Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
In Prophet v Huggett  ECWA Civ 1013, the Court of Appeal has overturned a recent decision of the High Court in which it had re-written a non-compete covenant to give it commercial effect. You may recall that we...more
“Web scraping” or “Web harvesting” — the practice of extracting large amounts of data from publicly available websites using automated “bots” or “spiders” — accounted for 18 percent of site visitors and 23 percent of all...more
A decision has been made in the case against Omnicare, Inc. that will net a former Omnicare pharmacist more than $17.2 million in the ensuing settlement.
The settlement with the Department of Justice orders Omnicare,...more
The U.S. Attorney General recently intervened in a qui tam case brought by a current employee of California-based computer software giant Symantec Corporation, alleging violations of the federal, California, Florida and New...more
On June 6, 2014, the fourth draft version of the new PRC Copyright Law (New Law) was published for public comment, having first been published in 2010. The period for public comment ended on July 5, 2014 meaning the...more
In This Issue:
- Move over Big Pharma: Health care is not the only industry susceptible to False Claims Act scrutiny
- Third Circuit affirms dismissal of False Claims Act suit, citing contract...more
- Government allegations of Medtronic’s alleged incentives to physicians for prescribing its medical devices lead company, while denying wrongdoing, to settle False Claims Act suit predicated on Anti-Kickback...more
A recent decision from the Massachusetts federal district court serves as a good reminder to Massachusetts employers that courts are unlikely to view the breach of a non-disclosure/confidentiality agreement as justification...more
In This Issue:
- Whistleblower’s one-two punch: Confidential informant/employee spurs criminal investigation, then successfully sues individual company owner in qui tam action
- Alleged illegal recruiting for...more
The First Circuit recently affirmed the dismissal of United States ex rel. Wilson v. Bristol-Myers Squibb, Inc. under the False Claims Act’s (“FCA”) “first-to-file” provision, which prohibits any person “other than the...more
Acrimony, anger, revenge, piracy, and a legal battle—these are often the ingredients of a prime-time television drama. But in this case, they are not the makings of a plot found on cable, Netflix, or DVD. Instead, they are...more
Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulnerability of our intellectual property to...more
The Securities and Exchange Commission (SEC) Office of the Whistleblower rejected a claim for an award earlier in the summer because it was not "original" under the SEC's whistleblower law. The claimant originally filed a...more
The U. S. Department of Justice (DOJ) has taken the unusual step of appealing a federal district court’s dismissal of a declined qui tam brought under the federal and multiple state false claims acts (FCA). Could the...more
In all jurisdictions the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, the federal computer crime statute, applies to former employees who steal data from the company computer, but in two federal circuits it does not...more
The federal Department of Justice recently filed criminal charges against a 41-year old software programmer and system manager who hacked into his former employer's computer network, causing $90,000 in damage. The complaint...more
Most people know that an employee who misuses his employer’s confidential information may be subject to damages in a civil lawsuit. Many states have enacted a Uniform Trade Secrets Act that allows an employer to pursue a...more
Last month the Vermont Legislature kicked off its 2013-2014 Legislative Session, and already a couple of bills have our attention here at the IP Stone....more
A Southern District of New York judge has joined the growing trend of federal courts that interpret the Computer Fraud and Abuse Act to preclude allow recovery for misappropriation of computer information....more
Generally speaking, noncompete agreements are often rigidly construed by courts and reviewed in terms of whether they are reasonably limited with respect to time and place. On the other hand, confidentiality agreements and...more
A recent opinion stemming from a lawsuit between two competitors in the medical device industry reminds us of the old adage “be careful what you wish for.” In Howmedica Osteonics Corp. v. Zimmer, Inc., the plaintiff seemed to...more
A Federal District Court in the Eastern District of Pennsylvania recently addressed the issue of ownership of an employers LinkedIn account created by a former employee....more
On July 26, the U.S. Court of Appeals for the Fourth Circuit became the first circuit to adopt the Ninth Circuit’s holding in U.S. v. Nosal, 676 F.3d 854 (9th Cir. 2012), that the Computer Fraud and Abuse Act does not...more
Let's say a client calls telling you that a valued former employee has left to work for a competitor. Just before leaving, the employee emailed himself a substantial number of your client's confidential documents. He's now...more
This past Thursday, July 26th, the US Court of Appeals for the Fourth Circuit issued an opinion addressing liability under the federal Computer Fraud and Abuse Act (CFAA) for departing employees who access and copy computer...more
Find a Science, Computers & Technology Author »
Back to Top