What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Last Friday, the U.S. Court of Appeals for the Fourth Circuit affirmed the dismissal of a False Claims Act (“FCA”) case brought against Omnicare. United States ex rel. Rostholder v. Omnicare, Inc., No. 12-2431, 2014 WL 661351...more
Attorney David Lagasse, Member of Mintz Levin's Employment, Labor & Benefits Practice, talks about potential pitfalls that start-ups should be aware of when designing their compensation programs....more
Mitch Danzig, Member of Mintz Levin's Employment, Labor & Benefits Practice, discusses the importance of having a social media policy that is structured in accordance with the recent NLRB rulings. ...more
Federal Government Regulations:
Canada Gazette, Part II, March 27, 2013:
Contraventions Act -
SOR/2013-41 Regulations Amending the Application of Provincial Laws Regulations.
Since 2008, if you or your employees are traveling into the United States with a laptop, tablet or other electronic device, that device may be searched by border crossing agents, without cause or justification for suspicion....more
Our series over the next 10 days will highlight the top issues, as we see them, in privacy and security for 2013. Yesterday, we looked at the increase in cybcersecurity disclosure by public companies, triggered by the...more
On December 12, the U.S. Court of Appeals for the Fifth Circuit held that the Stored Communications Act (SCA) does not apply to data stored in a personal cell phone and affirmed a district court’s grant of summary judgment to...more
Originally published in The New York Law Journal on December 10, 2012.
Companies are increasingly permitting employees to BYOD, or bring (and use) their own smart devices. Being able to use the latest, fastest,...more
Executive Summary: A District Court in Pennsylvania entered judgment in favor of the employer on a former employee's Computer Fraud and Abuse Act ("CFAA") claim in a dispute over the ownership of the employee's LinkedIn...more
Today, the Director’s Office of Policy, Research, and Legislation (OPRL) at the California Department of Industrial Relations (DIR) announced that the minimum compensation required to qualify for the state's...more
In my talks about technology, one of the things I try to emphasize is that there is no “one size fits all” to your social media and technology policy.
As an example, I often talk about how financial industries have...more
The UK Data Protection Act 1998 (“DPA”) imposes various restrictions on “data controllers”, such as employers, when “processing” personal data relating to individuals. In particular, employers must comply with eight data...more
In R. v. Cole, 2012 SCC 53 (October 19, 2012), the Supreme Court of Canada held that employees may reasonably expect privacy in the information stored on their work-issued computers — at least where personal use is permitted...more
With the unprecedented popularity of social media, employees have increasingly used LinkedIn and other online forums to network for business and social purposes. When the line between personal and business use is blurred,...more
In PhoneDog v. Kravitz, an employer and former employee battled over who owns a company-sponsored Twitter account. Now, LinkedIn joins Twitter, as it tries to claim title to the LinkedIn account of a former employee....more
Earlier this month, a federal judge ruled that when a company took over a departing employee’s LinkedIn account, the company did not violate the Computer Fraud and Abuse Act in the case of Eagle v. Edcomm....more
Imagine a disgruntled employee rummaging through your company’s confidential files and covertly stealing trade secrets to use as he builds a competing business. What recourse would you have against the rogue employee?...more
The NLRB has received a lot of attention for its actions the last couple years. One of the storms was caused by the agency’s attention to employer actions based on employee Facebook postings. More to the point, employers were...more
Introduction - The Computer Fraud and Abuse Act (CFAA) criminalizes unauthorized access to a private computer system and allows for individuals suffering harm from such conduct to bring private civil actions for relief....more
New guidance defines when electronically held personal data is "beyond use" once deleted.
As part of its mission to assist companies to understand and fulfil their obligations under the UK's Data Protection Act 1998...more
Employers in North Carolina, Virginia, Maryland, West Virginia and South Carolina have lost a potentially powerful method of protecting their electronic secrets from disgruntled employees who download sensitive material and...more
If your company policies don’t adequately define employee parameters of computer access as well as usage, then your company may find itself losing to disgruntled employees who take or misuse company data.
In This Issue:
- U.S. Supreme Court Holds Pharmaceutical Sales Representatives are Exempt from Overtime Pay
- USCIS Announces Employers Must Continue to Use the Current Form I-9 for Employment Eligibility...more
The United States Supreme Court has recently armed employers with two new defenses while settling an issue that may otherwise have been of fairly limited direct interest to most employers. The Court resolved a recent circuit...more
The federal Computer Fraud and Abuse Act (CFAA) allows an employer to bring a civil action against an employee who accesses the employer's computers "without authorization" or in a manner that "exceeds authorized access."...more
Find a Science, Computers & Technology Author »
Back to Top