After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
A recap of most popular writings on the recent European Court Ruling that Google must allow citizens the right to be forgotten....more
On 8 August 2013, the Court of Appeal issued its ruling in the case of Microsoft Corporation v Vadem Ltd . The judgment at first blush appears quite definitive, that “BVI law does not permit double derivative...more
Attorney and Solicitor Susan Foster, Member of Mintz Levin's Corporate & Securities Practice, discusses the proposed changes to the EU’s data protection and privacy rules. ...more
There is increasing interest from Chinese businesses in establishing an R&D center in the Silicon Valley and other technology centers in the United States. For example, the world’s largest mobile phone operator, China Mobile,...more
In the normal course of operations between U.S. and foreign affiliates, inter-company communications and data conveyances are frequent and occur both intentionally and inadvertently. The U.S.-foreign affiliation can be in the...more
Cloud and Insolvency -
With the increasing popularity of cloud computing, more companies are taking advantage of cheap, efficient and globally available data storage options....more
Les médias n’ont de cesse de se faire l’écho d’attaques de botnet à l’assaut de Spamhaus, de flaming worms voleurs d’informations stratégiques au Moyen-Orient ou des dommages causés par Stuxnet, l’arme fatale capable de...more
Background — We have analyzed the terms of venture financings for Israeli and Israeli-related technology companies that reported raising money during 2012. Our survey does not include financing rounds of less than US...more
The London Stock Exchange (LSE) has published rules for the new “High Growth Segment” of the LSE. This segment is targeted at high growth UK and European businesses that want access to capital, as well as a stepping stone to...more
The media is replete with reports of a botnet onslaught paralyzing Spamhaus, flaming worms usurping strategic information in the Middle East and a stuxnet super weapon wreaking physical damage to Iran’s nuclear reactors....more
Earlier this year, the United States District Court for the Middle District of Louisiana upheld the Internal Revenue Service’s disallowance of $1 billion of deductions claimed by Dow Chemical in relation to two transactions...more
Sorry Bill Simmons, but today we celebrate one of the great modern day records of any American sports franchise. On this day 41 years ago, the Milwaukee Bucks beat the Los Angeles Lakers to end the Lakers 33 game winning...more
Indian Webinar Series
Cross-Border Data Privacy and Security Best Practices
As companies become more global, with operations, employees and customers across multiple jurisdictions and with greater reliance than ever on...more
Background – We have analyzed the terms of venture financings for Israeli and Israeli-related technology companies that reported raising money during the first half of 2012. Our survey does not include financing rounds of...more
There are many risks involved in dealing with Chinese companies.
We previously discussed The Importance Of China Due Diligence And Corporate Seals.
And we asked the probing question: Is The Era Of Cheap Goods From China...more
Silicon Roundabout — or Tech City as the UK government recently labeled it — is swarming with tech startups, but does it have the same global clout as the Valley?
For decades Silicon Roundabout was only known for its...more
The UK Information Commissioner’s Office (ICO) has released a draft Code of Practice on Data Anonymisation. The UK ICO will be conducting a consultation on the draft Code until August 23, 2012....more
No matter how big or small your company currently might be, your company needs a geolocation policy that takes human rights into account if you are either:
- gathering or storing data that personally identifies your...more
In This Issue:
- Risky Business? Assessing Risks with A Risk Assessment Checklist
- Haunting Prose: Ghostwriting and Transparency in Pharmaceutical and Medical Device Publications
- 2012 In The Line Of Fire:...more
Access, an advocacy organization that promotes open and secure access to the Internet, recently released its Telco Action Plan, a document that sets forth ten steps and implementation objectives for telecommunications...more
Beginning on 1 April 2013, the UK Government will reduce the rate of corporation tax payable in the UK on profits arising from patents and some other forms of intellectual property (“IP”). The reduced tax rate implemented by...more
In This Issue:
*Trends and Best Practices in R&D Strategic Partnerships in China
*USPTO Proposed Rules on Preissuance Submissions
Excerpt from Investor Q&A
Interview by Chuck Comey,...more
In This Issue
MOFCOM Issues Measures on Investigation and Handling of Failure on Declaration of Business Operators' Concentration
Implementing Regulations for the PRC Bid Invitation and Submission Law
The Chinese government is aggressively encouraging domestic and foreign invested companies to develop, co-develop and acquire various technologies viewed as critical to China’s long-term global competitiveness. This policy...more
Find a Science, Computers & Technology Author »
Back to Top