Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
Last week, in a complaint dated August 8, 2014, plaintiffs commenced a lawsuit in the US District Court for the Eastern District of Texas against Financial Engines, Inc. and Financial Engines Advisors L.L.C. asserting a...more
On June 6, 2014, the fourth draft version of the new PRC Copyright Law (New Law) was published for public comment, having first been published in 2010. The period for public comment ended on July 5, 2014 meaning the...more
Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more
Employees are increasingly using their personal electronic devices, such as laptops, smartphones, and tablets, for work purposes. The trend, dubbed “Bring Your Own Device” or “BYOD,” has redefined what it means to “be at...more
Trade secret misappropriation cases often are won or lost quickly and early at the preliminary injunction stage of the case. However, today we report on the results of a slow moving, long-running trade secret case that...more
The Uniform Trade Secrets Act, adopted by 47 states including Virginia, Maryland, and the District of Columbia, generally defines protectable trade secrets as information that derives independent economic value from not being...more
Acrimony, anger, revenge, piracy, and a legal battle—these are often the ingredients of a prime-time television drama. But in this case, they are not the makings of a plot found on cable, Netflix, or DVD. Instead, they are...more
HBO’s new series Silicon Valley satirizes the tech zeitgeist born and bred in the region that is the show’s namesake by following a group of young software developers on their journey to build the next billion-dollar startup....more
On April 10, 2014, Massachusetts Governor Deval Patrick introduced an economic development package that includes a law barring non-compete agreements in the state. Patrick says that the measure would permit the free flow of...more
What you need to know:
Massachusetts Governor Deval Patrick recently proposed legislative reform that would abolish non-compete agreements made in the technology and life sciences sectors, as well as other, currently...more
At an economic development summit earlier today in Newton, Massachusetts, Governor Patrick stated that he will propose an economic growth bill that includes a prohibition on non-competition agreements that discourage workers...more
A Pennsylvania federal magistrate judge has tossed an employer’s claims under the Computer Fraud and Abuse Act (CFAA), holding that the CFAA does not extend to punish employees for the misuse of information that was accessed...more
A California federal court in Enki Corporation v. Freedman held that a former employee’s access of the employer’s computer systems through his log-in credentials did not amount to unlawful hacking under either the Computer...more
Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulnerability of our intellectual property to...more
Former Korn/Ferry recruiter David Nosal was sentenced to one year and one day in prison on Wednesday for violating the federal Computer Fraud and Abuse Act and the Economic Espionage Act.
In April, a federal jury in...more
In the New Year, one of the trade secret trends we’re watching is the ongoing tension between a company’s interest in preserving its proprietary information and the public’s demand to know more about the goods or services it...more
On October 16, 2013, a federal judge in New Jersey ruled that Goldman Sachs must advance the legal fees of a former employee charged with stealing Goldman’s source code. The order is the latest twist in a case that...more
For the two million Californians who have left the state in the past decade, Texas has been the most popular destination. Further, 254 California companies moved some or all of their work and jobs out of state— frequently to...more
On February 28, 2008, Hanjuan Jin, a Chinese-born former software engineer for Motorola, arrived at Chicago O’Hare Airport en route to Beijing. During a random customs check, officials discovered that she had a one-way...more
Scott & Scott, LLP attorney, Brian Von Hatten, lists some of the risks companies face when their workforce wants to bring their own devices to work....more
There is increasing interest from Chinese businesses in establishing an R&D center in the Silicon Valley and other technology centers in the United States. For example, the world’s largest mobile phone operator, China Mobile,...more
According to a recent press release by Gartner, Inc., a global technology research and advisory company, half of all employers are expected to require their employees to supply their own devices for work by 2017. A...more
A New Jersey appellate court’s decision last week in UCB Mfg., Inc. v. Tris Pharma, Inc., serves as a cautionary tale for employers when drafting confidentiality agreements to protect their trade secrets and confidential...more
Key Takeaway: Companies that follow these 3 steps can use the Computer Fraud and Abuse Act as a tool to combat the misuse of their computers (and information) by (1) actively monitoring for misuses, (2) taking reasonable...more
IN THIS ISSUE:
- A new wave of regulatory enforcement actions in China – Are we witnessing a prolonged enforcement cycle?
- Update on recent decisions
- Australia’s innovation patent – The...more
Find a Science, Computers & Technology Author »
Back to Top