Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
Emerging Strategies for Protecting Global IP Rights
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
A recent article in August’s Best’s Review, The Rise of the Super Models, by Kate Smith (not Kate Upton, sorry), caught our eye. A lot is going on in the world of computer catastrophe modeling. First, demand by insurers and...more
In this presentation:
- The Cyber Threat Landscape
- Top 4 Risks to Nonprofits
- Risks Are Getting Riskier…
– Part 1: Top 4 Industry Trends
– Part 2: Top 4 Legal Developments
- Ten Steps...more
• Electronic data and credit card information can be compromised due to malware, phishing, spear phishing, data loss and data theft
• The risk of cyber liability is real for ALL enterprises whether large or...more
As implied by the name, the commercial general liability (CGL) insurance policy provides businesses with coverage for a wide array of claims by third parties, including claims for damage to “tangible property” and claims...more
The prevalence of cyber data breach over the years has not only grown in number, but has also grown in size. Perhaps the most well-known example of a large-scale data breach is that suffered by Target Corp. occurring at the...more
The Recent Increase In Focus on Privacy Issues -
Privacy issues have been the focus of many state efforts over the past few years. However, the SEC has increased their focus tremendously over the past few months (see...more
On August 6, 2014, the New York Times – and other media outlets – reported that a Russian crime ring had amassed the largest known collection of stolen Internet data – a cache of at least 1.2 billion user name and password...more
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) ushered in broad national standards aimed at improving the efficiency and effectiveness of the U.S. health care system. Referred to generically as...more
In This Issue:
- Sovaldi Pricing Lower in Canada
- Implementation of the Affordable Care Act
- Other Federal Regulatory Initiatives
- Other Congressional and State Initiatives
- Other Health...more
The insurance industry continues to respond to the growing threat of data breaches by directing businesses facing that risk towards new, risk-specific cyber insurance products, while attempting to restrict coverage for data...more
On July 18, 2014, the County of Los Angeles (“the County”) filed a lawsuit in Los Angeles Superior Court again Michael D. Drobot, Sr., his son Michael R. Drobot, Jr. and their controlled entities, Pacific Hospital of Long...more
State and Federal Regulations Pertaining to Autonomous Vehicles -
While autonomous vehicles (AVs) are not yet a regular fixture on the nation’s roadways, policymakers, legislators and regulators have started to...more
In This Issue:
- DO SUBSIDIZED HEALTH CARE PLANS PURCHASED UNDER THE AFFORDABLE CARE ACT TRIGGER THE ANTI-KICKBACK STATUTE?
The advent of federally subsidized private pay health insurance under the Affordable...more
Your network is your company’s life blood. You want to be protected in the event your cybersecurity is breached; the attack on Target being a recent, well-publicized reminder to the threat of cyber attacks. ...more
No business is immune to data breach. Digital data in particular can be lost in innumerable ways, causing serious business interruptions and consumer injuries. After falling victim to a hack, virus, or cyber theft, companies...more
In This Issue:
- New Studies Highlight Privacy and Cybersecurity Risks and Costs
- SEC Commissioner Addresses the Role of the Board on Cybersecurity Matters
- Supreme Court Decision on Cellphone Searches...more
Encryption Flaw "Heartbleed" Creates Data Risk: How Insurance Can Stanch the Bleeding -
In early April, news broke of an encryption flaw named “Heartbleed” that exposed companies to data breaches for over two and one...more
When one big industry sues another we learn a lot about how business as usual is conducted.
In this case Humana, a giant health insurer, has sued the medical device company Medtronic, maker of the Infuse bone graft. ...more
The recent onslaught of cybersecurity incidents and payment card thefts dominate daily headlines and have captured the nation’s attention—from the diner whose credit card was compromised during a data breach to the President...more
There are only a handful of decisions addressing whether a commercial general liability (CGL) policy provides coverage for lawsuits brought against retailers allegedly collecting their customers’ ZIP code information. ...more
Welcome to the new age! Data breaches are embedded in our lives – there is no escape. The costs to any company to operate a business without cyber liability insurance and legal counsel are astronomical. Is your company...more
The Affordable Care Act (ACA) received a great deal of attention this past week in Washington. The House held numerous hearings on implementation issues, including oversight of access to care for ACA enrollees and improper...more
On March 25, 2014, in State Farm Mutual Automobile Insurance Company v. Mobile Diagnostic Imaging, Inc., the U.S. District Court for the District of Minnesota held that a corporation not owned or controlled by physicians does...more
The use of third party technology service providers has become widespread and commonplace in all industries. Technology services like “cloud” data storage providers and software as a service (SaaS) allow companies of all...more
On May 16, 2014, the Centers for Medicare & Medicaid Services ("CMS") released a final rule titled "Patient Protection and Affordable Care Act; Exchange and Insurance Market Standards for 2015 and Beyond" ("Final Rule")...more
Find a Science, Computers & Technology Author »
Back to Top