Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Competitor or Collaborator? What UpCounsel's Growth Means for BigLaw
Polsinelli Podcasts - Hedge Funds Now Using IPR Challenges
MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
The Department of Justice Antitrust Division's (DOJ's) investigation into the generic pharmaceutical industry may be expanding. On March 15, 2015, a third generic manufacturer disclosed that it received a subpoena from the...more
Since the 1990s and the rise of the Internet and social media, each one of us has become increasingly aware of the risks and dangers of unwanted posts and how fast a “discreet” image can go viral....more
Obama administration proposal would reduce legal ambiguities and allow civil RICO claims.
On January 2015, the Obama administration announced a series of proposals to strengthen the country’s response to...more
In his Budget speech delivered in 17 March, the Chancellor confirmed the Government’s plans with regard to crypto-currency, with detailed contained within a published Treasury document....more
A spate of recent multi-million dollar settlements has shown that medical device manufacturers are subject to substantial liability under the False Claims Act (FCA) if they misstate the country of origin of their products in...more
On March 5, the U.S. Marshals Service auctioned 50,000 bitcoins seized in relation to the case involving the black market website Silk Road. Three individuals – out of the 14 registered bidders – were the winning bidders....more
Action Item: Benjamin Lawsky, the Superintendent of Financial Services for New York State, one of the country’s most aggressive regulators, is seeking to increase regulatory pressures on the financial services industry,...more
Chinese New Year celebrations culminated in a big way for foreign multinationals in China with the news at the end of February that the head of the National Development and Reform Commission’s (“NDRC's”) Antitrust Bureau had...more
On February 10, 2015, the U.S. Court of Appeals for the Seventh Circuit upheld the conviction of Dr. Kamal Patel for violation of the anti-kickback law, reinforcing a broad definition of “referring” under the statute (U.S. v....more
On February 18, the U.S. Marshals Service announced that it will auction 50,000 bitcoins seized from wallet files found on computer hardware belonging to Ross Ulbricht, who was recently convicted in connection with his...more
Eager to retain its spot among the principal laboratories for domestic privacy legislation, California’s legislature is set to debate Senate Bill 178, legislation restricting state law enforcement agencies from requesting...more
The recent report from the US Senator Ed Markey raises issues on the future of connected cars because of the privacy issues and the potential cybercrimes that might affect the security of vehicles. ...more
Under the Electronic Communications Privacy Act of 1986 (“ECPA”), the government can gain access to emails and other electronic communications that are more than 180 days old. This has been termed the “180-day rule,” whereby...more
On December 31, 2014 Federal Law No. 532-FZ was enactedOn Amending certain Legislative Acts of the Russian Federation in Connection with Interdiction of Falsified, Counterfeit, Poor-Quality and Unregistered Medicines, Medical...more
Almost all healthcare providers and health plan administrators are familiar with the detailed requirements of the privacy and security rules under the Health Insurance Portability and Accountability Act (HIPAA). Violations...more
California boldly made an example out of a felonious website owner who operated a website dedicated to shaming, embarrassing and harassing complete strangers. Following the first ever prosecution of the operator of a “revenge...more
On February 4, a federal jury found Ross Ulbricht guilty on all seven federal charges brought against him in connection with his role in operating the Silk Road website, including narcotics and money laundering charges....more
The federal Computer Fraud and Abuse Act (CFAA) was primarily intended to deter and punish database hacking by third parties. Employers involved in disputes with former employees have attempted to use CFAA in response to...more
The founder of Silk Road, the black market website where illegal goods were bought with bitcoin, was found guilty on all 7 counts, including money laundering, drug trafficking and computer hacking. While this is an...more
In 2014, the Center for Drug Evaluation and Research’s (CDER) Office of Prescription Drug Promotion (OPDP) issued a total of 10 enforcement letters to pharmaceutical manufacturers. Of the 10 letters, nine were Untitled...more
The IRS issued two New Releases this week that restate its focus on offshore tax evasion. The first was January 29, 2015 which followed the First International Criminal Tax Symposium....more
Once the subject of speculation regarding its possible consolidation with other agencies, the Serious Fraud Office (SFO) had an exceedingly busy 2014, with all signs suggesting that it will continue its aggressive enforcement...more
Posted on January 28, 2015 by Julie Brook, Esq. When corporate goes criminal, i.e., an investigation involving a corporation leads to a criminal case headed to trial, you often need computer forensic experts to testify about...more
An Unprecedented Approach to Regulatory Violations -
In December 2014, the United States Attorney for the District of Massachusetts obtained a sweeping indictment that charges business executives of the New England...more
It seems as though every other week brings news of a new social media hack. Last week, Crayola had hackers post inappropriate content on its Facebook page, and the official Twitter feed of U.S. military's Central Command was...more
Find a Science, Computers & Technology Author »
Back to Top