Search Results (1000)
Documents on Technology And Science, Internet & E-Commerce, Technology & Science
Show: results per page
|Applicants in this round were required to receive at least 453 CRS points.|
Shibley Righton LLP;
March 15, 2017, previously published on February 2, 2017Businesses should ensure their online marketing activities comply with Canada's Anti-Spam Law (CASL), says Toronto technology and business lawyer Peter Murphy.
|A Look Inside NIST's Updated Cybersecurity Framework|
Nathan A. Cardon, Tracy P. Marshall, Sheila A. Millar; Keller and Heckman LLP;
March 9, 2017, previously published on February 6, 2017From ransomware attacks to data breaches at major retailers, health care facilities and other major players in the U.S. and international economy, cyberattacks continue to present serious threats to businesses across the supply chain. The growth of these attacks, and the dramatic increase in the...
|Maintaining Effective Patent Portfolios in the Biodiesel Industry|
Benjamin C. Spehlmann; Banner & Witcoff, Ltd.;
March 2, 2017, previously published on January 10, 2017Breakthrough technologies with promising commercial potential must be patent protected using a comprehensive and robust approach. Often, multiple patent families, each based on certain inventive aspects of the technology that are described in a single patent application, are pursued by filing...
|Resolve to Use Your Device as a Tool - and to Resist Being Tooled by It|
Jack Pringle; Adams and Reese LLP;
February 23, 2017, previously published on December 22, 2016Columbia Partner Jack Pringle authored “Resolve to Use Your Device as a Tool-and to Resist Being Tooled by It” for the blog “Listen Like A Lawyer,” which focuses on listening skills for lawyers, law students, law professors and others in the legal field.
|Kokal Authors Article on Blockchain Technology|
Michael Kokal; Heyl, Royster, Voelker & Allen Professional Corporation;
February 22, 2017, previously published on January 13, 2017In “Blockchain for businesses” an article that appeared in the January 2017 edition of the Springfield Business Journal, Mike Kokal discusses the “blockchain” technology that is behind the digital currency Bitcoin. “In a blockchain,” Kokal wrote, “rather...
|Bloomberg BNA: Electronically Stored Information Spoliation Sanctions: A New Test, Escaping Liability for Bad Faith Destruction and a $3 Million Fine|
Matthew T. Scully; Burr & Forman LLP;
February 14, 2017, previously published on January 5, 2017In an article published on Jan. 4, 2017 in Bloomberg BNA, Matthew Scully provides insight on electronically stored information and how it pertains to amendments to the Federal Rules of Civil Procedure. Scully explains that the purpose of the amendments was to inject more “common-sense”...
|Guidance for Defending and Responding to Ransomware Attacks|
Bradley J. Freedman; Borden Ladner Gervais LLP;
December 12, 2016, previously published on November 25, 2016Ransomware attacks are a significant and increasing threat to organizations of all kinds. The U.S. Federal Trade Commission recently issued guidance regarding ransomware attacks. Organizations should consider that guidance and take appropriate steps to defend against, and prepare to respond to,...
|California AG Guidance for the Ed Tech Industry: 6 Recommendations to Protect Student Data Privacy|
Brian Lam, Cynthia J. Larose; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
December 9, 2016, previously published on November 16, 2016Developers and operators of educational technology services should take note. Just before the election, California Attorney General Kamala Harris provided a document laying out guidance for those providing education technology (“Ed Tech”). “Recommendations for the Ed Tech Industry...
|Sixth Circuit Decision Encourages Lawsuits by Customers and Employees Affected by Data Breaches|
Taylor A. Gast; Foster, Swift, Collins & Smith, P.C.;
November 11, 2016, previously published on October 31, 2016A recent decision by the U.S. Court of Appeals for the Sixth Circuit (the “Sixth Circuit”) may make it easier for plaintiffs to bring costly lawsuits against companies that allow sensitive data to fall into the wrong hands. Most troubling from a company's perspective, the Sixth Circuit...
|Software Audits: Strategies for Licensees|
Julie E. Korostoff, Julia M. Siripurapu; Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.;
September 14, 2016, previously published on August 29, 2016If you have received a software audit request from your software vendor or one of the industry trade groups representing software publishers, such as the Software & Information Industry Association (“SIIA”) or the Software Alliance (“BSA”) you are not alone....