After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
The Human Element of Information Security -
In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the data...more
Hoarding is defined clinically as embodying “a persistent difficulty discarding or parting with possessions because of a perceived need to save them.” That accumulation occurs regardless of the actual value associated with...more
The technology industry has been criticized in recent years for its lack of diversity in its mostly male workforce as advocates call on companies to be more transparent with their demographic information. Apple Inc. is one of...more
On September 5, 2014, the Internal Revenue Service (“IRS”) released Private Letter Ruling 201436001 (the “Ruling”), which found that a company providing products and services primarily within the pharmaceutical industry was a...more
The Omnibus Final Rule (the "Omnibus Rule") under the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), was issued in January, 2013 effective March 26, 2013, but with a general compliance deadline of...more
In Prophet v Huggett  ECWA Civ 1013, the Court of Appeal has overturned a recent decision of the High Court in which it had re-written a non-compete covenant to give it commercial effect. You may recall that we...more
“Web scraping” or “Web harvesting” — the practice of extracting large amounts of data from publicly available websites using automated “bots” or “spiders” — accounted for 18 percent of site visitors and 23 percent of all...more
The grocery business may be “fresh and easy,” but drafting a confidentiality and data protection policy that withstands the scrutiny of the current National Labor Relations Board (NLRB) is not. The NLRB, in its recent 2-1...more
Our company has employees and operations in multiple states, and I’m concerned about complying with data breach laws in the various locales. What’s the status of the law on data break...more
More than 50% of teens have experienced cyber bullying. Parents have historically looked to their children’s schools and local government to address the issue, but what about the social media sites which contribute to the...more
Q: BYOD (Bring your own device) is standard for our employees. What, if any, are the risks for BYOD when compared to company-provided devices?...more
Wearable devices, including health and activity monitors, video and audio recorders, location trackers, and other interconnected devices in the form of watches, wristbands, glasses, rings, bracelets, belts, gloves, earrings,...more
Bring-Your-Own-Device (“BYOD”) policies have been picking up steam because of increased productivity, improved communications, and the need for employees to work remotely. However, when implementing any BYOD policy there are...more
I’m very excited about our upcoming webinar, “Cybersecurity 2014: The Impact on Global Companies,” with Lisa Sotto. She is a well known data privacy rockstar and will provide an overview of cybersecurity in 2014, the current...more
A recent case out of the Northern District of Texas and the Fifth Circuit Court of Appeals touches upon the intersection of non-compete agreements and ERISA plans....more
As providers of ethics and compliance training solutions, we never tire of discussing topics like anti-bribery training, sexual harassment training, code of ethics training… and so many more. Lately, we have seen a real...more
I get it – snooze-worthy, old-fashioned harassment and discrimination training isn’t in line with the vibe you’re trying to create at your hip tech startup. You want to be laid back, cut out all the corporate bull$&^*, build...more
The European Court of Justice’s decision in the Google case that it was required to remove links to “outdated” or “irrelevant” information about an individual has brought EU data privacy laws to the forefront of public...more
PwC came out with their annual State of Compliance survey, which is always well done, and has given me lots of fodder for upcoming blogs. I found the below illustration in the accompanying “chart pack” and found it...more
The “bring your own device” (BYOD) trend has become the norm at many companies and viewed as a way to both save money and increase productivity. By allowing employees to use their personal smartphones, tablets and laptops to...more
A co-founder and now former employee at Tinder has sued the dating app startup and its leaders for sexual harassment and discrimination. It’s a messy (and familiar) story of an office romance between senior execs gone...more
A recent decision from the Massachusetts federal district court serves as a good reminder to Massachusetts employers that courts are unlikely to view the breach of a non-disclosure/confidentiality agreement as justification...more
On June 20, 2014, Florida Governor Rick Scott signed the Florida Information Protection Act of 2014 (FIPA) into law. FIPA imposes stringent new security and notice requirements on businesses and employers that maintain...more
Since 2010, the U.S. Department of Justice's (DOJ) Antitrust Division has carried out a series of investigations into a number of high-tech companies accusing them of playing by their own rules and stifling competition with...more
On March 25, 2014, in State Farm Mutual Automobile Insurance Company v. Mobile Diagnostic Imaging, Inc., the U.S. District Court for the District of Minnesota held that a corporation not owned or controlled by physicians does...more
Find a Science, Computers & Technology Author »
Back to Top