Software

News & Analysis as of

Dodge, Ram, and Jeep vehicles recalled due to hacking vulnerabilities

As technology moves forward, more and more of our everyday gadgets will be connected to the Internet. With that convenience may come some vulnerabilities. On July 24, 2015, Chrysler and its parent company FCA US LLC (FCA US)...more

USPTO Issues July 2015 Updated Guidance on Subject Matter Eligibility Analysis

On July 30, 2015, the United States Patent and Trademark Office (USPTO) issued updated guidance regarding subject matter eligibility analysis to address six major themes from comments received in response to the 2014 Interim...more

The Internet of Things and the Inevitable Collision with Products Liability PART 3: Initial Contact

This is the third in a series of blogs examining the rapid development of the Internet of Things (IoT) and its consequential impact on product liability risk. The development of the IoT has been so rapid and the applications...more

Taxing Cloud Computing: New York Gets It Half Right

The term “cloud computing” is broad enough to cover a vast array of transactions, all of which use the Internet in some fashion. Two of the most prevalent forms of cloud computing are “software as a service” (SaaS) and...more

Cuba Si! Trade With Cuba … Not Quite Yet

There has been much fanfare surrounding the reestablishment of diplomatic relations with Cuba, starting with President Obama’s announcement of the resumption of bilateral relations, and followed by the formal establishment of...more

EPA Issues Direct Final Rule To Mandate Updated Electronic Reporting

The July 20, 2015, Federal Register includes a notice for direct final action to amend the electronic reporting regulations for Section 5 under the Toxic Substances Control Act (TSCA). The U.S. Environmental Protection Agency...more

Jeep Hack Drives Cyber, Crisis, Liability and Supply Chain Coverage Issues

A recall notice to fix critical control software on 1.4 million vehicles should raise concerns for companies, brokers and insurers across several business lines. The vulnerability of vital control systems to a remote hacking...more

FCC Proposing to Further Streamline Equipment Authorizations

Last week, the Federal Communications Commission (“Commission”) released a Notice of Proposed Rulemaking (“NPRM”) seeking comment on several proposals to update and modify the rules governing the procedures Radiofrequency...more

Trade Secrets, Security, and Cloud Computing: Best Practices Now

As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more

The “Oracle” Predicts It: Supreme Court Declines to Hear Landmark Software Copyright Case

The U.S. Supreme Court declined to grant certiorari in the case of Google, Inc. v. Oracle America, Inc., a closely watched case regarding the eligibility of software for copyright protection. The Supreme Court’s decision...more

The Baby and the Bathwater: The Department of Commerce’s Bureau of Industry and Security (BIS) Intrusion and Surveillance Software...

If you are not aware, please take note that the July 20, 2015 deadline is fast approaching for comments to the U.S. Department of Commerce’s Bureau of Industry and Security (BIS) proposed rule on the export control of certain...more

"Sanctions Relief Under the P5+1 Agreement With Iran: Implications for US, EU and International Business"

On July 14, 2015, the P5+1 (the United States, the United Kingdom, France, China, Russia and Germany) along with the European Union reached a historic agreement with Iran, called the Joint Comprehensive Plan of Action (the...more

Mobile App Legal Terms & Conditions: Six Key Considerations

For corporations, the mobile app is today’s website. Back in the late 1990s, no self-respecting company, no matter how stodgy and old-fashioned, wanted to be without a website....more

Software import substitution: recent news

In support of Russian software developers when executing public (state or municipal) procurement, the Federal Law N 188-FZ “On Amendments to the Federal Law ‘On Information, Information Technologies and Protection of...more

Spoofing Whales: How Companies Can Protect Their CEOs and CFOs from the "Business Email Compromise”

Cyber scammers continually innovate new means to extract valuable information from unsuspecting victims. And a new form of cyber fraud is exploiting the close relationship between CEOs and CFOs. Identifying this threat — and...more

500,000 Lines of Source Code: The New “Intangible Property”

Sergey Aleynikov’s six-year trade secret odyssey through all possible configurations of litigation, civil and criminal, federal and state, may at long last have come to an end after the New York Supreme Court recently...more

An Introduction to Cloud Computing: Business Advantages, Legal Risks

Predictions suggest that the global market for cloud computing services should reach $118 billion by the end 2015 and climb as high as $200 billion by 2018. Although the cloud computing industry continues to be in its...more

Spotlight on Louisiana: 2015 Legislative Session Increases Tax Burdens to Balance State Budget

Even though Louisiana's 2015 legislative session has concluded, the dust may be far from settled as to how increases in tax burdens meant to balance the State's budget will impact taxpayers. At least one industry trade...more

Export Control Reform Roundup – Overview of Recent Developments

In This Issue: - I. BIS and DDTC Publish Their Respective Proposed “Bookend” Controls on Toxicological Agents and Directed Energy Weapons - II. BIS and DDTC Publish Their Respective Proposed “Bookend” Definitions...more

9 Key Factors That Impact Patent Valuations

Figuring out what a patent is worth can often feel like black magic. But, doing so can be critical during an IP due diligence or when trying to assess the value of a company built around the intellectual property. In...more

Proposed Rule to Subject Certain Cybersecurity Items to Greater Export Restrictions

The U.S. Department of Commerce Bureau of Industry and Security (BIS) recently published a proposed rule enhancing controls on certain cybersecurity items under the Export Administration Regulations (EAR). Specifically, the...more

Washington State Tax Update

The Washington Legislature released the state budget for the 2015-2017 biennium, which enhanced the state’s nexus standard, eliminated certain tax exemptions, extended some tax preferences, and made other tax changes:...more

Chicago's New Lease Tax Applies to Personal Property and “The Cloud” - The Tax Includes "Non-Possessory Computer Leases" Unless...

The Chicago Department of Finance (the "Department") issued Lease Transaction Tax Ruling No. 12 with respect to application of Chicago's Personal Property Lease Transaction Tax (the "lease tax") to non-possessory computer...more

Spotlight on Manufacturers: Tennessee's 2015 Tax and Related Legislation

Manufacturing is a primary driver of our economic growth. As such, those businesses involved with fabricating, processing, converting and producing goods in today's marketplace must be ever-vigilant regarding new laws that...more

Eon Corp. IP Holdings LLC v. AT&T Mobility LLC (Fed. Cir. 2015)

On September 23, 2010, Eon filed suit against seventeen defendants in the District Court of the District of Delaware, alleging infringement of U.S. Patent No. 5,663,757. During the case, the '757 patent went through two...more

503 Results
|
View per page
Page: of 21

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×