Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
If your selfie has fallen into the wrong hands, the following statutory acts and/or common law theories may provide some relief....more
In the era of Big Data, no ambitious business can afford to live without a strategy for the acquisition, protection and exploitation of the data upon which it depends. The laws enabling data to be protected and exploited are...more
Since our last edition, there has been a number of developments in the Life Sciences sector across the Asia Pacific region and we are pleased to be able to update you on these recent trends.
It is evident that the...more
In this issue:
- Apps and Data Privacy
– New Guidelines from the German DPAs New Developments in Cybersecurity Regulation
- Refer-a-Friend Functionality on the Internet – Federal Court underpins its...more
Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more
In the second video of a three-part series, Fenwick attorney Paul Smith talks about the growing anticipation surrounding this strong, conductive and flexible material.
Why the excitement? Simply put, graphene is easy. It’s...more
Employees are increasingly using their personal electronic devices, such as laptops, smartphones, and tablets, for work purposes. The trend, dubbed “Bring Your Own Device” or “BYOD,” has redefined what it means to “be at...more
The technology and life sciences communities alike have been raving about new "wonder material" graphene for the past year. From applications for wearable devices to the creation of lightweight, bendable televisions and...more
Data breaches may be nothing new, but they are certainly evolving into bigger and more notorious infractions. While the data breaches of yesterday may have involved accidental disclosure or disgruntled former employees, the...more
In this issue:
- The Early Bird Gets the Trademark: Don’t Delay Filing Intent-to-Use Applications
- Color Wars: Narrowing Color Claims in Trademark Rights
- It’s Good to Be Famous: TTAB Expands...more
Technology allows businesses around the world to easily communicate and access data, increasing both business opportunities and worker productivity. However, this same technology also makes corporate data more vulnerable to...more
The Uniform Trade Secrets Act, adopted by 47 states including Virginia, Maryland, and the District of Columbia, generally defines protectable trade secrets as information that derives independent economic value from not being...more
In what is the first case of its kind, the Justice Department has filed criminal charges against Chinese military officers for hacking U.S. Companies. Five Chinese military officers, all members of China’s Peoples’ Liberation...more
2013 will be remembered as a watershed year for trade secret protection in China.
In January 2013, China’s Amended Civil Procedure Law came into force, giving courts discretion to issue interlocutory injunctions (1)...more
The recent Federal Court of Canada decision in Voltage Pictures LLC v. John Doe and Jane Doe (2014 FC 161) has already received considerable attention for its approach to deterring so-called “copyright trolls”: plaintiffs...more
You are a device maker, an app or software developer, a potential investor, a healthcare provider, a healthcare payor or an insurer and you see opportunities in mobile health (mHealth). You have an idea for a revolutionary...more
Apps likely contain several elements of intellectual property. Protect copyrights, patents and trade secrets as you would in other software projects (employee and contractor agreements, copyright registrations, trademark...more
Employees who use personal smart phones, PDAs, tablets, laptops and other electronic devices to connect to the employer’s computer network are fast becoming more of a rule than an exception. Today’s employees are often...more
2013 likely will be considered a watershed period in the role of cybersecurity in corporate strategy and management. While there were few significant legislative developments, a marked increase in cybersecurity attacks...more
Although headlines have focused on foreign cyberattacks, plenty are U.S.-based—and can be remedied. Over the past year the national press has repeatedly reported on the vulnerability of our intellectual property to...more
Readers seem to have liked our post about the recent GAO report that summarized the U.S. data privacy debate. For those interested in Internet law and policy issues, there are plenty of other official reports that you can use...more
2013 was an incredibly active year for social media legal issues. Below are selected highlights on some of the more interesting legal issues that impacted social media, along with links to reference material relating to the...more
In the New Year, one of the trade secret trends we’re watching is the ongoing tension between a company’s interest in preserving its proprietary information and the public’s demand to know more about the goods or services it...more
The U.S. Department of Defense issued final rulemaking on November 18, 2013 that will require DOD contractors to protect from attack confidential technical information on their computer systems, and to report and cooperate...more
Scott & Scott, LLP attorney, Brian Von Hatten, lists some of the risks companies face when their workforce wants to bring their own devices to work....more
Find a Science, Computers & Technology Author »
Back to Top