After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Today’s online edition of New York Magazine’s “Daily Intelligencer” includes a comprehensive article on how Silicon Valley start-up tech companies using “the 1099 model” may be exposed to employment, tax, and benefit law...more
The Human Element of Information Security -
In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the data...more
Hoarding is defined clinically as embodying “a persistent difficulty discarding or parting with possessions because of a perceived need to save them.” That accumulation occurs regardless of the actual value associated with...more
The technology industry has been criticized in recent years for its lack of diversity in its mostly male workforce as advocates call on companies to be more transparent with their demographic information. Apple Inc. is one of...more
On September 5, 2014, the Internal Revenue Service (“IRS”) released Private Letter Ruling 201436001 (the “Ruling”), which found that a company providing products and services primarily within the pharmaceutical industry was a...more
As described in Dan Pink’s book, To Sell is Human, GlaxoSmithKline (GSK), the global pharmaceutical, vaccines, and consumer health care company, has adopted a groundbreaking approach to paying its salespeople. Rather than...more
On August 29, 2014, two whistleblower developments of particular interest to health care and life science entities emerged from the Securities and Exchange Commission ("SEC") and the Eighth Circuit Court of Appeals,...more
A report recently released by Chicago-based Jones Lang LaSalle – a financial and professional services firm specializing in commercial real estate – reveals that wages for high-tech workers in South Florida rose by 6.4...more
The innovative folks at Zappos have eschewed the traditional job application/interview/job offer process for a social-media-driven process on a Zappos platform. While very up-to-date, does this push the envelope to the point...more
More than a decade ago, “dual use” devices (i.e., one device used for both work and personal reasons) began creeping into workplaces around the globe. Some employees insisted on bringing fancy new smart phones from home to...more
The National Labor Relations Board (NLRB) continues to expand its interpretation of the forms of employee online behavior that constitute protected concerted activity under the National Labor Relations Act. Recently, in Three...more
The “sharing economy” is an e-commerce darling, making household names of companies like Airbnb and Lyft, with lesser-known businesses such as RelayRides and MoneyParking emerging daily. Also called the peer-to-peer business...more
According to PC Magazine, “[i]n the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive.” Cloud-based computing has become a very popular tool...more
The Omnibus Final Rule (the "Omnibus Rule") under the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), was issued in January, 2013 effective March 26, 2013, but with a general compliance deadline of...more
..What’s not to like? The National Labor Relations Board has ruled that an employee’s Facebook “like” approving of another employee’s statements about their employer may constitute “concerted activity” under federal labor...more
The National Labor Relations Board continues to focus on employer social media policies and employee discipline for online activity. In a ruling this week involving Triple Play Sports Bar & Grill, the Board concluded that...more
In Prophet v Huggett  ECWA Civ 1013, the Court of Appeal has overturned a recent decision of the High Court in which it had re-written a non-compete covenant to give it commercial effect. You may recall that we...more
The Centers for Medicare and Medicaid Services (CMS) made announcements this week regarding the Open Payments system and the availability of Affordable Care Act (ACA) Consumer Assistance Program grant funds, issued a request...more
The best and most effective way an employer can combat social media-focused harassment is through education and training on what behavior the company will and will not find acceptable....more
“Web scraping” or “Web harvesting” — the practice of extracting large amounts of data from publicly available websites using automated “bots” or “spiders” — accounted for 18 percent of site visitors and 23 percent of all...more
The grocery business may be “fresh and easy,” but drafting a confidentiality and data protection policy that withstands the scrutiny of the current National Labor Relations Board (NLRB) is not. The NLRB, in its recent 2-1...more
Like the beasts of Tolkien’s imagination, digital trolls skulk around the internet shrouded in anonymity, unprovoked yet fiercely attacking the unwary. These trolls are individuals who use anonymous screen names to post...more
Our company has employees and operations in multiple states, and I’m concerned about complying with data breach laws in the various locales. What’s the status of the law on data break...more
More than 50% of teens have experienced cyber bullying. Parents have historically looked to their children’s schools and local government to address the issue, but what about the social media sites which contribute to the...more
Q: BYOD (Bring your own device) is standard for our employees. What, if any, are the risks for BYOD when compared to company-provided devices?...more
Find a Science, Computers & Technology Author »
Back to Top