Science, Computers & Technology Privacy Intellectual Property

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

Cardinals Hacking Update

St. Louis Cardinals owner Bill DeWitt, Jr. threw staff members under the bus following the breaking story last week that the Cardinals have been hacking into the Astros’ database for up to three years. According to DeWitt, a...more

Strategies For Businesses Protecting Electronic Data Within California: Part Three

In Parts One and Two of this e-alert series, we discussed the federal Computer Fraud And Abuse Act ("CFAA") and its California corollary the California Computer Data Access And Fraud Act (CDAFA). In Part Three, we provide a...more

The Internet of Things

In this Presentation: - Internet of Things - definition - But what is it all about? - But not just that... - The IoT market in figures... - Beecham Research - view of the World - The Connected...more

Intellectual Property and Technology News (North America), Issue 26, Q2 2015

The Internet of Things: EU vs US guidance - Reports from the European Commission and the FTC on privacy and security best practices for IoT - key issues and highlights... Are IPRs impacting the pharmaceutical...more

[Webinar] Digital Health Update: Focus on Health Tech Startups - June 23, 1:00 CDT

Health care startups are expected to attract billions in venture capital in the next few years. Despite the pace and excitement this surge of investment creates, these next-wave digital disruptors need to keep three legal...more

[Webinar] Cyber Threats and the Crown Jewels: Practical Steps to Protect Corporate Assets - June 24, 9 a.m. EDT

Information security is a growing concern for companies and legal teams around the world. The rising tide of cybersecurity issues and insider threats pose great risks to a company’s crown jewels: its intellectual property....more

The New Space Race: Protecting Trade Secrets on the Final Frontier

Space: The final frontier. For millennia, people have wanted to explore the great unknown of outer space, and series like Star Trek and Star Wars continue to our fuel our fantasies about what lies beyond our stratosphere. ...more

Advertising Law - May 2015 #4

SPECIAL FOCUS: The Impact of the Supreme Court’s Octane Fitness Decision on Lanham Act Litigation - For the second time in recent years, a Supreme Court decision in a patent case is having a major impact on Lanham Act...more

Hackers seek to access intellectual property assets of higher educational institutions

College and universities, like many other businesses and organizations, defend against millions of cyberattacks each day. Most recently, Penn State’s College of Engineering discovered a multi-year long cyberattack seeking...more

Snowden Strikes Back: Mass Collection of Telephony Metadata Struck Down By the Second Circuit

As post-Snowden America well knows, for some years now the National Security Agency (NSA) has been collecting bulk telephone metadata under the authority of Section 215 of the PATRIOT Act and aggregating it into data banks...more

Entertainment Industry Agent Rightscorp Seeks Personally Identifiable Information of Thousands of Internet Users

In the past two years, Rightscorp, Inc. has sought the identity of thousands of Internet subscribers across the country, in order to obtain settlements for alleged violations of its clients’ copyrights. ...more

Sports, Media and Entertainment Intelligence - May 2015 (Global)

COPYRIGHT - Belgium: Even a world famous painter needs to respect copyright - It has been held that the well-known Belgian painter Luc Tuymans breached professional photographer Katrijn Van Giel's copyright through his...more

DOJ Guidance for Victims of Cybercrime: The Dos and Do Nots of Cyber Preparedness

On April 29, 2015, the Cybersecurity Unit in the Computer Crime and Intellectual Property Section (CCIPS) of the U.S. Department of Justice released a best practices document (Document) for victims of cyber incidents. The...more

Emergence of Live Streaming Apps Brings Up Copyright, Privacy, Legal Concerns

The big fight may be over, but the implications of Mayweather vs. Pacquiao with respect to real-time, one-to-many streaming of video through apps like Meerkat and Periscope are still rippling through the media industry. In...more

BakerHostetler's Tanya Forsheit Discusses Cloud Computing [Video]

Tanya Forsheit, Partner with BakerHostetler's Privacy and Data Protection team discusses cloud computing and privacy issues....more

A Modern Game of Hide and Go Seek? Some Lessons Learned Following Sony and Other Widely-Publicized Data Breaches

While the recent hack of Sony was prominent news because of the celebrity ties and potential geo-political implications, other prominent cyber-attacks over the last few months are enough to give any company pause. The January...more

Australia: Dallas Buyers Club LLC obtains customer identities from ISPs in landmark piracy ruling

On Tuesday 7 April 2015, a single Federal Court Judge ordered six internet service providers (ISPs) to hand over the names and identities corresponding to approximately 4,700 unique IP addresses, which have allegedly...more

Intellectual Property and Technology News

In This Issue: - Biosimilars In The US - Introducing Cybertrak - Free and Open Source Compliance: Action Steps - Falling Prices At The Pump - Put A Premium On Energy IP - Supreme Court Corner - Excerpt...more

Executive Order Creates Cybersecurity Sanctions Framework

On April 1, 2015, President Obama issued an Executive Order authorizing the imposition of sanctions against designated individuals or entities found to be engaged in malicious cyber activity, including various forms of...more

POTUS Declares Cybercrime a National Emergency, Announces New Penalties for Trade Secrets Theft

Declaring cybercrime a “national emergency,” President Obama today empowered Treasury to freeze assets that are the fruits of cybercrime, according to an Executive Order issued this afternoon. The agency can block money or...more

China’s New Cybersecurity Policies: Is the Price of Compliance Worth the Risk of Disclosure?

Tensions recently escalated in the United States and China’s ongoing exchange over online security and technology policies, as China adopted the first in a series of policies it previously approved at the end of last year. ...more

FCC Applies Section 222 to BIAS Providers, but Delays Specialized Rules

The Order does not forbear from applying Section 222 of the Act to broadband Internet access service (BIAS) providers. It did, however, forbear from applying its existing rules implementing Section 222, in recognition that...more

Business Litigation Report - February 2015

- Firm News: - Main Article: ..Traversing the Breach: Why You Need to Prepare for Data Breaches and How to Do It - Noted With Interest: ..Direct Purchasers and End Payors Accuse Brand Pharma of...more

The Top 4 Questions to Ask in Due Diligence to Maximize & Protect IP Value

In today’s economy, few companies are wholly self-contained. Across industries, companies have suppliers, distributors and other partners to provide materials, products, market access, and/or data. For any company, the task...more

221 Results
|
View per page
Page: of 9

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×