Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
For years now lawyers and law firms providing professional services to health care providers or health insurance plans should have had in place essential safeguards to meet the responsibilities and requirements as business...more
My bank recently sent me a document with “Techniques for creating strong passwords.” Reading through it my first thought was, “This would be great information for my colleagues.” Court reporters protect private, sensitive...more
Law firms do not hold special immunity from the threat of cybercriminals. In fact, law firms should be extra vigilant, considering the breadth of sensitive client information they often possess regarding corporate...more
In the last few months, numerous cases involving Facebook have resulted in amusing rulings that we would be remiss to ignore. On deck for this blog post we have three good ones...more
Why People are Careless about Internet Privacy -
If you are like me, you have probably wondered why people choose to share so much about themselves and their families on Facebook. Why do people treat the social media...more
Moving data to the cloud has been the critical data security challenge confronting organizations in the past few years.
With the cloud transition well underway, the spotlight has turned to securing end-user devices like...more
"Lawyers in the Cloud" explains the cloud storage system, risks, and how to assess whether to use large private systems or public systems like DropBox. From the July/August 2012 Palm Beach Bar Bulletin....more
Things happen at places like the ABATechshow that make you feel like you are experiencing the future unfold right in the moment. Nothing like watching planes crash into the World Trade Center or the devastation of Japan’s...more
UK data protection has come of age with large fines levied for the first time and a well-publicised leak from a law firm. Is your law firm compliant with data protection standards?...more
It is time to talk about cloud computing and ethics. Yes, ethics. Historically, lawyers and technologists lived in different worlds. The lawyers were over here, and IT was over there. Here's the reality: Technology -...more
This manuscript was submitted as material for a Presidential CLE program at the 2010 ABA Annual Meeting. The panel discussion, hosted by the ABA Commission on Ethics 20/20, covered cloud computing and virtual law practice,...more
Web-based technologies are part of an exciting new frontier aimed at delivering efficient, accessible, and affordable products and services to their clients. The rapid advance of web- or cloud-based technologies has opened up...more
Beginning February 17, 2010,lawyers who represent clients in the healthcare industry face new statutory obligations to take affirmative steps to ensure the privacy of their clients’ patient information when it is transmitted...more
The shift from desktop- and server-based software to what is alternately referred to as “Software-as-a-Service” (SaaS) or “the cloud” is one of the most significant transitions to occur in computing in the last 20 years....more
Computer forensic techniques may be unfairly applied in order to tip the scales of justice in the direction of prosecution. Particular areas that are known to be problematic for defense experts include: erroneous allegations...more
In this document we aim to demystify the concept of Software-as-a-Service and educate attorneys on how to evaluate the suitability of available solutions for their practice.
Topics addressed include an overall description...more
Are you on Facebook? Have you tweaked your Facebook privacy settings to ensure that you keep your personal and professional lives separate? Read this article and learn the essential steps you can take in under 10 minutes to...more
"Electronic Surveillance amd Offshore Legal Communications" is a June 12, 2008 editorial essay about a declaratory judgment action filed the prior month, NMH v. Bush et al. (D.D.C. 2008). NMH v. Bush appears to many readers...more
A purported declaratory judgment action by a Maryland law firm which alleges that an LPO offerded to perform certain services in India at rates far below prices being charged in Maryland based, in part, on the work being done...more
Find a Science, Computers & Technology Author »
Back to Top