TVC in relation to the unauthorised transmission of both their public...more
On Monday, March 23, the U.S. Department of Health and Human Services (HHS) and the Centers for Medicare and Medicaid Services (CMS) issued a notice of proposed rulemaking for Stage 3 Meaningful Use of Electronic Health...more
More online digital companies are providing users the ability to control what happens to their accounts after death.
For example, Facebook now allows you to name a “legacy contact” to manage your Facebook page after your...more
Days following Premera Blue Cross’s public announcement that it had experienced a data breach affecting approximately 11 million, it has been sued five times (as of the time of this writing) in proposed class action lawsuits...more
In an important advisory opinion, the U.S. Department of Health and Human Services Office of Inspector General (OIG) gave a thumbs-down to a proposed clinical laboratory “pull-through” arrangement even though the patients in...more
New Jersey’s new data privacy standard, signed into law as S. 562 by Gov. Chris Christie on January 9, requires health insurance carriers that are authorized to issue health benefit plans in New Jersey to protect individually...more
On March 26, 2015, the New York State Department of Financial Services (NYDFS) announced that it is broadening the scope of questions and topics in its current information technology (IT) examination framework. In addition,...more
Italy’s Chamber of Deputies has proposed a ‘Draft Declaration of Internet Rights’ (Declaration), acknowledging both the way in which the internet has changed interactions and the way it has erased borders, but also noting...more
The medical device market is expanding into more private healthcare products in hopes of bringing healthcare directly to the user. For example, the increase in popularity of wearable diagnostic devices, such as FitBit,...more
Senju PharmaceuticalEarlier this month, the Federal Circuit affirmed a District Court judgment of obviousness in ANDA litigation under the Hatch Waxman Act having a long provenance of earlier litigation, in Senju...more
E-commerce is at the top of the European Commission’s agenda, and recent developments suggest it will remain a priority. Several European Union member states have already taken an active interest in the issue.
In the past few weeks, Congress has made notable progress towards passage of legislation to address the sharing of cybersecurity threat information. On March 18, the Senate Select Committee on Intelligence approved the...more
On March 25, 2015, the Office of Inspector General (“OIG”) issued Advisory Opinion 15-04, which found that an exclusive arrangement between a laboratory and its referring physician practices could violate the Federal...more
This week the FTC Bureau of Consumer Protection announced a new office to bolster the technological expertise of the Bureau and the FTC regional offices handling law enforcement investigations. ...more
On 26 March 2015, the European Commissioner in charge of competition policy, Margrethe Vestager, announced a potential competition inquiry in the e-commerce sector. According to the Commission, the proposed inquiry is aimed...more
One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization.
There are pros and cons to the digital world that we all live in. Pros include...more
Patent challengers were first able to file inter partes review (IPR) petitions on September 16, 2012. Since then IPRs have become an increasingly popular way of challenging the validity of patents. In the first three months...more
On March 27, 2015, the Obama Administration released its National Action Plan for Combating Antibiotic Resistant Bacteria (NAP), a five-year, government-wide plan to address the spread of resistant bacteria. The main...more
On March 30, 2015, the Centers for Medicare & Medicaid Services (CMS) published its proposed rule on Stage 3 meaningful use criteria, which focus on the advanced use of Electronic Health Record (EHR) technology to promote...more
Addressing the award of attorneys’ fees by the district court, the U.S. Court of Appeals for the Federal Circuit reversed the district court’s grant of fees under § 285 and affirmed the district court’s denial of fees under §...more
Addressing the scope of the judicially created doctrine of patent exhaustion, the U.S. Court of Appeals for the Federal Circuit reversed a lower court’s summary judgment of non-infringement, finding that patent exhaustion...more
Coming fresh off the heels of the Anthem data breach Premera Blue Cross announced on March 17th that it was the victim of a “sophisticated” cyberattack that may have exposed the personal information of approximately 11...more
Is your security encryption obsolete? Have you even considered its age? Do you have the deadline for its expiration? Will a deadline reminder pop up to prompt you to update the encryption software?...more
Find a Science, Computers & Technology Author »
Back to Top