Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
Is Edward Snowden a Whistleblower?
Goldstein: Expect More Litigation in Wake of Myriad Gene Patent Decision
As More States Implement Social Media Password Laws, There’s Still Some Blind Spots
Patent Series: Protecting inventions
Trademark Series: Use-based trademark protection
Trademark Series: Protecting your mark from becoming generic
Trademark Series: Matching your commercial strategy
Trademark Series: Building a global brand
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Instapundit: America's IP Laws Need to be "Pruned Back"
Unprecedented Global ATM Heist Presents a Number of Lessons for Companies
With Radical Changes, Law Firms Can Beat Recession
[Legal Perspective] When Is It NOT Okay to Delete Your Social Media Account?
Tips for Mobile App Privacy Compliance
Video Sharing App Vine Hit with Takedown Notice from Prince
Can You Patent Human Genes? ACLU Says No
Cybersecurity Lobbying Booming: How Law Firms Can Profit
Social Media Law Report - Who Owns Your LinkedIn Account, FTC Guidance on Social Ads, More...
Your Employer Doesn’t Own Your LinkedIn Account, and They Shouldn’t Try To
Two recent decisions emphasize yet again the value of defining and taking steps to protect a company’s trade secrets.
On May 16, 2013, Judge England issued a preliminary injunction in Farmers Insurance Exchange v....more
On April 15, 2013, the United States Supreme Court denied a petition for certiorari brought by GlaxoSmithKline (“Glaxo”) seeking review of a Third Circuit decision in favor of Humana Medical Plan (“Humana”), as a Medicare...more
Following the ever-growing progeny of cases holding that Medicare conditions of participation do not give rise to False Claims Act (FCA) liability, the United States Court of Appeals for the Sixth Circuit overturned an $11...more
In its recent decision in Coral Reef Prods. v. AXIS Surplus Ins. Co., 2012 Mich. App. LEXIS 1149 (Mich. App. June 19, 2012), the Michigan Court of Appeals had occasion to consider whether a claim for computer hacking fell...more
When you enter into a contract with a vendor, you generally impose insurance requirements on the vendor and an indemnification obligation. But consider whether your current contracts have insurance requirements that would...more
Originally Published in Insurance Law360.
In the first seven months of 2011, a number of companies and institutions have reported large-scale data breaches. The causes of the breaches range from misplacement of data by...more
1. You May Get What You Drafted.
Broad indemnification provisions, once played out, can sometimes result in surprising applications. For example, in Mass Transit Administration v. CSX Transportation, Inc., 708 A.2d 298...more
JD Supra gets your content noticed, increases your visibility and makes your marketing efforts hassle free...
Learn More or Schedule a demo