After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
The chemical wars are in full swing. And for consumer products and chemicals manufacturers, victory on the regulatory front is by no means a foregone conclusion.
Progressive legislators in states such as California,...more
As technology developers continue to push the envelope on services and applications affecting the daily lives of consumers, the intersection of technology and privacy is becoming increasingly fraught with legal implications...more
Merchants—rightfully so—are worried about securing their payment card environments so that their name does not appear in a headline discussing how millions of cards were stolen from them. Faced with the challenge of...more
California’s toxics agency, the Department of Toxic Substances Control (DTSC), has released a draft three-year work plan identifying seven consumer product categories that may be the focus of the state’s Green Chemistry...more
Impending sweep day to verify compliance with guidelines on cookies -
During the week of September 15–19, 2014, France’s privacy regulator, the Commission Nationale de l’Informatique et des Libertés (CNIL), is...more
On September 3, 2014, following the news of a possible breach at Home Depot (which was confirmed on September 8), the National Association of Federal Credit Unions (NAFCU) called on Congress to enact new legislation to hold...more
In most Australian states, businesses involved with hazardous chemicals must comply with the Globally Harmonised System of Classification and Labelling of Chemicals (GHS) from 31 December 2016. 'Businesses' include...more
In a recent article published by Law 360, Proskauer litigation associate Courtney Bowman outlines how companies can make inroads in the e-commerce market in the Middle East and North Africa (MENA). Although often overlooked,...more
It appears that the data breach victim of the week (perhaps of the year) is The Home Depot. Brian Krebs has reported that it appears that two large dumps of purloined credit card numbers have made an appearance on the black...more
The highly publicized hacking of the iCloud accounts of dozens of celebrities was disclosed over Labor Day weekend and has raised larger, more serious concerns regarding the security of personal and corporate data held in the...more
On 1 January 2015, new rules will take effect to determine where intra-EU supplies of “digital services” to consumers will be deemed to take place for VAT purposes. This is a major change which will affect any person who...more
The CNIL’s decision provides useful guidance on security measures that the CNIL considers must be taken by data controllers.
Earlier this year, Orange discovered that the database of one of its sub-subcontractors had...more
In This Issue:
- NIST Announces October Workshop and Releases Framewok Update
- Insurance Company Succeeds in Cybersecurity Litigation
- Safe Harbor Under Attack — This Time From a US Group
A few weeks ago, a Russian cyber gang amassed around 1.2 billion user name and password credentials belonging to more than 500 million email addresses. This may be to date the largest cache of stolen data. The cyber gang...more
In what has become almost an annual ritual, California is poised to tweak its security breach notice law. Last year, in language DLA Piper lawyers helped to draft on behalf of the State Privacy & Security Coalition, the...more
In an important decision regarding the viability of so-called "browsewrap" agreements, the United States Court of Appeals for the Ninth Circuit—which covers California, among other states—recently affirmed a district court's...more
The Federal Trade Commission announced Monday that it seeks public comment on a new verifiable parental consent method application proposed by AgeCheq, Inc., to enable apps, websites and advertisers to obtain parental consent...more
In This Issue:
- Are Offers Of Free Credit Monitoring About To Become Mandatory In Data Breach Incidents?
- Mandatory “Made-In” Labeling in the EU
- A New Dawn for California Class Actions
Mobile payments are taking off, and by 2017, consumers worldwide are likely to be using the technology to spend $700 billion or more annually, according to Forrester Research. But as technology companies look for ways to...more
Security breaches have become a staple of the daily news. A national restaurant chain announced in August 2014, that a payment card processing system breach involved 33 restaurants in 18 states and that the incident lasted...more
On August 18, the U.S. Court of Appeals for the Ninth Circuit affirmed a district court’s decision not to enforce a retailer’s online “browsewrap” arbitration agreement because the retailer failed to provide adequate...more
Last week, Senator Jay Rockefeller (D-W.Va.) sent a letter to the top ten revenue generating passenger airlines in the United States, opening an inquiry into their practices related to charging additional fees for optional...more
Find a Science, Computers & Technology Author »
Back to Top