Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Preview of the U.S. Supreme Court’s October 2014 Term. The Supreme Court has begun its October 2014 Term with a docket featuring more constitutional and criminal law cases than business cases, but a few business cases before...more
It's a commonplace occurrence in Silicon Valley for skilled employees to move from one company to another, followed quickly by a civil trade secret lawsuit alleging that the employee stole trade secrets from his prior...more
Many business owners, particularly those with a limited marketing budget or no marketing plan, view access to social media as free marketing. What could be better? Ask paid employees to get out the “buzz” as an assignment....more
THE ALLURE OF THE POTENTIAL COST SAVINGS OF BRING YOUR OWN DEVICE PROGRAMS IS TOO GREAT FOR MANY AUSTRALIAN ORGANISATIONS TO RESIST.
Not only do the financials of Bring Your Own Device (BYOD) programs look good (the...more
In our modern, ever-electronic, workplace, it continues to become ever-easier for dishonest employees to help themselves to their employer’s most sensitive and valuable assets through wholesale electronic copying of...more
Last week, in a complaint dated August 8, 2014, plaintiffs commenced a lawsuit in the US District Court for the Eastern District of Texas against Financial Engines, Inc. and Financial Engines Advisors L.L.C. asserting a...more
On June 6, 2014, the fourth draft version of the new PRC Copyright Law (New Law) was published for public comment, having first been published in 2010. The period for public comment ended on July 5, 2014 meaning the...more
Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more
Employees are increasingly using their personal electronic devices, such as laptops, smartphones, and tablets, for work purposes. The trend, dubbed “Bring Your Own Device” or “BYOD,” has redefined what it means to “be at...more
Trade secret misappropriation cases often are won or lost quickly and early at the preliminary injunction stage of the case. However, today we report on the results of a slow moving, long-running trade secret case that...more
The Uniform Trade Secrets Act, adopted by 47 states including Virginia, Maryland, and the District of Columbia, generally defines protectable trade secrets as information that derives independent economic value from not being...more
Acrimony, anger, revenge, piracy, and a legal battle—these are often the ingredients of a prime-time television drama. But in this case, they are not the makings of a plot found on cable, Netflix, or DVD. Instead, they are...more
HBO’s new series Silicon Valley satirizes the tech zeitgeist born and bred in the region that is the show’s namesake by following a group of young software developers on their journey to build the next billion-dollar startup....more
On April 10, 2014, Massachusetts Governor Deval Patrick introduced an economic development package that includes a law barring non-compete agreements in the state. Patrick says that the measure would permit the free flow of...more
What you need to know:
Massachusetts Governor Deval Patrick recently proposed legislative reform that would abolish non-compete agreements made in the technology and life sciences sectors, as well as other, currently...more
At an economic development summit earlier today in Newton, Massachusetts, Governor Patrick stated that he will propose an economic growth bill that includes a prohibition on non-competition agreements that discourage workers...more
A Pennsylvania federal magistrate judge has tossed an employer’s claims under the Computer Fraud and Abuse Act (CFAA), holding that the CFAA does not extend to punish employees for the misuse of information that was accessed...more
A California federal court in Enki Corporation v. Freedman held that a former employee’s access of the employer’s computer systems through his log-in credentials did not amount to unlawful hacking under either the Computer...more
Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulnerability of our intellectual property to...more
Former Korn/Ferry recruiter David Nosal was sentenced to one year and one day in prison on Wednesday for violating the federal Computer Fraud and Abuse Act and the Economic Espionage Act.
In April, a federal jury in...more
In the New Year, one of the trade secret trends we’re watching is the ongoing tension between a company’s interest in preserving its proprietary information and the public’s demand to know more about the goods or services it...more
On October 16, 2013, a federal judge in New Jersey ruled that Goldman Sachs must advance the legal fees of a former employee charged with stealing Goldman’s source code. The order is the latest twist in a case that...more
For the two million Californians who have left the state in the past decade, Texas has been the most popular destination. Further, 254 California companies moved some or all of their work and jobs out of state— frequently to...more
On February 28, 2008, Hanjuan Jin, a Chinese-born former software engineer for Motorola, arrived at Chicago O’Hare Airport en route to Beijing. During a random customs check, officials discovered that she had a one-way...more
Scott & Scott, LLP attorney, Brian Von Hatten, lists some of the risks companies face when their workforce wants to bring their own devices to work....more
Find a Science, Computers & Technology Author »
Back to Top