Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
This week California enacted into law Senate Bill 962, which requires a “kill switch” on all smartphones that would render the device inoperable. The law applies to all smartphones manufactured after July 1, 2015 and sold in...more
On July 28, 2014, the House of Representatives passed three bills aimed at enhancing the cybersecurity efforts of the Department of Homeland Security (DHS) in certain critical infrastructure sectors, including the energy...more
Legislative Branch Activity -
House Cybersecurity Legislation -
This week, the House will consider four pieces of cybersecurity legislation on the floor including the National Cybersecurity and Critical...more
Full-text copy of “A Review of the Data Broker Industry: Collection, Use, and Sale of Consumer Data for Marketing Purposes,” a 36-page Congressional report on how data brokers collect, maintain, and sell information on...more
Full-text copy of "Liberty and Security in a Changing World," the 300-page report and recommendations of the group tasked by President Obama with reviewing the National Security Administration’s systematic collection of...more
Full text copy of “Information Resellers: Consumer Privacy Framework Needs to Reflect Changes in Technology and the Marketplace,” the US Government Accountability Office’s report to the Senate Committee on Commerce, Science,...more
As announced during the 2013 State of the Union Address, President Obama recently signed an Executive Order on cybersecurity. The primary goals of the Executive Order are to (a) improve communication between private companies...more
The State of Texas may find out and it may be more applicable to your site than you think. In early filing for the 2013 legislative session, Democratic state Senator Leticia Van de Putte proposed a bill aimed at stopping at...more
The White House recently released a new Executive Order imposing sanctions on information technology companies that facilitate certain human rights abuses in Iran and Syria. Released on April 23, the Executive Order...more
On May 12, 2011, the Obama Administration released its legislative proposal concerning cybersecurity. The proposal comes almost two years after the President identified cyber threats and protecting our digital infrastructure...more
Blog posting addressing the First Amendment Rights in Cyber Space. ...more
Find a Science, Computers & Technology Author »
Back to Top