Science, Computers & Technology Intellectual Property Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Labor & Employment E-Note - October 2015

Marcel Debruge and Meryl Cowan were featured in Practical Law's Q&A on workers' compensation law for employers in Alabama. The Q&A addresses Alabama laws requiring workers' compensation coverage, including the benefits...more

Employment Law Update - November 2015

Coming Changes to Overtime Exemptions Rules Will Have Serious Impact on Employers - The Fair Labor Standards Act ("FLSA") requires that employees be paid minimum wage and overtime pay at a rate of not less than one and...more

Attention UGC Marketers—Are Your Permissions in Order?

Brand companies have come to view user-generated content as often one of the most effective and authentic ways to advertise their products or services. This is known as “user-generated content marketing.” For example, with...more

Final TPP Language on Trade Secret Protection Disclosed

On October 5, 2015, years of protracted negotiations of the Trans-Pacific Partnership Agreement (“TPP”) concluded. The TPP is a proposed trade agreement between 12 Pacific Rim nations that lowers trade barriers such as...more

Facebook’s “Copyright” Post - The Sound and the Fury

Users of Facebook no doubt have seen at least some of their friends post the “copyright” update. In brief, the post states “I hereby declare that my copyright is attached to all of my personal details,” including photos,...more

Trans-Pacific Partnership Agreement Features Key Developments in Intellectual Property and Information Technology

On October 5, the 12 Trans-Pacific Partnership (“TPP”) countries announced that they had resolved all remaining issues and reached a final agreement on the long-anticipated regional free-trade agreement. As King & Spalding...more

U.S., China Announce Cybersecurity Agreement During Xi Jiping’s Visit

Chinese President Xi Jinping made his first state visit to the United States last week, and his itinerary included meetings with U.S. technology company leaders as well as President Barack Obama. Not surprisingly, his hosts...more

[Event] Cybersecurity, Data Breach, and Privacy:A Dialogue on the Rising Risks and Evolving Legal Landscape - Oct. 12th, Los...

Nossaman LLP and University of California, Irvine School of Law invite you to join us for this complimentary half-day seminar on recent developments in the areas of cybersecurity, data breach, privacy, and their implications...more

Project CAMERASHY Details Cyberespionage By China’s Military

In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more

Who is Stealing Your Trade Secrets? An Overview of Key Threats

Every company has trade secrets – for some, they may be special manufacturing processes, for other organizations, trade secrets could include product formulae, customer lists, software code or marketing strategies. The more...more

[Event] 2015 Business of Personalized Medicine Summit - Oct. 7, San Francisco, CA

Just as with patient treatments, one size does not fit all when it comes to companies involved in personalized medicine. Each is unique in its mission, culture, and capabilities, and so it should come as no surprise that each...more

U.S. Considers Sanctions Against China For Cyber Hacking And Trade Secret Misappropriation

You may have missed it this past weekend, but reports indicate the United States is considering sanctioning Chinese companies and individuals who have benefited from their government’s alleged cyber hacking of U.S. trade...more

Throwback Thursday: Why Trade Secret Theft Isn’t Just a Digital Problem And What Businesses Can Do About It

With stories of cyberattacks and data breaches on a seemingly endless loop, businesses and governments have been doubling down on their efforts to protect digital information and assets.  But, in some industries, the greatest...more

Is Ashley Madison abusing the Digital Millennium Copyright Act in the Wake of Hack?

In July, a group of hackers identifying themselves as the Impact Team took over the computer systems of Avid Life Media (“ALM”), the parent company of the adultery-oriented website Ashley Madison, threatening to release the...more

Five Drivers of E-Discovery in the APAC Region

In last week’s blog, we discussed developing trends in e-discovery law in the Asia-Pacific region. This week, we explore five trends that will continue to spur the growth of e-discovery in this region over the next few years....more

Cybersecurity for Startups Now a Cost of Entry for Consideration by Larger Clients: What is Your Company's Plan?

For technology startups, maintaining strong security controls remains vital to winning new business opportunities and strengthening existing relationships. Despite the global spike in cybersecurity attacks (there were 42.8...more

Intellectual Property Newsletter - July - August 2015

Protecting Trade Secrets in the Era of the Data Breach - The prevalence of data breaches cannot be ignored. New data breaches continue to occur one after an-other. In the first half of 2015 alone there were reports of...more

Trade Secrets, Security, and Cloud Computing: Best Practices Now

As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more

Privacy Monday – July 2015

Welcome to the dog days of summer 2015. Three privacy & security bits and bytes to start your week (if you are reading this on vacation … good for you!) 1. ICYMI: Massive Data Breach at OPM Claims Victim — The Director...more

Data Breach Decisions Setting A Higher Threshold For Standing For Plaintiffs Do Not Mean Businesses Are Off The Hook

There are only two types of companies left in the United States: those that have been hacked and those that will be hacked. In the last year alone, forty-three percent (43%) of U.S. companies experienced a data breach,...more

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

OPM and Where The Lines Are

The recent hacking of the sensitive personal information of millions of American public servants at the Office of Personnel Management (OPM) points out a noteworthy distinction in how the U.S. government views some types of...more

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

Cardinals Hacking Update

St. Louis Cardinals owner Bill DeWitt, Jr. threw staff members under the bus following the breaking story last week that the Cardinals have been hacking into the Astros’ database for up to three years. According to DeWitt, a...more

Strategies For Businesses Protecting Electronic Data Within California: Part Three

In Parts One and Two of this e-alert series, we discussed the federal Computer Fraud And Abuse Act ("CFAA") and its California corollary the California Computer Data Access And Fraud Act (CDAFA). In Part Three, we provide a...more

242 Results
View per page
Page: of 10

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.