Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Employers need to appreciate and address the fact that employees who remove their employers’ confidential information often do not appear to appreciate the risks of being caught or the potentially very serious consequences of...more
Bitcoin owners and exchange operators are coming face-to-face with prosecutors focused on money laundering crimes, leading to novel legal arguments about whether the virtual currency is money, or sufficiently “money-like” to...more
Welcome to the September 2014 edition of Red Notice, a publication of Akin Gump Strauss Hauer & Feld LLP.
This month on the anticorruption front, a Chinese branch of a multinational pharmaceutical company receives a...more
When Is Bitcoin “Money” Versus a “Security”? In motions involving a high-profile criminal prosecution with ties to Silk Road and a Securities and Exchange Commission (SEC) enforcement action, two federal courts have clarified...more
Over a hundred million Americans suffer from chronic pain. To combat this epidemic, health-care providers have increasingly turned to opioid analgesics. As a result, opioid analgesic use has risen dramatically over the past...more
The 2014 legislative short session adjourned on August 20, 2014. The General Assembly passed several bills affecting alcoholic beverages in North Carolina. Significant provisions of those bills are summarized below....more
On Friday, September 19, 2014, a Chinese court found pharmaceutical giant GlaxoSmithKline guilty of bribing doctors and hospitals in order to increase sales of the company’s products in China. Among other things, the company...more
You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more
The Remote Gambling Act 2014 was introduced to Singapore Parliament for first reading on 8 September 2014. This Act adds to Singapore’s already stringent anti-gambling laws by criminalising online gambling....more
On 15 September 2014, Qatar’s Emir approved Law No. 14 of 2014, The Cybercrime Prevention Law (“Cybercrime Law”). Although it has not yet been published in Qatar’s Official Gazette, the text of the law was published in the...more
As NATO and the EU seeks to increase pressure on Russia and the Crimea, the EU expanded its sanctions against Russia on 12 September. This is the latest in a series of measures introduced since March in response to the...more
As a regular presenter on use of force tactics to law enforcement academies, I am often asked why all law enforcement agencies have not implemented body-mounted cameras for all uniformed officers. The simple answer is that...more
Data protection breaches of health related sensitive data might occur through a mere video scanning an individual’s face according to a recent research....more
While a controversial proposed state bill that would restrict law enforcement agencies’ use of drones is drawing criticism, the federal government is also tackling ways to regulate the use of this new technology. These...more
In recent years, many areas of the United States have experienced a surge in crimes involving the theft of mobile devices. According to Consumer Reports, an estimated 3.1 million mobile devices were stolen in the United...more
This week California enacted into law Senate Bill 962, which requires a “kill switch” on all smartphones that would render the device inoperable. The law applies to all smartphones manufactured after July 1, 2015 and sold in...more
On August 19, the U.S. District Court for the Southern District of New York found that Bitcoin is “money” in a memorandum order denying a defendant’s motion to dismiss a federal money laundering charge. Faiella et al. v....more
“Web scraping” or “Web harvesting” — the practice of extracting large amounts of data from publicly available websites using automated “bots” or “spiders” — accounted for 18 percent of site visitors and 23 percent of all...more
On August 19, Judge Jed S. Rakoff of the US District Court for the Southern District of New York issued a ruling in the case of Robert Faiella, holding that bitcoins are “money,” citing the plain meaning of the term in The...more
Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more
The Secret Service, which investigates financial crimes, issued a security Alert on July 31, 2014, warning of malware named “Backoff” that was being used to steal payment card data from point-of-sale (POS) systems. The Alert...more
Inter-American Dialogue's Latin America Advisor asked Marcela Cristina Blanco, associate attorney in Diaz Reus’ Bogota, Colombia office: How Well Do Latin American Banks Protect Against Cyber Attacks?...more
In April of this year, the FBI issued a Private Industry Notification (PIN) to the health care industry warning of the “likely increase [in] cyber intrusions against health care systems.” In the same month, and into June of...more
Every now and then The Nine agree on something. Among the unanimous rulings the U.S. Supreme Court issued in the final stretch this year was Riley v. California, which held that law enforcement officials may not make a...more
In Attorney General of Manitoba et al. v. Clark, 2013 MBQB 249 (“Clark”), the Crown sought to enforce an evidence gathering order under the Mutual Legal Assistance in Criminal Matters Act (the “Act”). The order required...more
Find a Science, Computers & Technology Author »
Back to Top