Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
Emerging Strategies for Protecting Global IP Rights
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
The Rise of Cyber Attacks -
On October 3, 2013, Adobe Systems Inc., the computer software giant responsible for staple software products such as Adobe Acrobat and Photoshop, announced that its security team had...more
If only one of Target, Snapchat, Facebook, Twitter, Adobe, and so on and so forth, had suffered a serious data breach within the last few months that would be sufficiently troubling. Yet data breaches have become so...more
On January 14, 2014, the Connecticut Appellate Court issued a decision in Recall Total Information Management, Inc., et al. v Federal Insurance Company, et al., __ Conn. App. ___, 2014 WL 43529 (Conn. App. Ct. Jan 14, 2014),...more
The media is replete with reports of a botnet onslaught paralyzing Spamhaus, flaming worms usurping strategic information in the Middle East and a stuxnet super weapon wreaking physical damage to Iran’s nuclear reactors....more
Virginia’s business-friendly laws and precedents provide employers with powerful remedies and employees with effective deterrents against wrongful conduct in business affairs. As a Fairfax Circuit judge has recently...more
The U.S. Senate is considering a new U.S. federal privacy breach notification law, entitled The Data Security and Breach Notification Act of 2012. The Bill is currently before the Committee on Commerce, Science and...more
Law and Business
Between James Bond’s brand of espionage and the emotional reaction when someone trained and trusted leaves and goes to work in competition lie most fact situations that give rise to trade secret...more
Retailers are under attack from a new wave of low-tech, hightech criminals. These second-generation cyber-criminals are not necessarily the genius-hacker-types popularized by Hollywood in tag lines such as “Log on. Hack in....more
In what may represent a new wave in an interesting challenge to the viral nature of social media marketing, a recently filed putative class action asserts a right of publicity claim against Facebook in connection with the...more
Time and time again, this blog has outlined the ongoing debate in the courts over whether the federal Computer Fraud & Abuse Act (“CFAA”) applies in the context of departing employees. Namely, federal courts differ over...more
On October 29, 2010, Justice James A. Yates refused to dismiss tort and defamation claims, among other claims, against the authors and the publisher of a book about Alcor Life Extension Foundation, Inc. (“Alcor”). Alcor Life...more
Recent years have seen the growth of online data sources, such as online databases, ecommerce catalogs, and social networking sites, and associated services and applications. This growth has been accompanied by a...more
IN THIS ISSUE:
*Motrin Ad Gives Moms a Headache
*Spam Response Rate Is Low, but Still Worth the Effort
*Targeted Ad Service Sued for Privacy Violations
*Court Stops Sale of Keystroke Tracking Software
Find a Science, Computers & Technology Author »
Back to Top