Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
Emerging Strategies for Protecting Global IP Rights
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
During the past several years, Europe has installed about 2,000 offshore turbines (6,500 MW of offshore wind generation capacity), with capacity doubling since 2010. Offshore wind provides almost 1% of total power in Western...more
In this issue:
- Cybersecurity: Coming Soon to a Government Contract Near You
- Recent National Defense Authorization Act Presents Opportunities for Small Business Contractors
- Iran Sanctions Deal Does...more
cGovernment contractors should be aware of recent Department of Defense (DoD) rules governing Information Relating to Supply Chain Risk, 78 Fed. Register 69,268 (Nov. 18, 2013) and Unclassified Controlled Technical...more
The first major wave of the much-discussed U.S. Export Control Reform measures will break on October 15, 2013 as the first round of rule changes take effect. While many in the affected industries expect that the October...more
The Department of Defense (DOD) has issued a new instruction that establishes internal DOD policies for detecting, avoiding, and remediating counterfeit parts in the DOD supply chain, and allocates responsibility among...more
One of the most perplexing questions that has plagued the government contracting community in recent years relates to the country of origin for computer software. Where most government procurements restrict the purchase of...more
In the October edition of Energy & Clean Tech Connections, we’ve gathered recent information from a wide variety of sources in an effort to keep you abreast of what’s new in the world of clean energy. We draw your attention...more
On October 8, 2012, the House Intelligence Committee issued a damning bi-partisan report on what it perceived to be national security risks posed by two Chinese telecommunications companies: Huawei and ZTE. The committee...more
The Federal Bureau of Investigation estimates that corporate espionage has cost American companies $13 billion from trade secrets stolen by company insiders and given to hostile foreign governments.
To combat this...more
On November 7, 2011, the U.S. State Department published a proposed rule amending the International Traffic in Arms Regulations (“ITAR”) by narrowing the categories of aircraft and related equipment controlled on the United...more
In late September, Flowserve Corporation (“Flowserve”) and a number of its subsidiaries agreed to settle alleged export violations with the Department of Commerce, Bureau of Industry of Security (“BIS”) for $2.5 million, and...more
Beginning on February 20, 2011, the U.S. Bureau of Citizenship and Immigration Services (“CIS”) assumed a role in the U.S. Government's increasing regulation of technology exports. The new role for CIS relates to the transfer...more
On May 16, 2011, the Department of State (“Department”) published its final rule in the Federal Register amending provisions of the International Traffic in Arms Regulations (“ITAR”) regarding the transfer of ITAR controlled...more
An Overview of PRC Contract Law and Tips on Risk Management in Legal Drafting for the China Market...more
On August 27, 2010, the Department of State amended section 125.4(b)(9) of the International Traffic in Arms Regulations (“ITAR”) to clarify an exemption to the license requirement related to the hand-carrying of technical...more
In comments released on March 12, 2010, the Administration announced that it will be shifting the current encryption review request process under 15 C.F.R. section 740.17 to an on-line system, with the objective of reducing...more
Find a Science, Computers & Technology Author »
Back to Top