The Social Engineering Cyber Exposure
FCPA Compliance and Ethics Report-Episode 175-Debra Bruce on new methods for law firm funding and its implications
Bjarne Tellmann of Pearson on Major Disruption in the Legal Industry
Marketing to Millennials
Top Three Cybersecurity Misconceptions
Technology in Healthcare
The Intersection of Cyber and D&O Coverage
Compiling Successful IP Solutions for Software Developers
Regan Miller, RPLU on Cyber Risk
BakerHostetler's Tanya Forsheit Discusses Cloud Computing
Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Competitor or Collaborator? What UpCounsel's Growth Means for BigLaw
Polsinelli Podcasts - Hedge Funds Now Using IPR Challenges
MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
In This Issue:
- Judgments; Legislation; and Reports.
- Excerpt from Judgements:
17 August 2015 - Bourke v Coroners Court  VSC...more
The Federal Trade Commission’s (“FTC” or “Commission”) ever-expanding list of enforcement actions to preserve competition for generic pharmaceuticals just grew in a new direction. This week, two generic pharmaceutical...more
Welcome to the 2015 Mid-Year Report from the BakerHostetler Securities Litigation and Regulatory Enforcement Practice Team. The purpose is to provide a periodic survey, apart from our team Executive Alerts, on matters we...more
At a time when an ex-employee’s newly created company was subject to an injunction prohibiting misappropriation of his former employer’s supposed trade secret, the new company allegedly used that confidential information on a...more
Earlier Friday, it was reported by Carmel DeAmicis of re/code that Homejoy, the home cleaning start-up that uses independent contractors as their home cleaners, was closing down its operations due to four misclassification...more
Fitbit better watch its step because Jawbone has a serious bone to pick with its competitor.
On May 27, 2015, Jawbone, a maker of wearable fitness and activity tracker devices, filed suit in California state court...more
Hawaii joined the small list of states that prohibit certain non-compete agreements with employees.
On June 26, 2015, Hawaii’s governor David Ige signed Act 158 which voids any “noncompete clause or a nonsolicit clause...more
Three very recent decisions reflect the irreconcilable division of judicial authority regarding the adequacy of at-will employment as the sole consideration for an otherwise valid non-compete. Compare (a) Standard Register...more
The explosive growth of social media has clients facing legal questions that didn’t even exist a few short years ago. Helping your clients navigate this muddled legal landscape will have them clicking “like” in no...more
On June 18, 2015, significant portions of the Digital Privacy Act received Royal Assent. This Act, amends the Personal Information Protection and Electronic Documents Act (PIPEDA), and brings important certainty to how...more
To state the obvious (and this shows my age), we are way past George Orwell’s 1984. Yes, I know 30 years past it. But we are way past the privacy concerns expressed in Orwell’s book; we are in a new era where technology and...more
A few weeks ago, Jawbone, a fitness tracking hardware and software maker, sued its arch-rival Fitbit, alleging that Fitbit lured its employees away to obtain access Jawbone’s confidential information and product plans. How...more
One of the worst kept secrets is the experienced and expected growth in healthcare IT. In 2013, over $650 million was invested into healthcare IT companies, and the trend is continuing to grow. Combined with the fact that...more
President Obama’s controversial Pacific Rim free trade deal (“the deal”), a trade agreement to enhance trade and investment among 11 Asian Pacific countries to boost economic growth in the United States, has sparked...more
On June 2, 2015, the U.S. House of Representatives Judiciary Committee’s Subcommittee on Regulatory Reform, Commercial and Antitrust Law conducted a hearing on three state tax bills: the Mobile Workforce State Income Tax...more
Today we celebrate a closure for it was on this day in 1935 that probably the best-known baseball player in the history of the game, George Herman ‘Babe’ Ruth, retired. While many of his records were broken with the march of...more
On May 21, 2015, the U.S. Citizenship and Immigration Services (USCIS) issued guidance on an employer's obligation to amend an H-1B visa petition to report a change in the employee's worksite location. This guidance is in...more
HBO’s “Silicon Valley” has quickly become a must watch for all budding entrepreneurs, but the second season has opened up with a multitude of risks and roadblocks that could be faced by real world entrepreneurs. Here, we...more
For data breach preparation, what guidance have federal and state regulators issued regarding incident response plans?
Originally published on IRMI.com....more
It’s that time of year again. Spring is in the air, flowers are in bloom, and Verizon’s annual Data Breach Investigations Report (DBIR) has been released. As in years past, this year’s numbers shed some light into, not only...more
If you’ve determined that your new venture is going to require outside investment, there are a number of things you can do to make your company more attractive to investors....more
Protecting a company’s confidential information is becoming more difficult as technology continues to advance. Plus, an increasingly mobile workforce poses increased risk that employees will breach a company’s security...more
One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization.
There are pros and cons to the digital world that we all live in. Pros include...more
Businesses are recognizing the need for new approaches to data security as high-profile cybersecurity incidents reveal the true impact a data breach can have on an organization. One of the biggest realizations is that IT...more
In recent weeks much media attention has been paid to an important case against a well-known Silicon Valley venture capital firm Kleiner Perkins Caufield Byers. Since late February, the technology sector venture capitalist...more
Find a Science, Computers & Technology Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top