After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Minnesota’s KMSP-TV Fox 9 News ran a video story on September 9, 2014, by Ted Haller about a family wanting access to their deceased nineteen-year-old son’s digital data. They have been seeking access to his text messages,...more
When I do presentations on the Computer Fraud and Abuse Act, one of the issues I speak about is how we see CFAA issues arise in many unexpected cases such as those in the family law context. We now have another great example...more
This article describes new protections for employees and new challenges for employers (including specific things to do and not to do) under the Genetic Information Nondiscrimination Act....more
Safety and Security in a Digital Age summarizes the many ways one's privacy is violated and monitored by others. The article discusses relevant case law and statutes that impact such technology and helps attorneys apprise...more
A case study of how the Law Offices of Place & Hanley, LLC, leverages technology to effectively manage their cases in securities and commodities litigation, family law, wills and trusts....more
In a case that seems to be splitting hairs, a judge ruled that emails culled by a wife from her husband’s on-line account did not constitute eavesdropping and were, therefore, admissible at trial.
Had the emails been...more
Find a Science, Computers & Technology Author »
Back to Top