A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
Emerging Strategies for Protecting Global IP Rights
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
Structuring Compensation Programs – Interview with David Lagasse, Member, Mintz Levin
International Patent Laws – Interview with Julian Crump, Managing Member, Mintz Levin's London, UK Office
The federal government must publish new procedures 90 days after the 2014 Intelligence Authorization Act is signed. These procedures will become effective upon publication.
Intelligence community contractors will be...more
June 14 (Bloomberg Law) -- Trevor Timm, writer and activist at the Electronic Frontier Foundation, talks with Bloomberg Law's Lee Pacchia about recent intelligence leaks surrounding the NSA's surveillance of American...more
As the Alabama Legislature marked the halfway point of the 2013 Regular Session, progress continued to move at a slow pace where repercussions of the Alabama Accountability Act continue to linger in the halls of the...more
On February 12, 2013, President Obama signed an Executive Order (the Order) intended to enhance the cybersecurity of the country's critical infrastructure. According to the Order, "[t]he cyber threat to critical...more
On February 6, 2013, the National Institute of Standards and Technology (NIST) requested public comment on its latest revised draft of “Security and Privacy Controls for Federal Information Systems and Organizations,”...more
On February 12, 2013, President Obama signed an Executive Order aimed at enhancing the security of U.S. critical infrastructure by establishing a voluntary program for the adoption of cybersecurity standards to protect...more
The White House issued a long-awaited Executive Order (EO) “Improving Critical Infrastructure Cybersecurity” which directs the U.S. Department of Homeland Security (DHS) and other agencies to quickly advance efforts to...more
On February 12, 2013, President Barack Obama issued the long awaited cybersecurity Executive Order, which will establish national cybersecurity standards for critical infrastructure. This cybersecurity Executive Order was...more
Given the failure to enact comprehensive cybersecurity legislation last year, Congress included several targeted statutory provisions setting federal defense policy on a range of cybersecurity issues in the National Defense...more
On January 2, 2013, President Obama signed the 2013 National Defense Authorization Act for 2013 (NDAA) into law. Each year Congress passes the NDAA to authorize funding levels for Department of Defense (DoD) programs and...more
On October 10, 2012, two pro-life groups petitioned the U.S. Supreme Court to review and reverse the U.S. Court of Appeals for the District of Columbia Circuit Court’s decision allowing the continued federal funding of...more
In comments released on March 12, 2010, the Administration announced that it will be shifting the current encryption review request process under 15 C.F.R. section 740.17 to an on-line system, with the objective of reducing...more
Find a Science, Computers & Technology Author »
Back to Top