Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
The best and most effective way an employer can combat social media-focused harassment is through education and training on what behavior the company will and will not find acceptable....more
Like the beasts of Tolkien’s imagination, digital trolls skulk around the internet shrouded in anonymity, unprovoked yet fiercely attacking the unwary. These trolls are individuals who use anonymous screen names to post...more
A recap of well-read updates at the intersection of social media and the law, covering the first half of July on JD Supra....more
A look at some of the most well-read updates on JD Supra for the last month, with articles covering everything from cybersecurity to the NLRB, from virtual currencies to the conflict minerals rule....more
If, under certain circumstances, employers are required to accomodate remote work, what essential elements should be included in any company's Telecommuting Plan? ...more
Part of JD Supra's series on innovation and the law. The NLRB has famously struck down employers’ social media policies based on a law that was adopted during the New Deal and has not been amended since....more
You might think people are making more out of BYOD than it deserves, that it is a relatively benign issue. Alas, you’d be wrong....more
Attorney David Lagasse, Member of Mintz Levin's Employment, Labor & Benefits Practice, talks about potential pitfalls that start-ups should be aware of when designing their compensation programs....more
There is increasing interest from Chinese businesses in establishing an R&D center in the Silicon Valley and other technology centers in the United States. For example, the world’s largest mobile phone operator, China Mobile,...more
Mitch Danzig, Member of Mintz Levin's Employment, Labor & Benefits Practice, discusses the importance of having a social media policy that is structured in accordance with the recent NLRB rulings. ...more
Time Warner, CBS Dispute Leads to Class-Action Lawsuit
by Anthony Caruso on August 28, 2013
Time Warner customers are fed up with an ongoing dispute between the cable provider and CBS News, which recently culminated in...more
The information security concerns relating to employees using their own devices for work (such as smart phones, netbooks and laptops) are a hot topic. Although “bring your own device” or BYOD is here to stay, the practice of...more
Keith Rabois, COO of Square, left his job last month, citing legal threats from a young colleague with whom he had a two-year relationship, which subsequently threw a spotlight on the risks associated with the freewheeling...more
Overview of the recent pieces of legislation related to immigration reform including the Bipartisan Framework for Comprehensive Immigration Reform, the Immigration Innovation Act of 2013, and the Startup Act 3.0. A MUST read...more
As one calendar year ends and the next begins, it is natural to look back to take an inventory of lessons learned and to look forward in an attempt to implement such lessons. The year 2012 certainly had its fair share of...more
Technology is central to our daily lives. We rely on it. We embrace it. Many of us can’t live without it. Businesses employ new technology, often as early adopters, in an attempt to increase productivity, stay ahead of the...more
New guidance defines when electronically held personal data is "beyond use" once deleted.
As part of its mission to assist companies to understand and fulfil their obligations under the UK's Data Protection Act 1998...more
Apr. 3 (Bloomberg) -- Edward Zimmerman, a partner at Lowenstein Sandler PC, talks with Bloomberg Law's Spencer Mazyck about choosing a business entity, structuring capital and hiring employees for technology start-ups....more
In This Issue
MOFCOM Issues Measures on Investigation and Handling of Failure on Declaration of Business Operators' Concentration
Implementing Regulations for the PRC Bid Invitation and Submission Law
In This Presentation:
• If a physician complies with HIPAA, he or she has also complied with all requirements of Texas’ medical privacy laws.
In This Issue:
- Stanford v. Roche: A Cautionary Tale for Employers with Intellectual Property
- Intellectual Property is 80% of the Value of a Business!
- Avoiding Confrontations with Licensing...more
Board of Trustees of the Leland Stanford Junior University v. Roche Molecular Systems et al. involves a question of whether the Bayh-Dole Act prevents an employee of a university from assigning rights in an invention that...more
In This Issue:
1 - Obviousness of Pharmaceuticals - Patentability Over Known, Structurally Similar Compounds
1 - Post-Issuance Options: The Benefits and Risks of Reexamination and Reissue
11 - Stanford v. Roche, the...more
Last week the United States Supreme Court clarified the respective invention ownership rights between federal contractors and their employee-inventors under the Bayh-Dole Act (35 U.S.C. §§201(e), (c), 202(a)) (the “Act”) in...more
Every organization in business today is holding personal information about individuals. Whether they are consumers, customers, clients, patients, employees, or business partners, you collect a mass of personal information...more
Find a Science, Computers & Technology Author »
Back to Top