Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
Emerging Strategies for Protecting Global IP Rights
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
This week's headlines charged employers with preserving and protecting data in the workplace. This advice is timely given that this week is “Tax Identity Theft Awareness Week,” a time when employers are reminded to safeguard...more
German companies sometimes are required to collect data for legitimate business purposes, including for compliance, to investigate malfeasance, for adjudication of claims and to protect personal data of customers from misuse....more
Bring your own device policies in the workplace aren’t novel. Companies have experimented and implemented policies requiring employees to use their own personal phones, computers and tablets in the scope of their employment...more
The need to stay connected these days applies not only to our social universe, but also to our business universe. The result is a trend known as “bring your own device” or “BYOD.” BYOD is the practice where employees use...more
Smartphones and tablets are everywhere. Largely prompted by Apple, Samsung, and Google’s consumer-centric marketing strategies, people are spending more and more money on the latest and fastest mobile devices, upgrading them...more
PTSI, Inc. v. Haley, 2013 WL 2285109 (Pa. Super. Ct. May 24, 2013).
In this employment law case, the plaintiff appealed a trial court’s denial of motion for sanctions against the defendants who allegedly erased...more
Lazette v. Kulmatycki, 2013 WL 2455937 (N.D. Ohio June 5, 2013).
In this employment law case, the federal district court held that the Stored Communications Act (SCA) can apply if an employer reads personal emails from...more
Gordon v. Kaleida Health, 2013 WL 2250579 (W.D.N.Y. May 21, 2013).
In this action brought under the Fair Labor Standards Act, the plaintiffs motioned for a court order requiring the parties to meet and confer on the...more
Potts v. Dollar Tree Stores, Inc., 2013 WL 1176504 (M.D. Tenn. March 20, 2013).
In this employment dispute, the defendant filed a motion to compel discovery of the plaintiff’s personal computer and any “Facebook and/or...more
This article discusses that, in addition to civil liability that employment lawyers tend to be alert for in departing employee scenarios, departing employees can also be criminally liable for theft, misappropriation, or other...more
Cisco’s 2011 Connected World Technology Report found that 70% of young professional employees disregard their employer’s technology policies on a regular basis. This presents significant litigation and public relations risks...more
Tips for obtaining social media during litigation, and using for your client's advantage....more
In this issue: NLRB Report Provides Guidance to Employers on Social Media Issues; Rough Waters: Repeat Infringer Policies and the DMCA Safe Harbors; What Every Company Should Know About E Discovery and Social Media; CDA...more
Pre-litigation practice pointers for locating, obtaining, and protecting the wealth of often-overlooked information that is voluntarily disclosed via social and other electronic media content. Published in the September 2011...more
This article, published in the June 2011 issue of the newsletter of the Maryland Chapter of the Federal Bar Association, discusses the powerful tool that social media has become. Social media is too difficult to ignore and...more
According to the third district appellate court in Holmes v. Petrovich, 2011 DJDAR 671, your office privacy is a lonely public roadway. And where the limits are clearly posted, you had better obey—no matter what kind of...more
The pen has become even mightier since Facebook and its kin stepped into the courtroom.
Today, courts consider social media posts to be beyond the purview of the right of privacy - and fully admissible in court. Now, with...more
A quick checklist...more
This short 15 slide presentation provides the framework for developing and discussing Electronic Discovery in Employment Law.
Article discusses discoverability of information posted on social networking web sites, including Facebook and MySpace, and analyzes how discovery disputes and potential admissibility at trial of this information may be...more
Find a Science, Computers & Technology Author »
Back to Top