After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
..We can work it out. Actress Katherine Heigl and the Duane Reade chain of drugstores have settled a $6 million federal suit filed by Heigl this past April in the U.S. District Court for the Southern District of New York. ...more
A Houston area woman has sued Facebook asking for $123 million because Facebook was slow to take down a fake a profile created by her ex-boyfriend with pornographic images.
The plaintiff sued Facebook and the...more
An Illinois Appellate Court recently held that an employer must defend against a wrongful death lawsuit alleging that it was negligent in failing to investigate death threats that its employee had emailed to his family from...more
Can there be a “Right to Be Forgotten” Law in the U.S.? The “right to be forgotten” in the online sphere has recently been protected by the European Court of Justice (ECJ), the highest court in the European Union. According...more
Unmanned aerial systems (UAS), or drones, are slowly being integrated into U.S. and international airspace systems. Despite current legal and regulatory limitations on their use for civilian purposes, governmental and...more
The Rise of Cyber Attacks -
On October 3, 2013, Adobe Systems Inc., the computer software giant responsible for staple software products such as Adobe Acrobat and Photoshop, announced that its security team had...more
9th Circuit Pulls the Shades Down on “Shine the Light” Lawsuit -
The Ninth U.S. Circuit Court of Appeals recently rejected an appeal of a district court’s dismissal of a claim made under California’s “Shine the Light,”...more
There has not been much activity on the blog because we have been engaged in a long copyright and misappropriation of trade secrets trial. So, we share with you some of the articles we have been reading, but just haven’t had...more
If only one of Target, Snapchat, Facebook, Twitter, Adobe, and so on and so forth, had suffered a serious data breach within the last few months that would be sufficiently troubling. Yet data breaches have become so...more
On January 14, 2014, the Connecticut Appellate Court issued a decision in Recall Total Information Management, Inc., et al. v Federal Insurance Company, et al., __ Conn. App. ___, 2014 WL 43529 (Conn. App. Ct. Jan 14, 2014),...more
Introducing TCPA Connect -
On October 16, the FCC's updated Telephone Consumer Protection Act (TCPA) regulations finally took effect. The new rules pose significant challenges for companies seeking to communicate with...more
Lawyers often say that bad facts lead to bad law. Cases with outrageous fact patterns can drive a judge or jury to stretch the law and make outcome-based decisions in order to provide relief to a sympathetic party. Lawyers...more
Julia Child Foundation Whips Up Lawsuit Against Williams-Sonoma -
Williams-Sonoma illegally used the name and likeness of the late Julia Child more than 100 times in advertising, marketing, and promotional materials...more
How can a website operator lose the broad immunity for liability associated with user-generated content conferred by Section 230 of the Communications Decency Act (CDA)?
Section 230 has been consistently interpreted by...more
While the second special session is winding down (thank goodness), we will take a look at a couple more new laws impacting online media and technology in Texas. ...more
Originally published in Privacy & Security Law on 03/18/2013.
There is continued focus in China on privacy and data security issues. China still has no omnibus law, but it has promulgated some sector-specific...more
In October 2012, we told you about the case of Eagle v. Edcomm, Inc. pertaining to whether an employee’s LinkedIn account belongs to the employee (Linda Eagle) or to her employer (Edcomm). At that time, the United States...more
A recent Fairfax County defamation case involving a consumer’s scathing postings against a contractor on Yelp and Angie’s List raises the issue as to who can be held liable for postings made by third parties.
In R. v. Cole, 2012 SCC 53 (October 19, 2012), the Supreme Court of Canada held that employees may reasonably expect privacy in the information stored on their work-issued computers — at least where personal use is permitted...more
On September 27, 2012, the Supreme Court of Canada released its decision in AB v Bragg Communications Inc., an important constitutional case at the intersection of defamation law and children’s rights.
Here’s the scenario: You’re a well-known athlete. You’ve worked hard to become the best in your game. You wake up one morning, grab your coffee, sit down at your computer and start to read the morning’s news. Much to your...more
China does not currently have a comprehensive legal framework to regulate the use and disclosure of personal data or a national level law that delineates how a company can legally collect, process and retain personal data....more
Retailers are under attack from a new wave of low-tech, hightech criminals. These second-generation cyber-criminals are not necessarily the genius-hacker-types popularized by Hollywood in tag lines such as “Log on. Hack in....more
Ever-increasing connectivity has blurred the distinction between personal time and
company time. Electronic communication has become routine at work and at home.
For some it is now required. Employment and tort law have not...more
Article discusses discoverability of information posted on social networking web sites, including Facebook and MySpace, and analyzes how discovery disputes and potential admissibility at trial of this information may be...more
Find a Science, Computers & Technology Author »
Back to Top