Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
Our series “Cyber Risks – Director Liability and Potential Gaps in D&O Coverage” continues –
Part 3 of 5: Top Questions Directors Should Be Asking About D&O Coverage
Directors never want to be in the unenviable...more
Although it is a widespread exploit that has been undetected for two years, whether or not a CGL policy covers data breaches allowed by Heartbleed should turn, simply, on whether the policy covers data breach at all...more
In This Issue:
- Interpretation and Clarification of Key Definitions
..Covered Drug, Device, Biological or Medical Supply
The Supreme Court’s recent decision upholding the Patient Protection and Affordable Care Act underscores the need to deliver and make accessible quality healthcare to patients throughout the United States in an efficient and...more
Ensuring that key business data survives unexpected events is vital for businesses large and small. That’s why every business should have a plan in place to ensure the availability of its data when manmade or natural...more
Participants in the 340B Drug Pricing Program (340B Program) should be aware that over the last several months, the 340B Program has witnessed an unprecedented focus on oversight, integrity and enforcement. Although the 340B...more
If you thought you did not need cyber insurance before, Uncle Sam may cause you to think otherwise. On October 13, 2011, the Securities and Exchange Commission (SEC) Division of Corporation Finance issued guidance on...more
The market is rapidly growing for insurance that is specifically meant to cover losses arising out of cyber attacks and other privacy and data security breaches. These insurance policies are marketed under names like...more
On October 20, 2010, the Office of Inspector General (OIG) of the Department of Health and Human Services issued significant new guidance for implementing its permissive exclusion authority under Section 1128(b)(15) of the...more
Where clouds form, rain follows. Insurance should be there to protect you. This article outlines steps to consider so that coverage holds when the rain hits.
Cloud Computing may create new risks and...more
On March 23, President Obama signed into law the Patient Protection and Affordable Health Care Act (H.R. 3590) (the “Act”), which includes new “Sunshine Provisions,” requiring pharmaceutical, medical device, biological, and...more
Find a Science, Computers & Technology Author »
Back to Top