Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Sony’s most recent data breach underscores the difficulties in underwriting and insuring cyber risk. Sony incurred losses that were surprising in both their scope and type. The company already is a defendant in at least four...more
For the last several years, consumers have increasingly turned to online shopping as an alternative to traditional "brick and mortar" stores. Some reports showed that "Cyber Monday" sales figures beat out those for "Black...more
You have just learned that a senior member of the company research and development team has resigned. The employee had access to important confidential information about your company’s product development, manufacturing...more
Is the internet a place of public accommodation: a virtual town hall or a virtual shopping mall or a virtual movie theater? Courts still struggle with that....more
The Ministry of Finance and the State Administration of Taxation jointly issued the Circular, on Issues regarding Improving Enterprise Income Tax Policies ("EIT") for Technologically Advanced Service Enterprise ("ATSE")...more
On January 15, 2015, the software provisions in Canada’s Anti-Spam Legislation (CASL) will come into force, creating significant prohibitions and requiring consent to, among other things, install software, change device...more
It’s not just health care companies, credit card companies, or big box retailers that need to be careful when it comes to privacy. Any company collecting user data from mobile apps—including geolocation data, user address...more
A recent decision in a false claims act case, United States ex rel. Bilotta v. Novartis Pharmaceuticals Corporation (Novartis), underscores the importance of policing employee adherence to corporate policies and industry...more
Labor Unions and Collective Bargaining Agreements -
As the profits of German online retailers increase, so too do the HR pressures that such businesses face. As electronic retail businesses hire more and more workers,...more
Rarely do we see an industry of professionals engage in misconduct as egregious as what we are seeing today in the tech sector. The intoxicating cocktail of power, money and prestige has combined to put many female...more
We are pleased to present the 45th edition of the Bernstein Shur Business and Commercial Litigation Newsletter. This month, we highlight recent cases that address the stay of discovery in securities litigation, the failure to...more
Unpaid internships were discussed in an April 8th posting in this blog and it is clear that most Ontario interns have to be paid. But what about employees in start-up companies? Can employers provide them with stock options,...more
THE ALLURE OF THE POTENTIAL COST SAVINGS OF BRING YOUR OWN DEVICE PROGRAMS IS TOO GREAT FOR MANY AUSTRALIAN ORGANISATIONS TO RESIST.
Not only do the financials of Bring Your Own Device (BYOD) programs look good (the...more
In our modern, ever-electronic, workplace, it continues to become ever-easier for dishonest employees to help themselves to their employer’s most sensitive and valuable assets through wholesale electronic copying of...more
Walgreen Co. CFO Wade Miquelon and another high-ranking executive in the company were let go from their positions after the revelation of a $1 billion projection error affecting the corporation’s Medicare-related business....more
Welcome to the latest Reed Smith Massachusetts State Tax Quarterly Update. In this update, we’ll look back to the developments from the first half of 2014, and look ahead to market-based sourcing and other issues on the...more
EXECUTIVE SUMMARY -
Tech Leaders Burst Bubble Talk: Execs See No Signs of Irrational Exuberance, Just Steady Growth Ahead -
With a thriving tech economy, ballooning valuations and an IPO market humming at a...more
Employers need to appreciate and address the fact that employees who remove their employers’ confidential information often do not appear to appreciate the risks of being caught or the potentially very serious consequences of...more
When companies that conduct business in Delaware make their 2015 New Year’s resolutions, they should be sure to add compliance with 6 Del. Code §§50C-101 - 50C -104 ( Section 50C) and 7 Del. Code § 736 (Section 736) to their...more
Sometimes the Greatest Risk Comes from the Inside -
Cybersecurity continues to be an issue that dominates the news. Much has been made of the cyber-risk US companies face from foreign countries and outsiders. However,...more
As a service to our readers, we have distilled last week’s joint HHS Office of Civil Rights (OCR) and National Institute of Standards in Technology (NIST) conference, “Safeguarding Health Information: Building Assurance...more
The Human Element of Information Security, Continued -
In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the...more
Cost of Data Breach in 2014:
- $5.9 million U.S. average cost of a data breach
- 15% Annual increase in the average cost of a data breach around the world
- $201 Average cost paid for each exposed...more
In the battle for tech jobs, Massachusetts has added a significant new element to its arsenal of incentives in the form of “job creation project” Economic Development Incentive Program (EDIP) credits. EDIP is a tax incentive...more
The Human Element of Information Security -
In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the data...more
Find a Science, Computers & Technology Author »
Back to Top