Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
Is Edward Snowden a Whistleblower?
Goldstein: Expect More Litigation in Wake of Myriad Gene Patent Decision
As More States Implement Social Media Password Laws, There’s Still Some Blind Spots
Patent Series: Protecting inventions
Trademark Series: Use-based trademark protection
Trademark Series: Protecting your mark from becoming generic
Trademark Series: Matching your commercial strategy
Trademark Series: Building a global brand
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Instapundit: America's IP Laws Need to be "Pruned Back"
Unprecedented Global ATM Heist Presents a Number of Lessons for Companies
With Radical Changes, Law Firms Can Beat Recession
[Legal Perspective] When Is It NOT Okay to Delete Your Social Media Account?
Tips for Mobile App Privacy Compliance
Video Sharing App Vine Hit with Takedown Notice from Prince
Can You Patent Human Genes? ACLU Says No
Cybersecurity Lobbying Booming: How Law Firms Can Profit
Social Media Law Report - Who Owns Your LinkedIn Account, FTC Guidance on Social Ads, More...
Your Employer Doesn’t Own Your LinkedIn Account, and They Shouldn’t Try To
The cloud is all the rage these days. Cloud computing, that is.
When a business uses a cloud computing service, its data storage and application server needs are handled by a third party provider that it can connect to via...more
With the recent issuance of the long-awaited final rule by the Department of Health and Human Services ("HHS"), the protection of patient information has been a hot topic among the health care industry the past few months....more
Pro-actively drafting cybersecurity policies and protocols is like doing a will for yourself, or an employee manual for your company. The thought process is that there is nothing imminently pressing that requires me to think...more
Insurance is one important line of defense companies can use to protect against the potentially devastating costs of responding to cyber breaches. The following list gives examples of insurance coverage to consider when...more
Many insurers are now offering “cyber liability” or “cyber risk” policies designed to protect policyholders against electronic injuries that policyholders may either suffer themselves or cause to others. Most of these...more
On February 12, 2013, President Obama issued an executive order detailing his plan to improve critical infrastructure cybersecurity. In the Executive Order, President Obama notes that it is the policy of the United States to...more
On Dec. 21, the FCC released its long-awaited Report and Order reforming its funding mechanisms for rural health care by creating a Healthcare Connect Fund (HCF) of $400 million annually....more
Originally published in Privacy & Security Law Report, 11 PVLR 1430, 09/24/2012.
Companies, organizations, and individuals throughout the world reap significant benefits of having access to the internet. Since the 1990s,...more
Given the risks and costs of intellectual property (IP) infringement claims (even when your company isn’t found liable), most companies ideally want coverage of perceived infringement of the products they sell or the services...more
Originally Given as part of a lecture to the New York State Bar Association on Friday, May 20, 2011.
This outline was provided to the at the New York State Bar Association as a primer for lawyers not familiar with...more
Originally published in Bloomberg Law Reports, July 15, 2011.
As plaintiffs’ law firms and state and federal governments continue to scrutinize “off-label marketing,” drug manufacturers may become increasingly...more
For professional "fact-gatherers" such as lawyers, insurance adjusters, claims handlers and private investigators, the vast wealth of information that people volunteer on Facebook can be a goldmine or a...more
JD Supra gets your content noticed, increases your visibility and makes your marketing efforts hassle free...
Learn More or Schedule a demo