What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Alternatives to direct employment are flourishing, as businesses have come to believe they should keep in house only “core” functions and outsource other activities like IT and HR to specialized service providers. This...more
As discussed in my prior blog post, Google, Apple, Intel and Adobe stand accused of conspiring not to poach one another’s employees in order to keep wages down. Attorneys representing the class-action employees agreed to...more
Good record-keeping is a burden. But doing so is important. Here is an example of why it is important to keep good records of all software licenses....more
You have just learned that a senior member of the company research and development team has resigned. The employee had access to important confidential information about your company’s product development, manufacturing...more
For the uninitiated, Dropbox and other similar tools—such as SkyDrive, Google Drive, or Cubby—allow a user to log in to an account, upload documents or files to the cloud, and then access or download them from any device,...more
An ex-employee was recently ordered to pay his former employer AUD50,000 in damages after the Federal Court (Court) held that the employee had infringed copyright and breached his employment agreement and duty of...more
Preview of the U.S. Supreme Court’s October 2014 Term. The Supreme Court has begun its October 2014 Term with a docket featuring more constitutional and criminal law cases than business cases, but a few business cases before...more
It's a commonplace occurrence in Silicon Valley for skilled employees to move from one company to another, followed quickly by a civil trade secret lawsuit alleging that the employee stole trade secrets from his prior...more
Many business owners, particularly those with a limited marketing budget or no marketing plan, view access to social media as free marketing. What could be better? Ask paid employees to get out the “buzz” as an assignment....more
THE ALLURE OF THE POTENTIAL COST SAVINGS OF BRING YOUR OWN DEVICE PROGRAMS IS TOO GREAT FOR MANY AUSTRALIAN ORGANISATIONS TO RESIST.
Not only do the financials of Bring Your Own Device (BYOD) programs look good (the...more
In our modern, ever-electronic, workplace, it continues to become ever-easier for dishonest employees to help themselves to their employer’s most sensitive and valuable assets through wholesale electronic copying of...more
Last week, in a complaint dated August 8, 2014, plaintiffs commenced a lawsuit in the US District Court for the Eastern District of Texas against Financial Engines, Inc. and Financial Engines Advisors L.L.C. asserting a...more
On June 6, 2014, the fourth draft version of the new PRC Copyright Law (New Law) was published for public comment, having first been published in 2010. The period for public comment ended on July 5, 2014 meaning the...more
Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more
Employees are increasingly using their personal electronic devices, such as laptops, smartphones, and tablets, for work purposes. The trend, dubbed “Bring Your Own Device” or “BYOD,” has redefined what it means to “be at...more
Trade secret misappropriation cases often are won or lost quickly and early at the preliminary injunction stage of the case. However, today we report on the results of a slow moving, long-running trade secret case that...more
The Uniform Trade Secrets Act, adopted by 47 states including Virginia, Maryland, and the District of Columbia, generally defines protectable trade secrets as information that derives independent economic value from not being...more
Acrimony, anger, revenge, piracy, and a legal battle—these are often the ingredients of a prime-time television drama. But in this case, they are not the makings of a plot found on cable, Netflix, or DVD. Instead, they are...more
HBO’s new series Silicon Valley satirizes the tech zeitgeist born and bred in the region that is the show’s namesake by following a group of young software developers on their journey to build the next billion-dollar startup....more
On April 10, 2014, Massachusetts Governor Deval Patrick introduced an economic development package that includes a law barring non-compete agreements in the state. Patrick says that the measure would permit the free flow of...more
What you need to know:
Massachusetts Governor Deval Patrick recently proposed legislative reform that would abolish non-compete agreements made in the technology and life sciences sectors, as well as other, currently...more
At an economic development summit earlier today in Newton, Massachusetts, Governor Patrick stated that he will propose an economic growth bill that includes a prohibition on non-competition agreements that discourage workers...more
A Pennsylvania federal magistrate judge has tossed an employer’s claims under the Computer Fraud and Abuse Act (CFAA), holding that the CFAA does not extend to punish employees for the misuse of information that was accessed...more
A California federal court in Enki Corporation v. Freedman held that a former employee’s access of the employer’s computer systems through his log-in credentials did not amount to unlawful hacking under either the Computer...more
Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulnerability of our intellectual property to...more
Find a Science, Computers & Technology Author »
Back to Top