FCPA Compliance and Ethics Report-Episode 175-Debra Bruce on new methods for law firm funding and its implications
Marketing to Millennials
Top Three Cybersecurity Misconceptions
Technology in Healthcare
The Intersection of Cyber and D&O Coverage
Compiling Successful IP Solutions for Software Developers
Regan Miller, RPLU on Cyber Risk
BakerHostetler's Tanya Forsheit Discusses Cloud Computing
Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Competitor or Collaborator? What UpCounsel's Growth Means for BigLaw
Polsinelli Podcasts - Hedge Funds Now Using IPR Challenges
MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
Subpoena issued to eBay pursuant to DMCA, seeking to identify alleged infringers, is deemed valid under express statutory language despite eBay’s pre-subpoena removal of allegedly infringing material in response to related...more
Facebook: Fact or fiction? These days, courts are more and more frequently faced with disputes over whether, as part of the discovery process, a litigant should be entitled to view the opposing party’s social media posts. As...more
If you own an iPhone, take a look at your most recent text messaging threads. Are the words contained in a blue or a green speech balloon?
A blue speech balloon indicates that the communication was sent via Apple’s...more
First came the Industrial Revolution. Then the Internet Revolution. And today we have made a firm step into the dawn of a third revolution called the ‘‘Internet of Things’’ or ‘‘IoT.’’ Or at least this is how IoT’s arrival...more
E-discovery is poised to enter a new revolution as the Internet of Things (“IoT”) continues its seemingly exponential growth. IoT is the ecosystem of interconnected sensory devices that perform coordinated, pre-programmed –...more
In September 2014, Apple introduced a new mobile-operating system called iOS8. iOS8 offers enhanced data-encryption protection to Apple users and the content stored on their mobile devices. Apple's advancements in...more
The cross-use of mobile devices for personal and professional purposes, commonly referred to as “Bring Your Own Device” or “BYOD”, is a relatively recent phenomenon that has created a host of legal and practical challenges...more
5 Reasons Employers Should Prohibit Employees From Using Personal Email Accounts - Recently, a political firestorm has erupted as news stories revealed that Former Secretary of State (and likely Presidential Candidate)...more
The Federal Communications Commission’s (“FCC”) net neutrality proceeding culminated this month with the release of an Order reclassifying broadband Internet access service as a common carrier Telecommunications Service...more
Effective information governance is about taking information — your most important business asset — and looking at ways to better leverage it in a manner that streamlines the business processes, and reduces costs and risk....more
In the closing days of its January term, the Illinois Supreme Court heard oral argument in Hadley v. Subscriber Doe. Hadley poses the question of whether the defendant is entitled to quash the plaintiff’s subpoena seeking to...more
BNB Health Grades, Inc. ("Health Grades") filed a patent infringement action against MDx Medical, Inc., d/b/a Vitals.com ("MDx"). During the litigation, Health Grades identified licensing agreements and associated systems...more
As one who presumably has no nude selfies, you may not be too concerned about a “hack” like the one that continues to afflict celebrities like Jennifer Lawrence and Kate Upton. But that doesn’t mean there aren’t still plenty...more
As we described in July and September, P.F. Chang’s was hit with three putative class actions following its announcement of a point-of-sale data breach. On August 29, P.F. Chang’s moved for dismissal of the first two cases,...more
Facebook’s newest feature may have you thinking twice about your status updates. However it’s not what you write that you should worry about, but rather where you write it. The social media giant has unveiled the latest...more
..A relatively new site called Wanelo combines the features of a social media site and an e-commerce site by permitting users to “save” products that they are interested in, and showing them to their online friends. The site...more
Big data is only going to get bigger, my friends....more
Who ultimately owns the data? How will your data be shared? Wouldn’t health insurance companies love access to your fit monitor data to set their premiums?...more
Smartphones and tablets are everywhere. Largely prompted by Apple, Samsung, and Google’s consumer-centric marketing strategies, people are spending more and more money on the latest and fastest mobile devices, upgrading them...more
While many cases focus on electronic evidence available on employee laptops and behind corporate firewalls, massive volumes of electronic evidence can be found on the servers of companies that provide electronic processing...more
In this issue:
- The Firm’s Ediscovery Team Attorneys
- Case Insights
- Editor’s Corner
- Excerpt from Peerless Industries, Inc. v. Crimson Av, LLC, Case No. 1:11-cv-1768, 2013 U.S. Dist. LEXIS...more
Gatto v. United Air Lines, Inc., 2013 WL 1285285 (D.N.J. Mar. 25, 2013).
In this personal injury dispute, the defendants sought spoliation sanctions arising out of the plaintiff’s destruction of relevant social media...more
Potts v. Dollar Tree Stores, Inc., 2013 WL 1176504 (M.D. Tenn. March 20, 2013).
In this employment dispute, the defendant filed a motion to compel discovery of the plaintiff’s personal computer and any “Facebook and/or...more
Cell phones and tablets have become the modern day Swiss Army Knife, the key to survival when navigating the treacherous trails of daily life. Not only can these devices guide you through the vast array of potential...more
What Does a Child Pornography Case Tell You About Computer Evidence? was published in the November 2012 Palm Beach Bar Bulletin and discusses the recent United States v. Seiver case as well as the simple steps for lawyers,...more
Find a Science, Computers & Technology Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top