Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
A Chinese court convicted a large British pharmaceutical company of corruption and bribery while doing business in China. As a result, the company must pay a record-breaking fine of $491 million while each of the implicated...more
The Fair Labor Standards Act (FLSA) provides several exemptions from overtime requirements for employees whose job duties meet specific tests. Most employers are familiar with the standard “white- collar” exemptions –...more
THE ALLURE OF THE POTENTIAL COST SAVINGS OF BRING YOUR OWN DEVICE PROGRAMS IS TOO GREAT FOR MANY AUSTRALIAN ORGANISATIONS TO RESIST.
Not only do the financials of Bring Your Own Device (BYOD) programs look good (the...more
In our modern, ever-electronic, workplace, it continues to become ever-easier for dishonest employees to help themselves to their employer’s most sensitive and valuable assets through wholesale electronic copying of...more
Back in 2003 Karl Schumann filed a whistleblower suit alleging that as an executive with benefits company Medco, he learned that Bristol-Myers Squibb and AstraZeneca paid kickbacks to Medco to buy and recommend brand name...more
"... even popular social media platforms, but, sh, don't tell" -
Kind of like confessions in a personal diary, Whisper is an app that lets users anonymously share their secrets with millions of others in acts of...more
Walgreen Co. CFO Wade Miquelon and another high-ranking executive in the company were let go from their positions after the revelation of a $1 billion projection error affecting the corporation’s Medicare-related business....more
As one who presumably has no nude selfies, you may not be too concerned about a “hack” like the one that continues to afflict celebrities like Jennifer Lawrence and Kate Upton. But that doesn’t mean there aren’t still plenty...more
Welcome to the sixth issue of Spotlight on Belgium, the publication through which DLA Piper’s Belgian team brings you up-to-speed with the latest legal updates. And as we are freshly out of the holiday period – it may not...more
Trends & Analysis -
Between our last Qui Tam Update and the end of June, 65 health care–related qui tam cases were unsealed (28 in April, 18 in May, and 19 in June). Within those 65 cases...more
Welcome to the latest Reed Smith Massachusetts State Tax Quarterly Update. In this update, we’ll look back to the developments from the first half of 2014, and look ahead to market-based sourcing and other issues on the...more
Everyone knows that the permissible exposure limits or PELs set forth in various OSHA standards are pretty old (most have not been updated since 1971), and that we’ve learned a lot about chemical exposure and human health in...more
EXECUTIVE SUMMARY -
Tech Leaders Burst Bubble Talk: Execs See No Signs of Irrational Exuberance, Just Steady Growth Ahead -
With a thriving tech economy, ballooning valuations and an IPO market humming at a...more
Employers need to appreciate and address the fact that employees who remove their employers’ confidential information often do not appear to appreciate the risks of being caught or the potentially very serious consequences of...more
On November 1, 2014, Oklahoma will join a number of other jurisdictions that prohibit employers from gaining access to passwords to employee or applicant social media accounts or from viewing non-public information maintained...more
In just two years, social media password protection has gone from a privacy advocate’s dream to an employer’s harsh reality in many states. Maryland became the first state (in 2012) to enact legislation that prevented...more
I've often wondered why well known, large, and "everybody knows the brand" organizations feel the need to cover up instances of when employees come forward to report wrongdoing. We've seen the General Motors debacle over an...more
Well of course they should... stakes have never been higher -
Anybody can be a whistleblower. But the most infamous today are technology professionals, making their debut in the headlines for exposing government...more
This month’s headline developments are the crescendo of cases finding against FedEx Ground’s classification of drivers as independent contractors. On the heels of last month’s decision by the U.S. Court of Appeals for the...more
The NLRB marked the end of summer by issuing its highly anticipated decision in Purple Communications, which many believed would address whether employers can continue to ban use of company equipment and technology,...more
The Obama administration has touted a number of new initiatives aimed at encouraging immigrant entrepreneurship and retention of high-tech workers in the U.S. These are commendable and this author applauds these efforts....more
Attack of the hackers -
Whenever I watch one of those hacker movies, I always think, “There’s no way they could actually hack into [insert the name of a heavily protected government or financial institution database...more
When companies that conduct business in Delaware make their 2015 New Year’s resolutions, they should be sure to add compliance with 6 Del. Code §§50C-101 - 50C -104 ( Section 50C) and 7 Del. Code § 736 (Section 736) to their...more
Sometimes the Greatest Risk Comes from the Inside -
Cybersecurity continues to be an issue that dominates the news. Much has been made of the cyber-risk US companies face from foreign countries and outsiders. However,...more
California employers hoping to save money through a bring your-own device (BYOD) program should think twice about that objective, based on a recent California appellate decision. In Cochran v. Schwan’s Home Service, the...more
Find a Science, Computers & Technology Author »
Back to Top