Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
Emerging Strategies for Protecting Global IP Rights
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
Cyber-attacks on U.S. companies have increased over recent years resulting in significant costs to companies. According to surveys, U.S. companies have experienced a 42% increase between 2011 and 2012 in the number of...more
Biotech IPO market activity has recently returned to levels not seen since before the financial crisis. This has been brought about in part by the accommodations afforded issuers under the Jumpstart Our Business Startup Act...more
Welcome to the inaugural issue of Orrick Technology IPO Insights, a quarterly publication highlighting trends in U.S. information technology company IPOs. We isolate technology companies in order to analyze and present...more
Community Health Systems, Inc. (“CHS”) reported yesterday that the information of approximately 4.5 million individuals has been affected by a Chinese cyber-attack. CHS and its affiliates own and operate 206 hospitals in 29...more
Within several months of Securities and Exchange Commission Chair Mary Jo White’s announcement in late 2013 of a commitment to improving the SEC’s trial readiness, the Commission suffered a number of losses in federal...more
The Recent Increase In Focus on Privacy Issues -
Privacy issues have been the focus of many state efforts over the past few years. However, the SEC has increased their focus tremendously over the past few months (see...more
August 7, 2014 (Mimesis Law) -- Mark Stevens, partner at Fenwick & West, talks with Kent Zimmermann about some of the reasons why the percentage increases that the firm achieved in key financial metrics reported by The...more
As we’ve previously reported, cyber risks are an increasingly common risk facing businesses of all kinds. In a recent speech given at the New York Stock Exchange, SEC Commissioner Luis A. Aguilar emphasized that cybersecurity...more
In This Presentation:
- Data Breaches: By the numbers
- Costs of Data Breach
- Cybersecurity Considerations in Business Transactions
- Cybersecurity in M&A Transactions
- Cybersecurity –...more
FINCEN PROPOSES CUSTOMER DUE DILIGENCE RULE -
On July 30, FinCEN released a proposed rule that would amend BSA regulations to clarify and add customer due diligence (CDD) obligations for banks and other financial...more
The fourth anniversary of the Dodd-Frank Act has prompted renewed discussion over the effectiveness of the legislation. Legislators continue their debate over the Financial Stability Oversight Committee and the Volcker Rule....more
The year 2014 is on track to be the most active IPO market in the United States since 2000, with the mid-year total number of IPOs topping last year’s mid-year total by more than 60%. There were 222 US IPOs in 2013, with a...more
Following a record year for data breach incidents — with eight breaches exposing over 10 million identities — the U.S. Securities and Exchange Commission (SEC) is closely scrutinizing how those breaches were handled. Multiple...more
PricewaterhouseCoopers LLP (PwC) and Investor Responsibility Research Center Institute (IRRCi) have weighed in on the cybersecurity issue from an investor’s point of view in their paper called What investors need to know...more
Data security breaches—no industry is immune. These hackers can phish, spoof, skim, packet sniff, and key log their way into your system. Once a hacker successfully hacks into a corporation’s server, the breach will go...more
“Given the significant cyber-attacks that are occurring with disturbing frequency, and the mounting evidence that companies of all shapes and sizes are increasingly under a constant threat of potentially disastrous...more
The first half of 2014 has seen the hottest IPO market in 14 years – 133 IPOs priced, raising more than $30 billion in proceeds. This is already greater than the total number of IPOs priced during 2011 and 2012. The second...more
In the past few months, we have seen an increasing number of hostile or unsolicited M&A bids where boards of directors of target companies have resisted bidders’ advances. Traditionally, the board-friendly Delaware approach,...more
Keker & Van Nest attorneys Michael Celio and Cody Harris have secured a complete vindication for Intuitive Surgical Inc., a leading manufacturer of cutting-edge robotic surgery devices, from an aggressive securities class...more
It seems scarcely a week goes by without a headline blaring news of a major cybersecurity breach. And with ongoing revelations about the data-tracking activities of the National Security Agency, the public isn’t growing less...more
Besides clarifying disclosure requirements,the agency is prompting companies to take proactive steps.
Cybersecurity threats have reached a point where they cannot go ignored by any government agency, even the U.S....more
In this issue:
- SEC v. Citigroup: A New Standard for Reviewing Consent Decrees
- Credit Unions Beware – the TARP Watchdog Is Ready to Pounce
- Canada's New Anti-Spam Legislation: What Does It Mean for...more
I was once interviewed live on Bloomberg radio at some god-awful hour in the morning, following a 30% drop in the share price of Ely Lily resulting from a negative decision in a patent case by the U.S. Court of Appeals in the...more
Data breaches may be nothing new, but they are certainly evolving into bigger and more notorious infractions. While the data breaches of yesterday may have involved accidental disclosure or disgruntled former employees, the...more
Cyber security, corruption and unethical behavior pose significant risks for business enterprises, according to a new survey by EY titled “Overcoming Compliance Fatigue’. At the same time business organizations may be...more
Find a Science, Computers & Technology Author »
Back to Top