After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
The risks are significant if managing sensitive data is not part of a proactive plan—the consequences can include penalties, sanctions and reputational damage....more
The intense patent activity in graphene stems from its enormous technological and commercial potential. But because much of the territory underlying the graphene cross-roads has already been claimed, patenting graphene poses...more
In this LEVICK Daily video interview, LEVICK Senior Vice President Jason Maloni discusses the key forensic and communications challenges that accompany instances of data loss and...more
?Are you looking to guard your company's “secret sauce?” Fenwick’s Robert Brownstone says companies should safeguard their data by limiting the number of employees with access to certain confidential information. Following up...more
In the video, Robert Brownstone, co-chair of Fenwick’s Electronic Information Management Group, describes how the world of data security impacts every organization regardless of size. He identifies three main areas of...more
"Reproduced with permission from Law Business Research. This article was first published in Getting the Deal Through - e-Commerce 2013 (published in July 2012; contributing editor:
Robert Bond of Speechly Bircham LLP)....more
As the use of the internet and social media continues to increase rapidly, companies are being challenged to keep up with changing laws and the many ways in which customer and employee data flow in and out of their hands. In...more
This amicus brief addresses issues raised in the Court of Chancery relating to preservation and deletion of data. In the brief, amici argue that the Court misapplied technological concepts and therefore reached a conclusion...more
Advances in technology over the last decade have changed the way that companies communicate with customers, with clients and with each other. Rather than making phone calls or sending letters, employees today, armed with lap...more
25 June 2010 — Social Media Governance. A new term creeps across the e-discovery and compliance landscape, seeking to join the pantheon of other irritating phrases like "governance, risk and compliance", "legal project...more
cyber attacks on corporates have become common either by competitors or state sponsored actors of foriegn state, Security to organisations and legal compliance has become important...more
This paper provides an overview of the recently emerging
Software as a Service (SaaS) alternatives and explains how
they can address the technical and business challenges
surrounding electronic data management in...more
"A 'smackdown' event on January 7, 2008 resulted in a 'right hook to the chin' of the plaintiff?s attorneys in Qualcomm, Inc. v. Broadcom Corp.1 In a San Diego California federal courtroom, the attorneys felt the pain of an...more
Find a Science, Computers & Technology Author »
Back to Top