What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
As this patent infringement action headed to trial, the district court scolded both parties for their exhibit lists and, in particular, the objections to the exhibit lists. The district court explained that "Affinity has...more
The list of states requiring the disposal or destruction of personal data is growing, and companies need to respond accordingly by adopting data destruction plans. Delaware recently became the latest in a series of states to...more
EU data protection laws apply to "personal data" in the broadest sense. For instance, a business email sent by an employee from the office constitutes "personal data" as long as the email directly or indirectly identifies an...more
Hoarding is defined clinically as embodying “a persistent difficulty discarding or parting with possessions because of a perceived need to save them.” That accumulation occurs regardless of the actual value associated with...more
Microsoft Corp. is appealing the recent decision of U.S. District Judge Loretta A. Preska which requires the company to disclose the contents of e-mails stored at a data center in Dublin, Ireland, in compliance with a warrant...more
According to PC Magazine, “[i]n the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive.” Cloud-based computing has become a very popular tool...more
Recently in Bridgestone Americas, Inc. v. International Business Machines Corp., U.S. Magistrate Judge Joe Brown of the Middle District of Tennessee addressed the plaintiff’s request to use technology-assisted review (TAR) on...more
Automated Solutions Corp. v. Paragon Data Sys., Inc., 2014 WL 2869286 (6th Cir. June 25, 2014).
In this copyright infringement case, the plaintiff appealed a lower court’s ruling that denied the spoliation sanctions...more
Bridgestone Americas Inc. v. Int'l Bus. Mach. Corp., No. 3:13-1196, 2014 BL 202049 (M.D. Tenn. July 22, 2014).
In this ongoing case, the plaintiff sued the defendant for a $75 million computer system that it claimed...more
Two software companies wanted to integrate their software products. The relationship soured and one of the parties - McHenry - purported to terminate the Software Licensing and Development Agreement and then launched a...more
The risks are significant if managing sensitive data is not part of a proactive plan—the consequences can include penalties, sanctions and reputational damage....more
It should come as no surprise that wearable technology and fitness trackers, such as Google Glass, the Jawbone UP, and the Narrative Clip are saturating the consumer market, and as a result, consumers are increasingly...more
Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more
In this patent infringement action brought by plaintiff Trustees of Boston University ("BU") , BU alleged that defendants infringed U.S. Patent No. 5,686,738 (the "'738 Patent"), which pertains to light emitting diodes...more
I do not profess to be an expert in the complexities of metadata in an electronic medical record (EMR). In simple terms, it is analogous to leaving footprints in the sand; although these do not wash away with high tide. In...more
The United States Supreme Court has tackled the issue of cell phone privacy and ruled that data is different from other forms of technology. In late June, the Supreme Court issued an opinion: those of David Riley, a...more
The intense patent activity in graphene stems from its enormous technological and commercial potential. But because much of the territory underlying the graphene cross-roads has already been claimed, patenting graphene poses...more
Facebook’s newest feature may have you thinking twice about your status updates. However it’s not what you write that you should worry about, but rather where you write it. The social media giant has unveiled the latest...more
..A relatively new site called Wanelo combines the features of a social media site and an e-commerce site by permitting users to “save” products that they are interested in, and showing them to their online friends. The site...more
Your law firm just purchased a license for e-discovery software. Now what? Software implementations can be a substantial challenge for a variety of reasons, including lack of executive buy-in, poorly defined requirements,...more
My last blog generally addressed the rules applicable to best practices as to identification of Electronically Stored Information (ESI). Once the data identification process is complete, the next step is to determine...more
“E-discovery is pervasive. It’s like understanding civil procedure. You’re not going to be a civil litigator without understanding the rules of civil procedure. Similarly, you’re no longer going to be able to conduct...more
Today, in Commonwealth v. Gelfgatt, No. SJC-11358 (Mass. June 25, 2014), a divided Massachusetts Supreme Judicial Court held that under certain circumstances, a court may compel a criminal defendant to provide the password to...more
Cloud computing sales are poised to triple by 2017, according to IHS Technology. With growth comes competition and the potential for disputes, both intellectual property-related and otherwise. This article surveys some of the...more
In an October 2013 order in Digital Vending Services International, Inc. v. University of Phoenix, the judge refused to grant the defendants’ request for spoliation sanctions but punished the plaintiff for its disclosure of...more
Find a Science, Computers & Technology Author »
Back to Top