Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
On 15 September 2014, Qatar’s Emir approved Law No. 14 of 2014, The Cybercrime Prevention Law (“Cybercrime Law”). Although it has not yet been published in Qatar’s Official Gazette, the text of the law was published in the...more
As NATO and the EU seeks to increase pressure on Russia and the Crimea, the EU expanded its sanctions against Russia on 12 September. This is the latest in a series of measures introduced since March in response to the...more
As a regular presenter on use of force tactics to law enforcement academies, I am often asked why all law enforcement agencies have not implemented body-mounted cameras for all uniformed officers. The simple answer is that...more
Data protection breaches of health related sensitive data might occur through a mere video scanning an individual’s face according to a recent research....more
While a controversial proposed state bill that would restrict law enforcement agencies’ use of drones is drawing criticism, the federal government is also tackling ways to regulate the use of this new technology. These...more
In recent years, many areas of the United States have experienced a surge in crimes involving the theft of mobile devices. According to Consumer Reports, an estimated 3.1 million mobile devices were stolen in the United...more
This week California enacted into law Senate Bill 962, which requires a “kill switch” on all smartphones that would render the device inoperable. The law applies to all smartphones manufactured after July 1, 2015 and sold in...more
On August 19, the U.S. District Court for the Southern District of New York found that Bitcoin is “money” in a memorandum order denying a defendant’s motion to dismiss a federal money laundering charge. Faiella et al. v....more
“Web scraping” or “Web harvesting” — the practice of extracting large amounts of data from publicly available websites using automated “bots” or “spiders” — accounted for 18 percent of site visitors and 23 percent of all...more
On August 19, Judge Jed S. Rakoff of the US District Court for the Southern District of New York issued a ruling in the case of Robert Faiella, holding that bitcoins are “money,” citing the plain meaning of the term in The...more
Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more
The Secret Service, which investigates financial crimes, issued a security Alert on July 31, 2014, warning of malware named “Backoff” that was being used to steal payment card data from point-of-sale (POS) systems. The Alert...more
Inter-American Dialogue's Latin America Advisor asked Marcela Cristina Blanco, associate attorney in Diaz Reus’ Bogota, Colombia office: How Well Do Latin American Banks Protect Against Cyber Attacks?...more
In April of this year, the FBI issued a Private Industry Notification (PIN) to the health care industry warning of the “likely increase [in] cyber intrusions against health care systems.” In the same month, and into June of...more
Every now and then The Nine agree on something. Among the unanimous rulings the U.S. Supreme Court issued in the final stretch this year was Riley v. California, which held that law enforcement officials may not make a...more
In Attorney General of Manitoba et al. v. Clark, 2013 MBQB 249 (“Clark”), the Crown sought to enforce an evidence gathering order under the Mutual Legal Assistance in Criminal Matters Act (the “Act”). The order required...more
On July 17th, the Data Retention and Investigatory Powers Act (“DRIP”) came into effect in the United Kingdom reinstating the Government’s powers to require communication providers to retain traffic data (also known as...more
In April, Microsoft tried to quash a search warrant from law enforcement agents in the United States (U.S.) that asked the technology company to produce the contents of one of its customer’s emails stored on a server located...more
August 18, 2014 (Mimesis Law) -- As revenge porn laws crop up across the United States, Scott talks about some of the unintended consequences that can result from criminalizing such a broad swath of online activity....more
..’Sup? We’ve commented previously about the new social networking app Yo, which transmits only that brief, eponymous syllable to a user’s friends. Yo’s founders may have been onto something good; the app has been downloaded...more
Is it possible to commit money laundering with virtual currency? At least one federal judge thinks so. Last month, U.S. District Judge Katherine Forrest refused to dismiss a money laundering charge premised on the use of a...more
Federal prosecutors in the Eastern District of Texas recently brought criminal charges under the Health Insurance Portability and Accountability Act (“HIPAA”) against a former East Texas hospital employee. The former...more
On 31 July, the chief judge of the Southern District of New York delivered the latest in a series of controversial judgments stemming from a test case brought by Microsoft in an extra-territorial warrant issued under the U.S....more
Whatever you might think of where his career went, Elton John had some great early stuff. I still rank Tumbleweed Connection right up there as one of my favorite albums of all-time. And while it was packed with some great...more
Next week, Shanghai’s No. 1 Intermediate People’s Court is scheduled to open a trial against Peter William Humphrey, a 58-year-old British national, and his wife, Yu Yingzeng, a 61-year-old American, on charges of illegally...more
Find a Science, Computers & Technology Author »
Back to Top