Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
Emerging Strategies for Protecting Global IP Rights
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
The United States Supreme Court has tackled the issue of cell phone privacy and ruled that data is different from other forms of technology. In late June, the Supreme Court issued an opinion: those of David Riley, a...more
..A relatively new site called Wanelo combines the features of a social media site and an e-commerce site by permitting users to “save” products that they are interested in, and showing them to their online friends. The site...more
Today, in Commonwealth v. Gelfgatt, No. SJC-11358 (Mass. June 25, 2014), a divided Massachusetts Supreme Judicial Court held that under certain circumstances, a court may compel a criminal defendant to provide the password to...more
Overview: The Ninth Circuit Court of Appeals recently found that probable cause supported a warrant authorizing the electronic search of computer equipment and digital storage devices belonging to a suspected child...more
People v. Kucharski, 2013 WL 1281844 (Ill. App. 2nd Dist. Mar. 29, 2013).
In this harassment through electronic communications case, the defendant allegedly posted lewd comments and offensive remarks on the victims...more
This article discusses that, in addition to civil liability that employment lawyers tend to be alert for in departing employee scenarios, departing employees can also be criminally liable for theft, misappropriation, or other...more
When someone subpoenas subscriber information from an internet service provider, does the subscriber have an expectation of privacy? In California, at least, the answer seems to be: No.
In People v. Stirpo, (Second District...more
This decision is the subject of the grant of certiorari by the United States Supreme Court in United States v. Jones, 10-1259.
Maynard and Jones were co-defendants. All legal issues have either been resolved or abandoned...more
The South Africa Law Reform Commission has approved the publication of its Issue Paper on “Electronic Evidence in Criminal and Civil Proceedings: Admissibility and Related Issues” for general information and comment. The...more
In People v. McInnis, the Defendant was convicted of attempted witness bribery. The Defendant attempted to keep witnesses from testifying against the Defendant’s nephew, in the nephew’s trial for robbery and kidnapping. ...more
Computer forensic techniques may be unfairly applied in order to tip the scales of justice in the direction of prosecution. Particular areas that are known to be problematic for defense experts include: erroneous allegations...more
cyber attacks on corporates have become common either by competitors or state sponsored actors of foriegn state, Security to organisations and legal compliance has become important...more
The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecom giant of violating the law and the privacy of its customers by collaborating with the National...more
Find a Science, Computers & Technology Author »
Back to Top