FCPA Compliance and Ethics Report-Episode 175-Debra Bruce on new methods for law firm funding and its implications
Bjarne Tellmann of Pearson on Major Disruption in the Legal Industry
Marketing to Millennials
Top Three Cybersecurity Misconceptions
Technology in Healthcare
The Intersection of Cyber and D&O Coverage
Compiling Successful IP Solutions for Software Developers
Regan Miller, RPLU on Cyber Risk
BakerHostetler's Tanya Forsheit Discusses Cloud Computing
Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Competitor or Collaborator? What UpCounsel's Growth Means for BigLaw
Polsinelli Podcasts - Hedge Funds Now Using IPR Challenges
MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
“No,” says U.S. Assistant Attorney General Leslie R. Caldwell. At the most recent Cybersecurity Law Institute held at Georgetown University Law Center in late May, the head of the U.S. Department of Justice’s (DOJ) Criminal...more
The holidays are in full swing, and now is the perfect time for executives to renew their determination to protect family and friends by not sharing work secrets with them, even indirectly or obliquely.
As businesses move away from paper documents, courts are poised to broaden ‘conversion’ definition.
The fundamental shift for businesses in the past 15 years from paper documents to computer data has forced the courts...more
Earlier this month the SEC brought an insider trading case against Zachary Zwerko, a financial analyst at a pharmaceutical company identified only as Pharma Co. SEC v. Zwerko, Civil Action No. CV 8181 (S.D.N.Y. Filed Oct. 10,...more
For those of us who have been active in cybersecurity, it is a well known fact that the Chinese government, acting through its military, has been the most prolific global perpetrators of cyber-espionage. Over the past several...more
When high frequency trading (HFT) first crept into the public consciousness, it related to primarily to the question of whether rapid, computer driven trading posed risks to the safety and stability of the trading markets. ...more
The Justice Department announced that Johnson & Johnson will pay $1.273 billion to the federal government and most states to settle a civil False Claims Act investigation into its off-label marketing of its antipsychotic drug...more
On July 16, 2013, the U.S. Department of Justice (DOJ) indicted Michael Baker and Michael Gluk, the former CEO and CFO, respectively, of ArthroCare Corp. – a Texas-based publicly traded surgical device company. Baker and...more
We previously reported on the downpour of recent trade secret activity in Congress. Last week, Congresswoman Zoe Lofgren (D-Cal.) added to the deluge by introducing two bills bearing on trade secret misappropriation...more
Science Applications International Corp (SAIC) has agreed to pay more than $500 million in fines and penalties to settle federal charges alleging that the outsourcing company overcharged the city of New York for work and...more
Major changes are in the works for the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030. In the past ten years, the CFAA has moved from obscurity into the limelight as Congressional amendments drastically increased its...more
On October 27, 2011, the United States Court of Appeals for the Ninth Circuit agreed to rehear the appeal in United States v. Nosal, 642 F.3d 781 (9th Cir. Apr. 28, 2011). Nosal involves a prosecution under the Computer...more
The New York Times recently reported that the UK telephone hacking scandal could result in News Corp. and its executives being charged in the United States with criminal violations of the Foreign Corrupt Practices Act, Title...more
When someone subpoenas subscriber information from an internet service provider, does the subscriber have an expectation of privacy? In California, at least, the answer seems to be: No.
In People v. Stirpo, (Second District...more
The Computer Fraud and Abuse Act (the “CFAA”) imposes criminal penalties when a “protected computer” is accessed “without authorization.” Because the CFAA applies to any computer used in foreign or interstate commerce,...more
More often than not when a management law firm informs its clients of recent case developments, the news is not good. This is an exception.
The U.S. Court of Appeals for the 9th Circuit recently decided a case which offers...more
The U.S. Court of Appeals for the Ninth Circuit has given employers a clear path to increased protection for their trade secrets and other proprietary information in its decision in United States v. Nosal, Case No. 10-10038...more
There are few reported cases that reflect the problems that can result from computer investigations being inexpertly performed. U.S. v. Koo, 2011 WL 777965 (D. Or. March 1, 2011), decided this month by an Oregon federal...more
The Wall Street Journal reported on November 20 that a far-ranging insider trading probe into the use of outside expert consultants has the potential to “ensnare consultants, investment bankers, hedge-fund and mutual-fund...more
On November 2, 2010, the Securities and Exchange Commission (“SEC”) brought an action for insider trading against a physician involved in an investigational drug clinical trial based on the alleged use of confidential...more
IN THIS ISSUE:
*Olive Garden Asserts It Did Not Pull Letterman Ads
*Feds Seize $34 Million From Online Poker Pots
*Lawsuit Targets KFC Oprah Promo
*Protecting Your Identity Online Can Be An Ongoing Battle
IN THIS ISSUE:
*Reminder ? We?ll See You in Chicago on November 20 at the 30th Annual PMA Law Conference
*Obama, Democrat Win Could Mean More Ad Rules
*After Warning, Starbucks Alters Election Day Promo
Find a Science, Computers & Technology Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top