Science, Computers & Technology General Business

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Alert: FTC Releases New Data Security Guide: 50 Mistakes to Avoid in 10 Lessons

The Federal Trade Commission (FTC) has brought over 50 cases against companies that put consumer data at unreasonable risk. On June 30, 2015, the FTC released a guide titled Start with Security that summarizes 10 lessons the...more

NY BitLicense Update: 45 Days to Apply

After almost a year of discourse and revision, New York’s Department of Financial Services’ final “BitLicense” regulation has been published in the New York State Register and an application has been made available. This...more

Second Circuit Affirms Ruling Against Apple in E-book Price-Fixing Case

We have previously posted about United States v. Apple, Inc., a blockbuster trial that ended with Judge Denise Cote of the Southern District of New York concluding that Apple had conspired with five publishing companies to...more

Energy Technology Connections Newsletter: Your Law Firm Link to Industry News - June 2015

In This Issue: - Leaders in the News - Innovator Profile - Event Highlights - Washington Update - Energy Navigator - Upcoming Events - Excerpt from Leaders in the...more

7 Mistakes Every Startup Should Avoid To Protect IP

Startups are justifiably focused on developing the next big idea, getting that idea to market and ensuring the company has enough financial runway to make it all happen. Missteps in protecting the startup’s intellectual...more

Progress on Data Protection in the European Union

We may see the final text of the proposed EU General Data Protection Regulation by the end of 2015. In mid-June, the Council of the European Union set forth an agreed general approach to the proposed EU General Data...more

Is An Offer Of At-Will Employment Adequate Consideration For A Non-Compete? Recent Court Rulings Split Three Ways

Three very recent decisions reflect the irreconcilable division of judicial authority regarding the adequacy of at-will employment as the sole consideration for an otherwise valid non-compete. Compare (a) Standard Register...more

Password Management Company LastPass Discloses Security Breach

We know it’s hard to keep track of passwords. A good security practice is to use different and complex passwords across different platforms, but it is so hard to keep track of all of them. That’s why password management...more

Data Rights for Government Contractors

In this presentation: - FAR AND DFAR - TYPES OF DATA - TECHNICAL DATA - COMPUTER SOFTWARE - COMMERCIAL COMPUTER SOFTWARE - TYPES OF RIGHTS - LICENSE RIGHTS - BAYH-DOLE...more

Five Social Media Law Issues To Discuss With Your Clients

The explosive growth of social media has clients facing legal questions that didn’t even exist a few short years ago. Helping your clients navigate this muddled legal landscape will have them clicking “like” in no...more

King Drug Co. of Florence, Inc. v. SmithKline Beecham Corp. (3rd Cir. 2015)

Ever since the Supreme Court's decision in FTC v. Actavis in 2013, courts (predominantly district courts) have grappled with the scope of the decision. It was evident that the presence of a large cash payment from the...more

New Case Highlights Deep Hole in Cyber Insurance Policies

Insurance policies covering data breach liability began appearing roughly ten years ago. We noted then a troublesome provision in some forms that seemed to exclude coverage for the insured’s failure to maintain data security...more

New York BitLicense Rules Have Far-Reaching Effects on Virtual Currency Businesses

The final rules’ significant operational requirements for licensees could prove to be expensive and substantial barriers to entry for small businesses interested in engaging in virtual currency business activities in New...more

Considerations in Drafting Limitations of Liability for Data Breaches

Until very recently, it was considered matter of course in a services agreement for any data disclosure or loss, regardless of cause, to be excluded from any and all limitations of the vendor’s liability. However, as data...more

Delaware Enacts Online Privacy Law – Website Operators Will Need to Comply

Online businesses take note. Delaware may finally have an online privacy law. On June 25, 2015, the Delaware General Assembly passed SS1 for SB68, known as the “Delaware Online Privacy and Protection Act.” If signed by the...more

Guiding Opinions to Promote Healthy and Rapid Development of Cross-Border E-Commerce

The Chinese e-commerce industry is rapidly expanding, and the nation is the world’s second largest online retail market. The business-to-consumer industry in particular is expected to see record growth in the next few years....more

OSHA Clarifies RAGAGEP Definition and Abandons Use of "Commercial Grade" in PSM Standard

On June 9, 2015, the U.S. Department of Labor’s Occupational Safety and Health Administration (“OSHA”) published two interpretations related to process safety management (“PSM”). In this publication, OSHA defined the term...more

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

Visa And MasterCard: Card Issuers May Disclose Breached Merchant Names

Credit union and other card issuers got clarification from Visa and MasterCard this month on when they are contractually permitted to disclose the identities of merchants involved in data breaches. In substantially similar...more

The EU’s S-L-O-W March Towards a Uniform Data Protection Regime

The European Union (EU), comprised of 28 member states, currently has a patchwork of privacy and data protection laws, based on the EU’s 1995 Data Protection Directive. This mix of laws has led to inconsistent data...more

Litigation Alert: Even Spider-Man Can't Defeat Ban on Post-Patent Expiration Royalties

Fifty years ago, in Brulotte v. Thys Co., the U.S. Supreme Court held that “a patentee’s use of a royalty agreement that projects beyond the expiration date of the patent is unlawful per se.” 379 U.S. 29, 32 (1964). On June...more

Proposed Change to Export Controls Would Allow Use of the Cloud for Encrypted Data

On June 3, 2015 the State Department’s Directorate of Defense Trade Controls (DDTC) and the Commerce Department’s Bureau of Industry and Security (BIS) published proposed regulations which would change the definition of the...more

Nevada and Wyoming Expand Breach Notification Laws to Protect Account Credentials

On July 1, 2015, both Nevada and Wyoming’s breach notification law amendments come into force, expanding the definition of Personal Information (“PI”) to include account credentials such as a username or email address. With...more

Canada’s New Privacy Laws Will Require Breach Notice and Affect Private Sector Operations in Canada

It has been a long time coming, but this week the Personal Information Protection and Electronic Documents Act (“PIPEDA”) received a make-over, including new data breach notification provisions, with the enactment of the...more

Expanded HSR Antitrust Reporting for Pharma Licensing Deals Is Here to Stay

On June 9, 2015, the U.S. Court of Appeals for the D.C. Circuit, in its ruling in Pharm. Research & Mfrs. of Am. v. FTC, upheld the FTC's expansion of HSR reporting requirements for pharmaceutical companies, and solidified...more

3,874 Results
|
View per page
Page: of 155

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×