Science, Computers & Technology Privacy Intellectual Property

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Top Considerations When Building BYOD Policies

In a recent article, my Kroll Ontrack colleague Vikas Pall wrote about the growing concerns over bring your own device (BYOD) policies. Today’s employees integrate their personal and professional lives, and the use of...more

FDA Regulatory and Compliance Monthly Recap — January 2016

OPDP enforcement reaches record low in 2015 as drugmakers face uncertainty in digital marketing - Enforcement by the OPDP has fallen notably since 2010. The decline has been attributed, in part, to the agency's slow...more

European Life Sciences Review: Issue 1

Welcome to the first issue of our EU Life Sciences Review . It is produced by our life sciences lawyers in London, Brussels, Frankfurt, Moscow, and Paris and covers some of the most critical developments in the pharmaceutical...more

Twitter, the Drone Selfie and Charting a Course for New Technology

A recently published patent application filed by Twitter provides a possible glimpse into the future of social media and selfies—and it’s a future arriving on the wings of that poster child of modern technology, the unmanned...more

Baseball Executive Caught Stealing, Pleads Guilty To Violation Of Computer Fraud And Abuse Act

A scandal in America's Pastime has culminated with a baseball executive, Christopher Correa, pleading guilty on January 8, 2016 to violating the Computer Fraud and Abuse Act ("CFAA"), 18 U.S.C. § 1030, et seq. The guilty plea...more

The Perils of BYOD Policies

Over the holidays, many employees are out of the office on family vacations or otherwise using their time off. Many employers rely on employees' use of their own personal electronic devices to keep up with what is going on in...more

[Webinar] Safeguarding Trade Secrets and Confidential Information: Top Ways to Mitigate Risks - Jan. 26, 11:00am EST

Did you know that insiders are most likely to steal confidential corporate information? And according to PwC’s Global State of Information Security Survey (2015): - As many as 71% of data security compromises go...more

2015: Our Greatest Hits

Last year, entrepreneurs, companies and courts grappled with questions over content owners’ rights with respect to livestreaming, Yelp reviewers’ anonymity expectations, bankruptcy creditors’ access to business’ Facebook and...more

Also In the News - Data, Privacy, & Security Practice Report - December 2015 #2

Harmonizing Cybersecurity And Trade Secret Protection – Many companies are investing heavily in cybersecurity and implementing a framework such as the Cybersecurity Framework from the National Institute of Standards and...more

Do Cyber Insurers Care about Information Governance?

As we welcome in 2016, awareness of the variety of information-related risks confronting today’s enterprises, and the availability of insurance covering those risks, is at an all-time high. High-profile data breaches caused...more

The TPP Agreement and Privacy

The Trans-Pacific Partnership Agreement (the “TPP Agreement”) is a regional trade and investment agreement negotiated by 12 Pacific Rim countries representing 40 percent of the global economy. Canada, the United States,...more

Update on recent cyber prosecutions/stings

The feds keep chipping away at those thieves and hackers and we are pleased to showcase the recent results of their hard work. Computer Hacking and Sexual Extortion - On December 9, 2015, the U.S. Attorney’s Office...more

Obscured by the Cloud? Advanced Instructional Systems and the Scourge of Online IP Theft

The conveniences of cloud computing are many, but so are the dangers of doing business in the cloud. For businesses whose intellectual property is accessible in the cloud, there is the constant threat that that intellectual...more

The New Compliance Challenge: CyberSecurity

Protecting Confidential Assets from Cyber Threats and Malicious Insiders - Data security, privacy and confidentiality top the list of risks that compliance officers view as most challenging in the coming five years,...more

Life Sciences Spotlight - Asia Pacific - Issue 6, 2015

Trends and developments in cyber security and data protection: Why pharma and life sciences companies should take action. Pharmaceutical and life sciences companies are increasingly the target of cyber-attacks and...more

G20 Nations Reach Economic Cyber-Espionage Pledge

On November 16, 2015, the leaders of the “Group of 20” (“G20”) – the world’s richest and most powerful nations – reached an agreement not to conduct economic cyber-espionage. The agreement, reached during the G20’s...more

Cyber Threats: Can you Answer These Questions from the Board?

Discussions about cyber threats have moved from ‘server rooms’ to ‘Board rooms.’ For good reason – hacks and breaches of corporate data and trade secrets can seriously compromise a company and spark significant reputational...more

Advertising Law - November 2015 #4

Sharing Is Caring? New Report Documents Apps Sharing User Data at High Rates - A new report has revealed that Apple and Android apps share information with third parties at high rates. Testing 55 of the most popular...more

Labor & Employment E-Note - October 2015

Marcel Debruge and Meryl Cowan were featured in Practical Law's Q&A on workers' compensation law for employers in Alabama. The Q&A addresses Alabama laws requiring workers' compensation coverage, including the benefits...more

Employment Law Update - November 2015

Coming Changes to Overtime Exemptions Rules Will Have Serious Impact on Employers - The Fair Labor Standards Act ("FLSA") requires that employees be paid minimum wage and overtime pay at a rate of not less than one and...more

Attention UGC Marketers—Are Your Permissions in Order?

Brand companies have come to view user-generated content as often one of the most effective and authentic ways to advertise their products or services. This is known as “user-generated content marketing.” For example, with...more

Final TPP Language on Trade Secret Protection Disclosed

On October 5, 2015, years of protracted negotiations of the Trans-Pacific Partnership Agreement (“TPP”) concluded. The TPP is a proposed trade agreement between 12 Pacific Rim nations that lowers trade barriers such as...more

Facebook’s “Copyright” Post - The Sound and the Fury

Users of Facebook no doubt have seen at least some of their friends post the “copyright” update. In brief, the post states “I hereby declare that my copyright is attached to all of my personal details,” including photos,...more

Trans-Pacific Partnership Agreement Features Key Developments in Intellectual Property and Information Technology

On October 5, the 12 Trans-Pacific Partnership (“TPP”) countries announced that they had resolved all remaining issues and reached a final agreement on the long-anticipated regional free-trade agreement. As King & Spalding...more

U.S., China Announce Cybersecurity Agreement During Xi Jiping’s Visit

Chinese President Xi Jinping made his first state visit to the United States last week, and his itinerary included meetings with U.S. technology company leaders as well as President Barack Obama. Not surprisingly, his hosts...more

259 Results
|
View per page
Page: of 11

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×