Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Competitor or Collaborator? What UpCounsel's Growth Means for BigLaw
Polsinelli Podcasts - Hedge Funds Now Using IPR Challenges
MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
The cross-use of mobile devices for personal and professional purposes, commonly referred to as “Bring Your Own Device” or “BYOD”, is a relatively recent phenomenon that has created a host of legal and practical challenges...more
5 Reasons Employers Should Prohibit Employees From Using Personal Email Accounts - Recently, a political firestorm has erupted as news stories revealed that Former Secretary of State (and likely Presidential Candidate)...more
A report just released by security startup, Menlo Security, found that one-third of the top one million websites have already been compromised with malware or are running outdated or unpatched software that is vulnerable....more
Bring Your Own Device (“BYOD”) is a movement that is changing the IT landscape of workplaces. In a BYOD workplace, employees use their own mobile device—smartphones, tablets, laptops, etc.—for both work and personal use. ...more
When small and mid-size companies start expanding their apps or web presence into Europe, they need to start thinking about EU data protection laws. It’s tempting to take a look at what one or two of the “big guys” do about...more
Companies and their employees are increasingly using mobile devices and mobile applications (apps) to improve connectivity, communication and productivity. Unfortunately, these same companies may be unintentionally exposing...more
In the past five years, employers both big and small have become accustomed to social media and increased technology in the workplace. Everyone and their parents are on Facebook, and one cannot go anywhere without being asked...more
Use the Opportunity -
Data Privacy Day is another opportunity to push out a note to employees regarding their own privacy and security — and how that can help the company. Emails with articles and reminders are...more
More predictions about privacy, advertising and digital media trends making headlines in 2015 from Of Digital Interest editor Bridget O’Connell and predictions from our London office by Rob Lister...more
Since December 15, 2014, six putative class actions have been filed against Sony Pictures Entertainment, Inc., asserting claims by current and former employees whose personal information was allegedly stolen during the...more
All Tennessee employers and their agents must now comply with the “Employee Online Privacy Act of 2014,” a new law that prohibits employers from asking their employees for their usernames and passwords to social media sites,...more
Is the internet a place of public accommodation: a virtual town hall or a virtual shopping mall or a virtual movie theater? Courts still struggle with that....more
It is possible to collect location data relating to employees through smartphone Apps if used in order to optimize the usage of resources and improve their management, coordination and timing provided that this practice...more
That’s a lot of latte. It turns out that Starbucks—not a company in the mobile payments business—was the first company to make in-person payments by mobile phone mainstream. According to recent statements by the coffee...more
More than 90 percent of the 322 million cellular phones in use in the United States contain global positioning system (GPS) tracking devices that allow wireless carriers to obtain continuous, highly accurate information...more
Following up on a topic discussed recently in this space, a class action filed last month against LinkedIn represents just the latest development in the burgeoning battle over defining the permissible and impermissible uses...more
Many business owners, particularly those with a limited marketing budget or no marketing plan, view access to social media as free marketing. What could be better? Ask paid employees to get out the “buzz” as an assignment....more
As one who presumably has no nude selfies, you may not be too concerned about a “hack” like the one that continues to afflict celebrities like Jennifer Lawrence and Kate Upton. But that doesn’t mean there aren’t still plenty...more
On November 1, 2014, Oklahoma will join a number of other jurisdictions that prohibit employers from gaining access to passwords to employee or applicant social media accounts or from viewing non-public information maintained...more
In just two years, social media password protection has gone from a privacy advocate’s dream to an employer’s harsh reality in many states. Maryland became the first state (in 2012) to enact legislation that prevented...more
The NLRB marked the end of summer by issuing its highly anticipated decision in Purple Communications, which many believed would address whether employers can continue to ban use of company equipment and technology,...more
Will California’s “Kill Switch” Law Kill An Employer’s Ability To Protect Sensitive Company Information?
In this digital age, smartphone technology has become essential and ubiquitous to business operations. But the...more
..What’s not to like? The National Labor Relations Board has ruled that an employee’s Facebook “like” approving of another employee’s statements about their employer may constitute “concerted activity” under federal labor...more
The National Labor Relations Board continues to focus on employer social media policies and employee discipline for online activity. In a ruling this week involving Triple Play Sports Bar & Grill, the Board concluded that...more
The best and most effective way an employer can combat social media-focused harassment is through education and training on what behavior the company will and will not find acceptable....more
Find a Science, Computers & Technology Author »
Back to Top