Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
As one who presumably has no nude selfies, you may not be too concerned about a “hack” like the one that continues to afflict celebrities like Jennifer Lawrence and Kate Upton. But that doesn’t mean there aren’t still plenty...more
As we described in July and September, P.F. Chang’s was hit with three putative class actions following its announcement of a point-of-sale data breach. On August 29, P.F. Chang’s moved for dismissal of the first two cases,...more
Companies are collecting more and more personal data. With that collection is an increased responsibility and the potential for more government regulation. Attorneys Rick Martinez and Seth Northrop discuss the changes that...more
The Department of Transportation’s National Highway Traffic Safety Administration (“NHTSA”) announced in 2014 that it would begin steps toward implementing vehicle-to-vehicle (“V2V”) technology with an aim toward decreasing...more
The list of states requiring the disposal or destruction of personal data is growing, and companies need to respond accordingly by adopting data destruction plans. Delaware recently became the latest in a series of states to...more
EU data protection laws apply to "personal data" in the broadest sense. For instance, a business email sent by an employee from the office constitutes "personal data" as long as the email directly or indirectly identifies an...more
Microsoft Corp. is appealing the recent decision of U.S. District Judge Loretta A. Preska which requires the company to disclose the contents of e-mails stored at a data center in Dublin, Ireland, in compliance with a warrant...more
The risks are significant if managing sensitive data is not part of a proactive plan—the consequences can include penalties, sanctions and reputational damage....more
It should come as no surprise that wearable technology and fitness trackers, such as Google Glass, the Jawbone UP, and the Narrative Clip are saturating the consumer market, and as a result, consumers are increasingly...more
Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more
The United States Supreme Court has tackled the issue of cell phone privacy and ruled that data is different from other forms of technology. In late June, the Supreme Court issued an opinion: those of David Riley, a...more
Facebook’s newest feature may have you thinking twice about your status updates. However it’s not what you write that you should worry about, but rather where you write it. The social media giant has unveiled the latest...more
Today, in Commonwealth v. Gelfgatt, No. SJC-11358 (Mass. June 25, 2014), a divided Massachusetts Supreme Judicial Court held that under certain circumstances, a court may compel a criminal defendant to provide the password to...more
In today’s business environment, information is a powerful and valuable asset. Organizations that use information wisely and strategically can reach customers faster and with more precision. But in today’s highly regulated...more
The growth of business opportunities in the Bakken region is impressive and looks to continue on an upward trajectory for years to come. Companies that might have been small—or non-existent—just 5 years ago are growing at a...more
How do you stop a security professional’s heart from beating?
Two words: security breach. In today’s “Internet of Everything” environment, the impact of a security breach can be felt around the world and back again…in...more
For leaders and counsel in many organizations, the word “cybersecurity” typically triggers concerns about the IT department, conjuring images of hackers and requiring unfamiliar terminology such as “firewalls” and...more
Recent high-profile data breaches have placed security of personally identifiable information (PII) at the forefront of many organizations’ concerns. Protecting PII and other private data can be a significant undertaking....more
Last month, Edward Snowden provided the press a document describing “how Australian intelligence conducted surveillance of trade talks between Indonesia and the United States and, in the process, monitored communications...more
This week, after a seemingly endless year of construction, my family and I moved into our new, energy-efficient home. As I was in the kitchen unpacking, my daughter cried out, somewhat dramatically, “Mama, come here…. The...more
Let’s face it: technology has made the world smaller. It’s no longer extraordinary for what was once termed a “mid-sized” or “regional” company to trade and outsource in foreign markets. Indeed, the Internet has made it...more
Employees who use personal smart phones, PDAs, tablets, laptops and other electronic devices to connect to the employer’s computer network are fast becoming more of a rule than an exception. Today’s employees are often...more
This week's headlines charged employers with preserving and protecting data in the workplace. This advice is timely given that this week is “Tax Identity Theft Awareness Week,” a time when employers are reminded to safeguard...more
During the final panel of Thomson Reuters’ 17th Annual eDiscovery & Information Governance in Practice Forum, Thomas Barnett, Ignatius Grande, and Sandra Rampersaud led a lively discussion on Managing Big Data, Dark Data, and...more
The increased use of electronic medical records ("EMR") is changing not only the way physicians practice medicine but also the way discovery is conducted in medical malpractice lawsuits. Plaintiffs' attorneys seek to...more
Find a Science, Computers & Technology Author »
Back to Top