Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
Emerging Strategies for Protecting Global IP Rights
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
The best and most effective way an employer can combat social media-focused harassment is through education and training on what behavior the company will and will not find acceptable....more
The Five Megatrends Shaping Pharma’s Next Decade: Sustaining Success in a New Market Landscape -
Disruptive trends in the healthcare system will force companies to change their strategies. With new care models...more
Like the beasts of Tolkien’s imagination, digital trolls skulk around the internet shrouded in anonymity, unprovoked yet fiercely attacking the unwary. These trolls are individuals who use anonymous screen names to post...more
The Supreme Court’s ruling against broadly claimed software patents in Alice Corp. v. CLS Bank leaves many questions on patent eligibility unanswered, which means the controversy and confusion over the scope of patent...more
Now that entities are aware that at least 1.2 billion records have been compromised from websites spanning across all industries, a question arises whether entities have an obligation to investigate whether their websites...more
Before taking any action on this latest data breach news out of Russia, there are a number of things to understand....more
A breach of this nature is reportable under the breach notification laws in both California and Florida, as recently amended: “Personal Information” includes user name or email address, in combination with a password or...more
Avoiding the Regulatory Land Mines of Commercial ACOs -
While providers are showing great interest in creating ACOs to participate in the Medicare Shared Savings Program (MSSP), they are showing even greater enthusiasm...more
In the second video of a three-part series, Fenwick attorney Paul Smith talks about the growing anticipation surrounding this strong, conductive and flexible material.
Why the excitement? Simply put, graphene is easy. It’s...more
The technology and life sciences communities alike have been raving about new "wonder material" graphene for the past year. From applications for wearable devices to the creation of lightweight, bendable televisions and...more
A recap of well-read updates at the intersection of social media and the law, covering the first half of July on JD Supra....more
The intense patent activity in graphene stems from its enormous technological and commercial potential. But because much of the territory underlying the graphene cross-roads has already been claimed, patenting graphene poses...more
As demonstrated during this week's inaugural London technology week there are an increasing number of UK start-ups competing for limited investment capital. In this crowded market, how do you make sure that your start-up...more
SEC Commissioner Luis Aguilar recently spoke at the New York Stock Exchange Conference “Cyber Risks and the Boardroom.” In his speech, Commissioner Aguilar emphasized the importance of cybersecurity and how fast the need for...more
A recap of most popular writings on the recent European Court Ruling that Google must allow citizens the right to be forgotten....more
A quick look at the most well-read updates on all aspects of Cybersecurity on JD Supra over the last month. From Heartbleed to the Right to be Forgotten, in case you missed 'em the first time around....more
A look at some of the most well-read updates on JD Supra for the last month, with articles covering everything from cybersecurity to the NLRB, from virtual currencies to the conflict minerals rule....more
If, under certain circumstances, employers are required to accomodate remote work, what essential elements should be included in any company's Telecommuting Plan? ...more
How do you prove someone is breaking the law, if the technology they are using to do so didn’t even exist when the law was written?...more
Our series “Cyber Risks – Director Liability and Potential Gaps in D&O Coverage” continues –
Part 3 of 5: Top Questions Directors Should Be Asking About D&O Coverage
Directors never want to be in the unenviable...more
All this week, we are featuring a series “Cyber Risks – Director Liability and Potential Gaps in D&O Coverage”
Part 2 of 5: Why Directors Should Be Concerned...more
Each day this week, we are going to explore some of the issues in the rapidly growing area of cyberliability. We will examine the recent increase in focus on privacy issues, why directors should be concerned, the top...more
Part of JD Supra's series on innovation and the law. The NLRB has famously struck down employers’ social media policies based on a law that was adopted during the New Deal and has not been amended since....more
Part of JD Supra's series on innovation and the law. A look at how, as pharmaceutical manufacturers increasingly turn to social media to exchange information, laws and regulations that are decades old struggle to keep pace...more
Everyone awaits a definite statement from the White House to see if the President will stand by his 2007 campaign position, which was in lockstep with liberal support for net neutrality, or if he will about-face on another...more
Find a Science, Computers & Technology Author »
Back to Top