Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
Is Edward Snowden a Whistleblower?
Goldstein: Expect More Litigation in Wake of Myriad Gene Patent Decision
As More States Implement Social Media Password Laws, There’s Still Some Blind Spots
Patent Series: Protecting inventions
Trademark Series: Use-based trademark protection
Trademark Series: Protecting your mark from becoming generic
Trademark Series: Matching your commercial strategy
Trademark Series: Building a global brand
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Instapundit: America's IP Laws Need to be "Pruned Back"
Unprecedented Global ATM Heist Presents a Number of Lessons for Companies
With Radical Changes, Law Firms Can Beat Recession
[Legal Perspective] When Is It NOT Okay to Delete Your Social Media Account?
Tips for Mobile App Privacy Compliance
Video Sharing App Vine Hit with Takedown Notice from Prince
Can You Patent Human Genes? ACLU Says No
Cybersecurity Lobbying Booming: How Law Firms Can Profit
Social Media Law Report - Who Owns Your LinkedIn Account, FTC Guidance on Social Ads, More...
Your Employer Doesn’t Own Your LinkedIn Account, and They Shouldn’t Try To
June 14 (Bloomberg Law) -- Trevor Timm, writer and activist at the Electronic Frontier Foundation, talks with Bloomberg Law's Lee Pacchia about recent intelligence leaks surrounding the NSA's surveillance of American...more
As the Alabama Legislature marked the halfway point of the 2013 Regular Session, progress continued to move at a slow pace where repercussions of the Alabama Accountability Act continue to linger in the halls of the...more
On February 12, 2013, President Obama signed an Executive Order (the Order) intended to enhance the cybersecurity of the country's critical infrastructure. According to the Order, "[t]he cyber threat to critical...more
On February 6, 2013, the National Institute of Standards and Technology (NIST) requested public comment on its latest revised draft of “Security and Privacy Controls for Federal Information Systems and Organizations,”...more
On February 12, 2013, President Obama signed an Executive Order aimed at enhancing the security of U.S. critical infrastructure by establishing a voluntary program for the adoption of cybersecurity standards to protect...more
The White House issued a long-awaited Executive Order (EO) “Improving Critical Infrastructure Cybersecurity” which directs the U.S. Department of Homeland Security (DHS) and other agencies to quickly advance efforts to...more
On February 12, 2013, President Barack Obama issued the long awaited cybersecurity Executive Order, which will establish national cybersecurity standards for critical infrastructure. This cybersecurity Executive Order was...more
Given the failure to enact comprehensive cybersecurity legislation last year, Congress included several targeted statutory provisions setting federal defense policy on a range of cybersecurity issues in the National Defense...more
On January 2, 2013, President Obama signed the 2013 National Defense Authorization Act for 2013 (NDAA) into law. Each year Congress passes the NDAA to authorize funding levels for Department of Defense (DoD) programs and...more
On October 10, 2012, two pro-life groups petitioned the U.S. Supreme Court to review and reverse the U.S. Court of Appeals for the District of Columbia Circuit Court’s decision allowing the continued federal funding of...more
In comments released on March 12, 2010, the Administration announced that it will be shifting the current encryption review request process under 15 C.F.R. section 740.17 to an on-line system, with the objective of reducing...more
JD Supra gets your content noticed, increases your visibility and makes your marketing efforts hassle free...
Learn More or Schedule a demo