August 21, 1999 | Law.com
Viruses, Worms and Other Computer PestilenceThe spring of 1999 was, for many, an unwelcome introduction to computer viruses. March saw the outbreak of the Melissa virus, followed by Chernobyl in April and Worm.ExploreZip in June, and each virus appeared to cause more damage than the one before. All three spread quickly around the world, exploiting the interconnectedness of computers and the hegemony of Microsoft products. This paper chronicles recent viruses and examines the related legal issues.
By Richard Raysman and Peter Brown
14 minute read
April 10, 2012 | New York Law Journal
The ITC and Trade Secret MisappropriationIn their Privacy Matters column, Richard Raysman, a partner at Holland & Knight, and Peter Brown, a partner at Baker & Hostetler, write that in 2011, a record number of complaints were filed with the International Trade Commission regarding claims of infringement of statutory intellectual property rights and other forms of unfair competition in import trade.
By Richard Raysman and Peter Brown
10 minute read
November 23, 2004 | Law.com
Spyware: Time for Action?Attempts to address the issues created by spyware have been complicated by difficulties in distinguishing objectionable spyware from legitimate monitoring technologies and disagreements over the legitimacy of some uses of spyware technology. Attorneys Richard Raysman and Peter Brown say that, with concerns about spyware increasing, public annoyance may give way to further government action.
By Richard Raysman and Peter Brown
11 minute read
August 13, 2013 | New York Law Journal
Courts Tackle Accidental Access, 'Catfishing' and Unsecured WiFiIn their Privacy Matters column, Richard Raysman, a partner at Holland & Knight, and Peter Brown, the principal at Peter Brown & Associates, discuss new practices and technologies - some of which cross ethical norms - that do not neatly fit within the boundaries of existing privacy laws.
By Richard Raysman and Peter Brown
10 minute read
April 11, 2003 | Law.com
Understanding, Averting and Surviving a Software AuditAccording to a report released earlier this year by the Business Software Alliance, one out of every four business software applications installed in the United States is unlicensed, and thus a potential copyright infringement violation. Software vendors are increasingly making businesses aware of the unlicensed software problem and requesting that businesses perform a "software audit" -- a determination of whether unlicensed software exists on its computer system.
By Richard Raysman and Peter Brown
11 minute read
January 10, 2012 | New York Law Journal
Proving Contributory Online Trademark InfringementIn their Technology Law column, Richard Raysman of Holland & Knight and Peter Brown of Baker & Hostetler discuss trademark owners' online policing of the sale of counterfeit goods and review the ongoing congressional debate surrounding online intellectual property infringement.
By Richard Raysman and Peter Brown
11 minute read
June 12, 2012 | New York Law Journal
Hard Drive Encryption and the Fifth AmendmentIn their Privacy Matters column, Richard Raysman, a partner at Holland & Knight, and Peter Brown, a partner at Baker & Hostetler, write that some encryption software shrouds the entire file system so that a third party examining the hard drive's file directories cannot discern whether the encrypted drive contains active files or just blank space. These protections, they say, can thwart both criminals and law enforcement from gaining access to sensitive data.
By Richard Raysman and Peter Brown
11 minute read
April 09, 2013 | New York Law Journal
Social Media Use and Researching Jurors in the CourtroomIn their Privacy Matters column, Richard Raysman, a partner at Holland & Knight, and Peter Brown, the principal at Peter Brown & Associates, write: Despite preventative steps, the problem of jurors violating trial instructions through social media usage persists. Some of the dangers of Facebooking jurors include directly communicating with or "friending" witnesses or parties, divulging confidential information about the trial or the deliberative process, disclosing personal information about fellow jurors, or revealing an unacceptable bias for or against one party.
By Richard Raysman and Peter Brown
11 minute read
February 07, 2003 | Law.com
Sample Source Code Escrow AgreementIn any software licensing agreement, delivery of the source code can become one of the key issues because of its great value to both the vendor and the user. This sample source code agreement favors the user by providing the user with access to the complete source code from the vendor.
By Richard Raysman and Peter Brown
6 minute read
January 15, 2013 | New York Law Journal
EU's 'UsedSoft' Ruling Tackles User Rights in Licensed SoftwareIn their Technology Law column, Richard Raysman, a partner at Holland & Knight, and Peter Brown, a partner at Baker & Hostetler, write that many users might be surprised to learn that the software running on their computers is "licensed," not "sold," and subject to contractual restrictions that may not necessarily qualify a particular user as an "owner" of a copy of the software with the implicit rights of resale under the Copyright Act's first sale doctrine.
By Richard Raysman and Peter Brown
12 minute read
Trending Stories