Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
Unprecedented Global ATM Heist Presents a Number of Lessons for Companies
With Radical Changes, Law Firms Can Beat Recession
[Legal Perspective] When Is It NOT Okay to Delete Your Social Media Account?
Tips for Mobile App Privacy Compliance
Video Sharing App Vine Hit with Takedown Notice from Prince
Can You Patent Human Genes? ACLU Says No
Cybersecurity Lobbying Booming: How Law Firms Can Profit
Social Media Law Report - Who Owns Your LinkedIn Account, FTC Guidance on Social Ads, More...
Your Employer Doesn’t Own Your LinkedIn Account, and They Shouldn’t Try To
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
Unlocking Your Cell Phone Is Now Illegal, but Not for Long
Safeguards against Data Security Breaches (Part One)
The Growing Role of Social Media in Litigation and How to Prepare for It
Safeguards against Data Security Breaches (Part Two)
How to Protect Your Company From Hackers
How Facebook's Lawyers Price Their Services
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
Two Key Elements Every Social Media Policy Should Include
Jeff Ifrah on the Historic Legalization of Online Gaming in New Jersey
How to Respond to President Obama's Cybersecurity Executive Order
Here’s another sign of the rising urgency of trade secret theft as a national security issue: the Chairman of the Senate Armed Services Committee wants the head of the nation’s intelligence bureaucracy to track countries that...more
There’s been a lot of news lately about the Chinese military allegedly launching cyber attacks to steal U.S. trade secrets. This has gotten people riled up, including the President of the United States, who issued a 5-point...more
A 92-question and answer guide is available from the Federal Trade Commission (FTC) to help businesses and parents understand the new rule for the Children’s Online Privacy Protection Act (COPPA), which go into effect July 1,...more
On February 12, 2013, President Obama signed an Executive Order (“Order”) that outlined a voluntary cybersecurity framework (“Framework”) designed to help protect the nation’s critical infrastructure, which is generally...more
In this issue:
- Cookies, Clouds and Other Challenges – Retrospect and Prospect in Data Protection
- Employee Data Protection – What’s Down the Road?
- German Federal Supreme Court Decides Another...more
With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more
?Are you looking to guard your company's “secret sauce?” Fenwick’s Robert Brownstone says companies should safeguard their data by limiting the number of employees with access to certain confidential information. Following up...more
The strategy announced on February 20, 2013, should serve as both a wake-up call from the government and an offer of assistance. Given the losses that can arise from competitors’ purposeful theft of trade secrets, entities...more
A personal injury law firm can buy search terms using the names of a competing law firm’s partners without violating Wisconsin’s privacy laws because the use of the names is “non-visible,” an appellate court found.
The Obama Administration’s recent “Strategy on Mitigating the Theft of U.S. Trade Secrets” makes clear the importance for businesses to be aware of and understand the international threats to their intellectual property, the...more
Last month the Vermont Legislature kicked off its 2013-2014 Legislative Session, and already a couple of bills have our attention here at the IP Stone....more
Every day the headlines report another Fortune 500 company suffering a hacking incident. For companies, the hack itself creates substantial risks of economic devastation caused by the theft of valuable trade secrets. Add to...more
News broke this week about significant cybersecurity breaches at many U.S. corporations that raises the possibility of a new wave of SEC enforcement actions, class actions, and derivative lawsuits. A front page New York Times...more
Mobile devices made by HTC America, Inc. contain serious security flaws, which allow the phones to send their own text messages, send personally identifiable information to third parties, and even activate the microphone to...more
We often talk to companies who believe they are an unlikely target for hackers because they do not have financial account information, Social Security numbers, or medical information. However, personal information is not the...more
The White House warned yesterday that hackers and “hacktivist” groups have the intent and capability to target U.S. companies and steal confidential data. A new executive strategy explains that the threat of corporate...more
A weekly wrap up of interesting news about virtual worlds, virtual goods and other social media.
In This Issue:
- Path Inc. to Settle Charges Over Collecting Kids' Data
- Feds Urge App Makers, Mobile Operating...more
Originally published in SC Bar's Employment and Labor Law Newsletter: Winter 2013 on February 15, 2013
In recent months, both the Fourth Circuit Court of Appeals, which has jurisdiction over federal cases in North and...more
Mobile apps should disclose in easy-to-understand language what data they collect and how the data is used, and they should consider a do-not-track mechanism, the Federal Trade Commission (FTC) recommended in a staff report...more
In this issue of Socially Aware, our Burton Award-winning guide to the law and business of social media, we explore the challenges that arise when employers and employees battle over work-related social media accounts; we...more
The law of geolocational privacy continued to evolve in 2012 even though the Supreme Court sidestepped the issue in a potential landmark case.
Despite the lack of clarity from the Supreme Court, there will be more...more
Today’s cars are computers on wheels, open to hackers who can infect cars with malware and take control of a car’s speed, braking, and other vital systems. Whether today’s laws are applicable to these cyber-threats was the...more
On December 28, 2012, President Obama signed the Theft of Trade Secrets Clarification Act of 2012 (“the Act”) into law. The Act makes clear that the Economic Espionage Act (EEA) applies to trade secrets related to products...more
The 112th Congress saw a lot of activity focused on new and changing technologies, but few legislative breakthroughs. Early in the year, there was significant activity around intellectual property and online piracy issues,...more
The proper jurisdiction for suing someone for engaging in computer fraud from a foreign country, directed at a company in the United States, is the place where the wrongfully accessed computer server is located if the...more
JD Supra gets your content noticed, increases your visibility and makes your marketing efforts hassle free...
Learn More or Schedule a demo