Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Cyber security, corruption and unethical behavior pose significant risks for business enterprises, according to a new survey by EY titled “Overcoming Compliance Fatigue’. At the same time business organizations may be...more
A recent case contains some salutary lessons for service providers concerning liability for fraudulent use of their services. It appears that unless the contract has clear terms to the contrary then the service provider, not...more
Hot on the heels of our recently released publication, ‘Cyber risks and the impact on company directors’, it has been revealed that a shareholder has commenced a derivative action in the district of New Jersey (USA) against...more
All this week, we are featuring a series “Cyber Risks – Director Liability and Potential Gaps in D&O Coverage”
Part 2 of 5: Why Directors Should Be Concerned...more
. . . a data breach class action.
Hackers and plaintiffs’ lawyers could combine to make 2014 the year when class actions concerning theft of sensitive information proliferate. On this 11th Day of Privacy, we look...more
Key Takeaway: Companies that follow these 3 steps can use the Computer Fraud and Abuse Act as a tool to combat the misuse of their computers (and information) by (1) actively monitoring for misuses, (2) taking reasonable...more
In Ignat v. Yum! Brands (March 18, 2013) an employee claimed a violation of her right of privacy when her supervisor publicly disclosed to coworkers her bipolar condition. The trial court granted summary judgment to the...more
With the rise of BaaS (or Backend as a service) platforms, it is easier than ever to create a mobile app on the fly. But Fenwick privacy co-chair Tyler Newby advises that companies should be aware of some important privacy...more
With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more
Cybersecurity may be the SEC’s newest area for enforcement actions. While the SEC first released Disclosure Guidance concerning cybersecurity in 2011, the recent media attention surrounding significant cybersecurity breaches...more
A personal injury law firm can buy search terms using the names of a competing law firm’s partners without violating Wisconsin’s privacy laws because the use of the names is “non-visible,” an appellate court found.
The proper jurisdiction for suing someone for engaging in computer fraud from a foreign country, directed at a company in the United States, is the place where the wrongfully accessed computer server is located if the...more
The Federal Trade Commission (FTC) issued a report in March 2012 setting forth best practices for businesses to protect the privacy of American consumers and give them greater control over the collection and use of their...more
The New York Times recently reported that the UK telephone hacking scandal could result in News Corp. and its executives being charged in the United States with criminal violations of the Foreign Corrupt Practices Act, Title...more
Three recent Computer Fraud and Abuse Act (“CFAA”) cases decided over the last couple of months are worth looking at because they show the following points, respectively: (1) the CFAA in its current form does not give...more
More often than not when a management law firm informs its clients of recent case developments, the news is not good. This is an exception.
The U.S. Court of Appeals for the 9th Circuit recently decided a case which offers...more
Outside the arena of unionized shops, the employee still has the 1st Amendment right of freedom of speech; and the employer still has the privilege under the employment-at-will doctrine to fire the employee for any lawful...more
A French bill “to better guarantee the right to privacy in the digital age” has implemented the European Directive 2009/136/EC by requiring the data controller to inform the “Data Protection Correspondent” (a person within an...more
La proposition de loi française “visant à mieux garantir le droit à la vie privée à l’heure du numérique” transpose la Directive 2009/136/CE en obligeant les responsables de traitements de données à caractère personnel...more
A central aspect of every cloud service contract is the security of data processing. It is therefore important, if only for liability reasons, that responsibility for specific security measures be clearly assigned. This can...more
The Computer Fraud and Abuse Act (“CFAA”) is the omnibus federal computer crime statute outlawing theft and destruction of data, hacking, use of viruses, theft of passwords and extortionate threats to damage computers. 18...more
Canadian Industry Minister Tony Clement introduced a bill on May 25, the Safeguarding Canadian’s Personal Information Act (C-29), which would amend Canada’s national privacy legislation, the Personal Information and...more
IN THIS ISSUE:
*Thomas C. Morrison, Prominent False Advertising, Lanham Act Litigator Joins Manatt in New York
*Manatt Attorneys Take Center Stage at Leading Industry Events
*ISP Wide Open West Charged With Installing...more
The pursuit of trademark infringers on the Internet, specifically the use of a party’s trademark by an unauthorized second party, poses problems that are unique in trademark infringement law. How do you uncover who is the...more
The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030, was enacted in 1984 as a criminal statute, but was subsequently amended in the 1990s to allow for private causes of action for damage to a “protected computer.” As...more
Find a Science, Computers & Technology Author »
Back to Top