Duane Morris LLP
Internet service providers (ISPs) like to believe that in Section 230 of the Communications Decency Act (CDA) Congress afforded them broad immunity from any liability potentially caused by third-party content posted on ISP sites.
Scott & Scott LLP
If a business requires restricted access to its data, the contract with an outsourced vendor should clearly outline the authorization process.
Fox Rothschild LLP
A New York judge ruled for a group of former Thelen LLP partners to return cash advances they received in the months before the firm’s collapse based on revenues that were never realized.
Hughes Hubbard & Reed LLP
On November 5, 2014, the Second Circuit (Judges Winter, Droney, and Hellerstein) held oral arguments in In re Tribune Litigation (Case No. 13-3992) and Whyte v. Barclays Bank PLC (Case No. 13-2653).
Foley & Lardner
Moving applications and other IT infrastructure components into "the cloud" is now a standard approach to the management of information technology (IT) resources.
Steptoe & Johnson LLP
It’s been a contentious meeting in Dubai at the World Conference on International Telecommunications.
Six months after the U.S. Court of Appeals for the Fourth Circuit reversed the district court’s dismissal of Rosetta Stone’s trademark infringement lawsuit against Google, the parties issued a joint statement today announcing that they have settled their legal dispute.
CNN reports that the Cybersecurity Act of 2012 (SB 3414) has failed to pass the US Senate. A cloture vote failed by a vote of 42-46, mostly along party lines.
The DAA has worked with a broad set of stakeholders with significant input from businesses, consumers, and policy makers to develop a program governing the responsible collection and use of web viewing data.
Foley Hoag LLP
On May 16, Deputy Undersecretary for Cybersecurity, Mark Weatherford, spoke to the Advanced Cyber Security Center about DHS's cyber security priorities: Information Sharing, R&D, and the Advanced Persistent Threat.
The Supreme Court in New York County recently dismissed a $20 million suit in a sanctioning order in response to the Plaintiff’s destruction of electronically stored information ("ESI").
What is "the Cloud"? That depends on whom you ask. Answers currently run from Apple and its competitors offering storage and music and file synchronization to customers who are individuals, to very large vendors at a global scale servicing very large enterprises as customers.
Reinhart Boerner Van Deuren s.c.
As with any type of business transaction, there are many considerations that must be taken into account when approaching the negotiation of a software license agreement.
Foley Hoag LLP
Interesting article in Forbes, "The Zero-Day Salesmen," about "government agencies who purchase such "zero-day" exploits, or hacking techniques that use undisclosed flaws in software, with the explicit intention of invading or disrupting the computers and phones of crime suspects and intelligence targets."
A monthly round-up of space industry developments for the information of our clients and friends.
Drinker Biddle & Reath LLP
Beyond highlighting the evolving standards and complexities of establishing a comprehensive e-discovery plan at the early stages of a case, recent decisions in Da Silva Moore v. Publicis Groupe (S.D.N.Y.), which approved a defendant’s use of predictive coding, could potentially have a Zubulake-type effect of establishing new technology-driven norms for large-scale document reviews in the future.
Fenwick & West LLP
Last year we published our first Seed Financing Survey in recognition of the growing importance of seed financing to entrepreneurs and the venture capital environment.
The California appellate court’s decision in "Balsam v. Trancos" requires marketers nationwide using commercial email advertisements to include in the from line of each email a domain name that is registered to the sender which can be determined by performing a WHOIS look-up, or the name of the sender or marketer on whose behalf the email was sent.
Cloud computing is the storage of data on remote computer servers and the sharing and transmittal of such information by way of the internet.
A case does not have to involve complex commercial litigation or technical patent disputes to create serious electronic discovery problems.