What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Crowdnetic, a provider of technology and market data solutions to the global crowdfinance marketplace, has shared with us for publication data collected through their network of intermediaries....more
On Friday, September 19, 2014, a Chinese court found pharmaceutical giant GlaxoSmithKline guilty of bribing doctors and hospitals in order to increase sales of the company’s products in China. Among other things, the company...more
A strong market for initial public offerings has long been seen as a bellwether for good times in the broader market. When companies are going public, the perception is that investors, management teams and bankers have...more
Cyber-attacks on U.S. companies have increased over recent years resulting in significant costs to companies. According to surveys, U.S. companies have experienced a 42% increase between 2011 and 2012 in the number of...more
Biotech IPO market activity has recently returned to levels not seen since before the financial crisis. This has been brought about in part by the accommodations afforded issuers under the Jumpstart Our Business Startup Act...more
Welcome to the inaugural issue of Orrick Technology IPO Insights, a quarterly publication highlighting trends in U.S. information technology company IPOs. We isolate technology companies in order to analyze and present...more
Within several months of Securities and Exchange Commission Chair Mary Jo White’s announcement in late 2013 of a commitment to improving the SEC’s trial readiness, the Commission suffered a number of losses in federal...more
The Recent Increase In Focus on Privacy Issues -
Privacy issues have been the focus of many state efforts over the past few years. However, the SEC has increased their focus tremendously over the past few months (see...more
As we’ve previously reported, cyber risks are an increasingly common risk facing businesses of all kinds. In a recent speech given at the New York Stock Exchange, SEC Commissioner Luis A. Aguilar emphasized that cybersecurity...more
In This Presentation:
- Data Breaches: By the numbers
- Costs of Data Breach
- Cybersecurity Considerations in Business Transactions
- Cybersecurity in M&A Transactions
- Cybersecurity –...more
The fourth anniversary of the Dodd-Frank Act has prompted renewed discussion over the effectiveness of the legislation. Legislators continue their debate over the Financial Stability Oversight Committee and the Volcker Rule....more
The year 2014 is on track to be the most active IPO market in the United States since 2000, with the mid-year total number of IPOs topping last year’s mid-year total by more than 60%. There were 222 US IPOs in 2013, with a...more
Following a record year for data breach incidents — with eight breaches exposing over 10 million identities — the U.S. Securities and Exchange Commission (SEC) is closely scrutinizing how those breaches were handled. Multiple...more
Data security breaches—no industry is immune. These hackers can phish, spoof, skim, packet sniff, and key log their way into your system. Once a hacker successfully hacks into a corporation’s server, the breach will go...more
“Given the significant cyber-attacks that are occurring with disturbing frequency, and the mounting evidence that companies of all shapes and sizes are increasingly under a constant threat of potentially disastrous...more
The first half of 2014 has seen the hottest IPO market in 14 years – 133 IPOs priced, raising more than $30 billion in proceeds. This is already greater than the total number of IPOs priced during 2011 and 2012. The second...more
In the past few months, we have seen an increasing number of hostile or unsolicited M&A bids where boards of directors of target companies have resisted bidders’ advances. Traditionally, the board-friendly Delaware approach,...more
It seems scarcely a week goes by without a headline blaring news of a major cybersecurity breach. And with ongoing revelations about the data-tracking activities of the National Security Agency, the public isn’t growing less...more
Besides clarifying disclosure requirements,the agency is prompting companies to take proactive steps.
Cybersecurity threats have reached a point where they cannot go ignored by any government agency, even the U.S....more
Data breaches may be nothing new, but they are certainly evolving into bigger and more notorious infractions. While the data breaches of yesterday may have involved accidental disclosure or disgruntled former employees, the...more
Cyber security, corruption and unethical behavior pose significant risks for business enterprises, according to a new survey by EY titled “Overcoming Compliance Fatigue’. At the same time business organizations may be...more
In this post-trial decision in a proceeding pursuant to 8 Del. C. § 225, the Court of Chancery invalidated stockholder action by written consent on the ground that the proxy solicitation materials failed to disclose an...more
Last week, SEC Commissioner Luis Aguilar outlined expectations for directors of public companies to manage cybersecurity risk. If you think it is enough that a board of directors reviews annual budgets for privacy and IT...more
On June 3, 2014, the Massachusetts Securities Division released a survey to assess cybersecurity readiness and practices of Massachusetts-registered investment advisers....more
On June 10, 2014, Commissioner Luis A. Aguilar spoke at a NYSE conference, “Cyber Risks and the Boardroom,” about what boards of directors should do to ensure that their companies are appropriately considering and addressing...more
Find a Science, Computers & Technology Author »
Back to Top