The SaaS Tacks – The Ins and Outs of Negotiating SaaS Contracts
Employment and Workplace Discrimination Issues In Esports With Ruth Rauls and Lisa Koblin
Software Escrow: An enterprise resiliency tool every legal department should have in their toolbox (with Don Dennis Jr.)
Industry Implications of EO on Improving the Nation’s Cybersecurity
Humanizing AI In The Energy Industry
What’s Next?: Drones and transforming policy at GE
IP|Trend: New Era in Protection of Software by Intellectual Property Law?
The U.S. District Court for the Southern District of New York on July 18, 2024, dismissed most of the SEC's landmark cyber enforcement litigation against SolarWinds Corp. (SolarWinds or the Company) and the Company's Chief...more
Bitcoin Association for BSV will release software to facilitate court orders to freeze stolen or lost coins, while some courts recently authorised service proceedings by tokenised airdrop. Earlier this year, in Tulip...more
The Court held that software developers do not owe a duty of care to bitcoin owners who lost their private keys. In Tulip Trading Ltd (TTL) v. Bitcoin Association for BSV and others, TTL claimed that personal computers of...more
Development and Operations (DevOps) teams are often pressured by executives and sales teams to get software products completed and out the door and into the market as quickly as possible so the products can generate income....more
The FTC recently settled with Infotrax Systems, L.C. a technology company providing software to the direct sales industry. The settlement followed a breach suffered by the company, and involved allegations the company had...more
Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more
You recently may have heard news reports regarding new security threats known as "Meltdown" and "Spectre." Not to be mistaken for the latest Hollywood box-office offering, these new threats allow attackers to exploit a design...more
Motor vehicle technology is rapidly changing to enhance safety and provide navigation, mobility, and accessibility solutions for drivers. Manufacturer-installed automatic braking, adaptive cruise control, blind-spot...more
In a significant shift in the way the tech industry responds to hackers, an increasing number of companies are resorting to use of “bug bounty” programs that reward hackers who identify flaws in their company software and...more
A 22-year-old Canadian hacker has been sentenced to federal prison by a Delaware court for engaging in a conspiracy to break into the computer networks of several large gaming companies, to steal trade secret and other...more
The Internet of Things (IoT) is coming and perhaps the first place we will see the proverbial rubber hit the road is with something near and dear to Americans – our cars. The ever increasing connectivity of cars is creating a...more
The federal Department of Justice recently filed criminal charges against a 41-year old software programmer and system manager who hacked into his former employer's computer network, causing $90,000 in damage. The complaint...more