What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Generally speaking, publicly traded homebuilders and other public companies must disclose material information in their SEC filings. “Information is considered material if there is a substantial likelihood that a reasonable...more
On November 20, 2013, the Minnesota Supreme Court issued its long-awaited decision in the case of Helmberger v. Johnson Controls, Inc. The Court ruled in favor of Johnson Controls, Inc. (JCI) and its subcontractor,...more
Scott & Scott, LLP says health care data breaches reported in 2013 highlight the need for more diligence and vigilance to combat the growing problem. With fines increasing as a result of HIPAA new omnibus rule that took...more
In a case that we have written about, People’s United Bank of Maine has agreed to pay about $ 390,000 to settle a claim that its security practices allowed unauthorized persons to withdraw funds from a construction company’s...more
Find a Science, Computers & Technology Author »
Back to Top