Science, Computers & Technology Business Organization

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Twitter Terrorism: Criminals Choose the Hack Attack

In what appears to be yet another brazen demonstration of capability following an earlier hijack of government social media sites, a group calling itself the Syrian Electronic Army (SEA) recently hacked into the U.S. Army’s...more

Corporate Divorce: Property (Re)Distribution

Who Owns What - Unlike the marital relationship, which hypothetically balances power between spouses, the employment relationship is founded on the central concept of control: it is the employer who dictates the time,...more

Theratechnologies Inc. V. 12185 Canada Inc: Supreme Court Of Canada Raises The Bar For Obtaining Leave To Bring Secondary Market...

In Theratechnologies inc. v. 12185 Canada inc., the Supreme Court of Canada has ruled that requirements that plaintiffs demonstrate that their claims have been brought in good faith and have a reasonable chance of succeeding...more

Marketing to Millennials [Video]

Does your legal counsel understand your customer? Your business? Your industry? At Ifrah Law, we understand all three and we strive to provide you with the expertise that will help you grow your business!...more

Advertising and Marketing News from Ifrah Law’s FTCBeat.com, Volume 6

Internet Advertising and Marketing Summer Newsletter from Ifrah Law with updates you won't want to miss!...more

iGaming News from Ifrah Law’s IfrahOniGaming.com, Volume 6

Ifrah Law's Summer Edition Newsletter with the latest iGaming News and Updates you'll want to know!...more

Innovators Beware! Patent Reform Creates the New “Anti-Patent” Troll

Recent years have seen a wave of efforts to control frivolous patent-infringement lawsuits perpetrated by so-called patent trolls. These started with the America Invents Act of 2011 and have been followed by the Patent Law...more

Protecting Your Business in the Innovation Economy

The recent 12th Annual State of the Research Triangle Region event highlighted the innovation economy in North Carolina and particularly the Research Triangle area as a “smart region.”...more

Acelity Reported to Plan $1 Billion IPO

San Antonio, Texas based medical device company Acelity LP Inc. is reported to be considering an initial public offering that could raise up to $1 billion, according to the Wall Street Journal. Acelity has reportedly...more

Crowdfunding and IP in Health and Biotech Start-ups (Part 2): The JOBS Act

Crowd Funding ImageThis is the second in a 3-part series about the use of crowdfunding in health and biotech start-ups. We started with the story of a tech start-up which set records for funding through a Kickstarter...more

Blog: Should You Invest in Foreign Patent Protection?

If you run a tech company, should you invest in foreign patent protection? On one hand, worldwide patent protection can be incredibly valuable, especially for a product with a worldwide market. On the other hand, obtaining...more

The Status of Business Method Patents

Business method patents have a checkered history. They were once very much in vogue—numerous such patents issued, and many of them were litigated. Then, about two years ago, Congress enacted a special procedure that made it...more

How Businesses Can Reduce Cyber Risk: Pre and Post Incident: Businesses Need to Take a More Proactive Approach to Reducing What Is...

As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more

RadioShack’s Consumer Data: A Highly Scrutinized Asset

Following the Texas Attorney General’s objection to the sale of RadioShack Corporation’s consumer data as an asset in its bankruptcy, 37 other state attorneys general and a large number of other consumer protection entities...more

Travel Wi-Fi and Security. You May Not Know Who’s Watching.

Over the past few years, users have become increasingly aware of the inherent dangers of connecting to unsecured Wi-Fi networks. Unfortunately, existing security vulnerabilities in the underlying network hardware may still...more

The Days of the Vultures (Silicon Valley – Season 2 Finale)

This season’s finale of Silicon Valley provided Richard with only the briefest moment of victory before he once again faces losing Pied Piper. First, the arbitrator rules that because Richard used a Hooli computer while...more

Venture Capital Coast to Coast – June 2015

As we reported in January 2015, 2014 was a banner year for venture capital on all fronts, from fundraising, to investment and exits – save, however, for the small drop in the number of deals versus the largest aggregate...more

SUN Opens Survey on Risk Management of Nanotechnology

On May 26, 2015, Sustainable Nanotechnologies (SUN) began a survey on risk management of nanotechnology. A key objective of SUN is to build the SUN Decision Support System to facilitate safe and sustainable nanomanufacturing...more

Cyber Security - Risk Management and Mitigation

In This Issue: - Agenda - Current Threat Environment - Current Threat Environment - Strategic Importance - Asian Data Privacy Regimes At-A-Glance - Data Protection: Regional temp - Asia-Pacific...more

Cybersecurity: Where Does the Buck Stop?

Over the last few months, we’ve been talking about cybersecurity issues for employers. We’ve discussed the responsibilities and risks associated with personally identifiable information and the wave of lawsuits resulting...more

Top Three Cybersecurity Misconceptions [Video]

Cybersecurity is an issue that should be top-of-mind for all companies. But there are three misconceptions about cybersecurity that can put companies at significant risk. In this video, Foley Partner Michael Overly discusses...more

An Overview, A Summary And An Update To The Latest Patent Reform

Just four years ago in 2011, President Obama signed the America Invents Act (AIA) into law. Since the enactment of the AIA, there has continued to be steady pressure for further reform. In 2013, the Innovation Act was...more

Largest Breach in U.S. Government History Is a Wake-Up Call on Need for Encryption

Employees are reasonable in assuming that their employer is protecting their personal information from compromise. The obvious way to do that is to maintain appropriate encryption technology. Simply put: encryption,...more

[Webinar] Digital Health Update: Focus on Health Tech Startups - June 23, 1:00 CDT

Health care startups are expected to attract billions in venture capital in the next few years. Despite the pace and excitement this surge of investment creates, these next-wave digital disruptors need to keep three legal...more

Generators Need to be Vigilant About TCLP Sampling Protocol

The Toxicity Characteristic Leaching Procedure (TCLP), SW-846 Method 1311, was promulgated by EPA pursuant to the Resource Conservation and Recovery Act to test and determine the potential leaching rate of disposed hazardous...more

615 Results
|
View per page
Page: of 25

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×