The Social Engineering Cyber Exposure
FCPA Compliance and Ethics Report-Episode 175-Debra Bruce on new methods for law firm funding and its implications
Bjarne Tellmann of Pearson on Major Disruption in the Legal Industry
Marketing to Millennials
Top Three Cybersecurity Misconceptions
Technology in Healthcare
The Intersection of Cyber and D&O Coverage
Compiling Successful IP Solutions for Software Developers
Regan Miller, RPLU on Cyber Risk
BakerHostetler's Tanya Forsheit Discusses Cloud Computing
Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Competitor or Collaborator? What UpCounsel's Growth Means for BigLaw
Polsinelli Podcasts - Hedge Funds Now Using IPR Challenges
MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Insurers or their vendors generally use software to perform valuations of vehicles for total losses on auto insurance claims. This software will typically use databases of recent sales or prices offered for comparable...more
Two recent decisions emphasize yet again the value of defining and taking steps to protect a company’s trade secrets.
On May 16, 2013, Judge England issued a preliminary injunction in Farmers Insurance Exchange v....more
On April 15, 2013, the United States Supreme Court denied a petition for certiorari brought by GlaxoSmithKline (“Glaxo”) seeking review of a Third Circuit decision in favor of Humana Medical Plan (“Humana”), as a Medicare...more
Following the ever-growing progeny of cases holding that Medicare conditions of participation do not give rise to False Claims Act (FCA) liability, the United States Court of Appeals for the Sixth Circuit overturned an $11...more
In its recent decision in Coral Reef Prods. v. AXIS Surplus Ins. Co., 2012 Mich. App. LEXIS 1149 (Mich. App. June 19, 2012), the Michigan Court of Appeals had occasion to consider whether a claim for computer hacking fell...more
When you enter into a contract with a vendor, you generally impose insurance requirements on the vendor and an indemnification obligation. But consider whether your current contracts have insurance requirements that would...more
Originally Published in Insurance Law360.
In the first seven months of 2011, a number of companies and institutions have reported large-scale data breaches. The causes of the breaches range from misplacement of data by...more
1. You May Get What You Drafted.
Broad indemnification provisions, once played out, can sometimes result in surprising applications. For example, in Mass Transit Administration v. CSX Transportation, Inc., 708 A.2d 298...more
Find a Science, Computers & Technology Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top