After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
The best and most effective way an employer can combat social media-focused harassment is through education and training on what behavior the company will and will not find acceptable....more
Like the beasts of Tolkien’s imagination, digital trolls skulk around the internet shrouded in anonymity, unprovoked yet fiercely attacking the unwary. These trolls are individuals who use anonymous screen names to post...more
Now that entities are aware that at least 1.2 billion records have been compromised from websites spanning across all industries, a question arises whether entities have an obligation to investigate whether their websites...more
Before taking any action on this latest data breach news out of Russia, there are a number of things to understand....more
A breach of this nature is reportable under the breach notification laws in both California and Florida, as recently amended: “Personal Information” includes user name or email address, in combination with a password or...more
A recap of well-read updates at the intersection of social media and the law, covering the first half of July on JD Supra....more
A recap of most popular writings on the recent European Court Ruling that Google must allow citizens the right to be forgotten....more
A quick look at the most well-read updates on all aspects of Cybersecurity on JD Supra over the last month. From Heartbleed to the Right to be Forgotten, in case you missed 'em the first time around....more
How do you prove someone is breaking the law, if the technology they are using to do so didn’t even exist when the law was written?...more
Part of JD Supra's series on innovation and the law. The NLRB has famously struck down employers’ social media policies based on a law that was adopted during the New Deal and has not been amended since....more
Part of JD Supra's series on innovation and the law. A look at how, as pharmaceutical manufacturers increasingly turn to social media to exchange information, laws and regulations that are decades old struggle to keep pace...more
Everyone awaits a definite statement from the White House to see if the President will stand by his 2007 campaign position, which was in lockstep with liberal support for net neutrality, or if he will about-face on another...more
Although it is a widespread exploit that has been undetected for two years, whether or not a CGL policy covers data breaches allowed by Heartbleed should turn, simply, on whether the policy covers data breach at all...more
Threats to data privacy are not going away, but establishing appropriate security measures up-front, performing regular stress-tests on a security system, putting in place procedures to address a data breach and implementing...more
The vulnerability caused by the Heartbleed bug circumvents the purpose of OpenSSL: encryption. Therefore, the conclusion would appear to be that any data breach during the time of OpenSSL vulnerability would be reportable...more
Attorney Jeff Moerdler, head of Mintz Levin's Real Estate and Communications practices in New York, talks about the factors businesses need to consider when selecting a data network facility. ...more
Mitch Danzig, Member of Mintz Levin's Employment, Labor & Benefits Practice, discusses the importance of having a social media policy that is structured in accordance with the recent NLRB rulings. ...more
In this LEVICK Daily video interview, LEVICK Senior Vice President Jason Maloni discusses the key forensic and communications challenges that accompany instances of data loss and...more
Canada’s new anti-spam law (the CASL) is expected to come into force later this year. This Act is designed to create a safer online environment for individuals and businesses in Canada.
From a business perspective, it will...more
It is expected that Canada's new Anti-Spam Legislation (CASL) will come into force later this year, and with it will come significant changes for how businesses and individuals may send people "commercial electronic messages"...more
With the ever changing advent of Internet law, it is very crucial to ensure the legal compliance of a website and get it audited from an internet lawyer. Various components of a website, including, Terms and...more
My cell phone rings at 6:30 on a Friday evening. It's the CEO of a client company and she is panicked. Hysterical. It turns out she was doing some "old-fashioned" investigating by performing Google searches on herself and the...more
In early 2011 we published our first Seed Financing Survey (for 2010) in recognition of the growing importance of seed financing to entrepreneurs and the venture capital environment, especially in the internet/digital media...more
In This Issue:
- Corporate Humor Context is Key
- Cyber Security
- Technology’s Impact on Reputation
- Blogs Worth Following
- LEVICK In the News
- Excerpt from Corporate Humor, Context is...more
Life is full of anxieties. We all know that. Some suffer worse anxieties than others. As I often say, anxiety comes and goes. Anxiety cannot be measured but is something that everyone experiences on their own terms....more
Find a Science, Computers & Technology Author »
Back to Top