Software

News & Analysis as of

At the edge of a new frontier: USCIS begins transition to Electronic Immigration System

In July 2015, the White House announced a series of technology initiatives aimed at modernizing the application process for certain immigration benefits. As part of this effort, the United States Citizenship and Immigration...more

2015 Form 1095-C Reporting: IT Vendor Survey

On August 18, 2014, we posted our, “First Look at ACA Employer Compliance Software.” It’s time for an update. We invited less than a dozen vendors to answer these twenty-two questions....more

NIST Publishes Cybersecurity Standards Objectives

The National Institute of Standards and Technology has published a draft of its objectives for cybersecurity standardization, following in many ways the consultative model that it used successfully in drafting the NIST...more

That is SO last week - August 2015 #4

We’ve been talking potential bias in big data for some time now, and last week’s news was full of concerns about just that. The New York Times Upshot Blog interviewed a Microsoft computer scientist on the subject; NBC News...more

Standard Essential Patents Unenforceable on Theory of Indirect Infringement

A recent decision by the Federal Circuit in JVC Kenwood Corp. v. Nero, Inc., decided August 17, 2015, involves nuanced details of standard-essential patents, but arrived at a common sense result: either the patents at issue...more

Shareholders sue mobile security firm for failing to disclose hacking incident before IPO

MobileIron, Inc. was sued late last week by shareholders in a proposed class action for allegedly failing to disclose a hacking incident just weeks before its initial public offering (IPO). The suit, filed on behalf of...more

Mobile Health Devices and Cybersecurity: Federal Guidance for Management of Threats in Medical Devices

New Technology = New Threats - With new technology comes new security concerns. But when that new technology is in the medical field, the cybersecurity vulnerabilities can be particularly devastating. The...more

Federal Circuit Strengthens ITC's Authority to Police Importation

On August 10, 2015, the Federal Circuit, acting en banc, ruled that the International Trade Commission (ITC) has the authority to prevent importation of products based on claims for induced infringement where the predicate...more

Former SAP Executive Pleads Guilty to Paying “Necessary” Bribes

On August 12, the DOJ and SEC announced joint enforcement actions against software giant SAP International’s former head of Latin American sales, Vicente Garcia. Garcia pleaded guilty to conspiracy to violate the FCPA and...more

Federal Circuit Upholds ITC Interpretation of § 337 to Cover Induced Infringement

Suprema, Inc. and Mentalix Inc. v. Int’l Trade Comm’n, Case No. 12-1170 (Fed. Cir. Aug. 10, 2015) (Reyna, J.) (O’Malley, Proust, Lourie, and Dyk JJ., dissenting). By way of background, appellee Suprema manufactures...more

Federal District Court: “Browsewrap” Terms and Conditions Provide Sufficient Notice to Defeat False Advertising Class Action

Websites sometimes present their terms of use (“TOU”) to users merely by including a link to those TOU on the website without requiring users to affirmatively accept the terms by, for example, checking a box or clicking an “I...more

A Voice from China: Unraveling the Different Standards for Civil and Criminal Misappropriation of Trade Secrets

In China, victims of trade secret misappropriation suffering losses over RMB 500,000 are entitled to file a civil action and may also report the case to public security authorities to initiate a criminal...more

Intellectual Property Alert: Suprema, Inc. v. ITC: ITC Can Exclude, Under Inducement Theory, Imported Products That Only Infringe...

On August 10, 2015, an en banc Court of Appeals for the Federal Circuit held that the International Trade Commission’s interpretation of Section 337 was reasonable and therefore that the ITC has the authority to exclude,...more

En Banc Federal Circuit Upholds ITC’s Broad Definition of Induced Infringement

Earlier this week, an en banc Federal Circuit interpreted the scope of Section 337 of the Tariff Act (19 U.S.C. § 1337), which proscribes importation of "articles that … infringe" a U.S. patent. (Suprema, Inc. v....more

The 5 Most Common AML Compliance Program Deficiencies

Anti-money laundering compliance is a very difficult task. The number of risks is exponential. AML compliance officers have an innovative and rich history of compliance techniques and strategies. In the end, AML compliance...more

3D Printing: Potential Pitfalls For Retailers

3D printing, a seemingly futuristic method of manufacturing objects, is steadily moving into the mainstream as three dimensional printers have relocated from labs to the shelves of retail stores. 3D printing, or additive...more

Be aware of Windows 10 free upgrade opt outs

Since July 15, Windows 7 and Windows 8 users have been offered a free upgrade to Windows 10. Windows 10 includes Wi-Fi Sense, which features a default prompt that asks users to share access to WiFi networks that they have...more

Federal Circuit Continues to Nix Financial Patents

Patents covering software for use in the financial industry are increasingly being invalidated by the courts. Because of the Supreme Court’s decision in Alice Corp. v. CLS Bank International, 134 S. Ct. 2347 (2014), district...more

6 Elements of a Modern Compliance Solution: For the Most Effective Compliance Software—That Your Employees Actually Want to...

Some companies are shopping for their very first dedicated compliance solution. Other organizations have more tenured compliance programs that have been using software for years, but when a contract comes to an end they feel...more

Are You the Next Cybercrime Target?

How valuable is your data? If you store personally identifiable information, such as Social Security numbers, protected health information under HIPAA, and even more mundane information such as dates of birth and e-mail...more

Ignorance Is Not Bliss: The 60-Day Clock under the ACA’s “Return and Report Rule” Can Start Ticking Well Before the Exact Amount...

On August 3, 2015, a federal judge in the Southern District of New York ruled that the United States’ and state of New York’s complaints in intervention can move forward against a group of hospitals, under the federal False...more

Rejection of Oracle's claims for copyright infringement against one of its users and condemnation of the practice of aggressive...

Dealing with a matter involving the Enterprise Resource Planning (ERP) Oracle E-Business Suite, the Paris First Instance Court took the opportunity to clarify the differences between copyright infringement and contractual...more

Recent Developments on Copyright Preemption of Trade Secret Claims in the Fifth Circuit

For the latest on the copyright preemption doctrine (codified at 17 U.S.C. § 301(a)) look no further than the Fifth Circuit, which, together with its district courts, issued a string of recent decisions regarding the...more

Social Media Week Part IV – Telling a Story About Honey

I continue my exploration of the use of social media in doing compliance by taking a look at a very innovative social media solution to a difficult compliance issue around, of all things, honey. This example shows how...more

Court Adopts Tough Interpretation of 60-Day Repayment Rule

New York’s Mt. Sinai Hospitals can’t seem to catch a break in its long-running battle with whistleblower Bob Kane. First, the government joined the case and wanted not just the $1,000,000 in Medicaid overpayments, but an...more

531 Results
|
View per page
Page: of 22

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×