Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
On September 3, 2014, following the news of a possible breach at Home Depot (which was confirmed on September 8), the National Association of Federal Credit Unions (NAFCU) called on Congress to enact new legislation to hold...more
In what has become almost an annual ritual, California is poised to tweak its security breach notice law. Last year, in language DLA Piper lawyers helped to draft on behalf of the State Privacy & Security Coalition, the...more
On August 19, 2014, the German Federal Ministry of the Interior ("GMI") proposed a new bill to increase the security of IT systems (the "Draft Bill"). As contemplated in the White & Case Technology Newsflash of December...more
The sanctions directly affect companies involved in Russia's oil and gas industries by imposing new export license requirements....more
In This Issue:
- COVER STORY: Davis: Jeb Bush a Formidable Candidate
- CRISIS: The Real Cancer that Caused the VA Scandal
- DIGITAL ENGAGEMENT: Aereo and Meltwater: The Ghost of Napsters Past
- FINANCIAL: Dov...more
On July 29, 2014, the House Energy and Commerce Subcommittee on Commerce, Manufacturing, and Trade held a hearing on “Nanotechnology: Understanding How Small Solutions Drive Big Innovation.” Witnesses included...more
Admiral Mike Rogers, the new leader of the National Security Agency and Cyber Command at the Defense Department, certainly has taken a different approach from his predecessor, General Keith Alexander. Right out of the gate,...more
On July 8, 2014, in closed session, the U.S. Senate Committee on Intelligence voted 12-3 to report the Cyber Information Sharing Act (CISA). The bill would grant legal immunity for companies to share cyber threat data with...more
The House of Representatives on July 8, 2014, passed by voice vote H.R. 4007, legislation that reestablishes the Chemical Facility Anti-Terrorism Standards (CFATS) program. ...more
On June 17, 2014, Senate Intelligence Committee Chairman Dianne Feinstein (D-CA) and Vice Chairman Saxby Chambliss (R-GA) released a draft bill entitled, The Cybersecurity Information Sharing Act of 2014. Given the increasing...more
Last month, after repeated delays and countless compromises, Sen. Patrick Leahy took the Senate’s version of comprehensive patent reform legislation off the calendar — dashing the hopes of those seeking reform without even a...more
In April 2013, an explosion destroyed a fertilizer plant in West, Texas, killing 15. In response to this and other recent catastrophic and fatal incidents at chemical facilities, President Obama on August 1, 2013, issued...more
Proposed legislation introduced by Governor Patrick to eliminate most forms of non-competition agreement in Massachusetts may be enacted before July 31, 2014. This legislation creates significant risks for employers with...more
The Senate Judiciary Subcommittee on Privacy, Technology and the Law has announced it will hold a hearing on June 4, 2014, regarding the Location Privacy Protection Act of 2014....more
Just over a week into the new session of the North Carolina General Assembly, legislation aimed at the abusive assertion of patent infringement claims by “patent trolls” may be gaining traction, with a bill apparently headed...more
Patent assertion entities—‘‘PAEs’’ or, if you are in a bad mood, ‘‘patent trolls’’—have been around in one form or another for decades. In the past few years, however, their ranks have grown. According to a U.S. Government...more
On February 12, 2013, President Barack Obama issued Executive Order 13636 (EO 13636) entitled “Improving Critical Infrastructure Cybersecurity.”EO 13636 noted the importance of cybersecurity for the nation’s security and...more
Congress has been trying for several years to pass cybersecurity legislation, and the number of bills hitting the hopper has increased steadily over recent months. Nearly half a dozen bills have been introduced since January...more
On April 29, 2014, the U.S. House Committee on Energy and Commerce's Subcommittee on Environment and the Economy held a hearing on the revised version of the Chemicals in Commerce Act (CICA2). Details of the hearing provided...more
On April 28, 2014, as part of its evolving response to the situation in Ukraine, the White House announced new restrictions on exports of “high-technology” items and services to Russia and Crimea. The announcement also...more
Yesterday, May 1, was a big day for privacy in the news. The White House issued 2 reports on the privacy implications of Big Data, and the Florida legislature overhauled the state’s security breach notification law,...more
The United States, in coordination with other G-7 nations, announced on Monday, April 28 new sanctions on individuals and entities with ties to the Russian government and President Putin. The newly announced sanctions build...more
One can hardly talk about the patent law or patent litigation anymore without addressing the issue of patent assertion entities (PAEs). PAEs develop nothing, make nothing, distribute nothing, and sell nothing. They exist to...more
Following a string of high-profile data breaches and new data suggesting that approximately 21.3 million customer accounts have been exposed by data breach incidents over the past two years, the California legislature has...more
As a new round of nuclear talks involving American, European, and Iranian leaders commence this week in Vienna it appears that the first-step deal agreed upon in January has already led to significant changes in OFAC’ s...more
Find a Science, Computers & Technology Author »
Back to Top