Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
An Illinois Appellate Court recently held that an employer must defend against a wrongful death lawsuit alleging that it was negligent in failing to investigate death threats that its employee had emailed to his family from...more
Last Thursday, the New York Court of Appeals ruled in a 4-3 decision that a man may bring a negligence claim against a drug testing company for a false positive drug test.
At the time of the disputed test results, Eric...more
Lawyers often say that bad facts lead to bad law. Cases with outrageous fact patterns can drive a judge or jury to stretch the law and make outcome-based decisions in order to provide relief to a sympathetic party. Lawyers...more
In October 2012, we told you about the case of Eagle v. Edcomm, Inc. pertaining to whether an employee’s LinkedIn account belongs to the employee (Linda Eagle) or to her employer (Edcomm). At that time, the United States...more
In R. v. Cole, 2012 SCC 53 (October 19, 2012), the Supreme Court of Canada held that employees may reasonably expect privacy in the information stored on their work-issued computers — at least where personal use is permitted...more
Law and Business
Between James Bond’s brand of espionage and the emotional reaction when someone trained and trusted leaves and goes to work in competition lie most fact situations that give rise to trade secret...more
Time and time again, this blog has outlined the ongoing debate in the courts over whether the federal Computer Fraud & Abuse Act (“CFAA”) applies in the context of departing employees. Namely, federal courts differ over...more
On October 29, 2010, Justice James A. Yates refused to dismiss tort and defamation claims, among other claims, against the authors and the publisher of a book about Alcor Life Extension Foundation, Inc. (“Alcor”). Alcor Life...more
In This Issue: 2 Facebook Sued for Unauthorized Use of Minors’ Names and Likenesses; 2 YouTube Faces Damages and Injunction in Germany for Infringing User Uploads; 3 California Criminalizes Malicious Online Impersonation; 3...more
Geotechnical engineers at Loughborough University in England are working on a new way to prevent catastrophic soil collapses on construction sites as well as landslides that occur naturally but without warning. The sound...more
In this age of instant information gratification, it is easy to forget that the multitude of electronic devices we use for communication and entertainment (cell phones, mp3 players, and other multimedia devices) can have a...more
Ever-increasing connectivity has blurred the distinction between personal time and
company time. Electronic communication has become routine at work and at home.
For some it is now required. Employment and tort law have not...more
Article discusses discoverability of information posted on social networking web sites, including Facebook and MySpace, and analyzes how discovery disputes and potential admissibility at trial of this information may be...more
Find a Science, Computers & Technology Author »
Back to Top