NEXT

Peter Brown

Peter Brown

August 21, 1999 | Law.com

Viruses, Worms and Other Computer Pestilence

The spring of 1999 was, for many, an unwelcome introduction to computer viruses. March saw the outbreak of the Melissa virus, followed by Chernobyl in April and Worm.ExploreZip in June, and each virus appeared to cause more damage than the one before. All three spread quickly around the world, exploiting the interconnectedness of computers and the hegemony of Microsoft products. This paper chronicles recent viruses and examines the related legal issues.

By Richard Raysman and Peter Brown

14 minute read

April 10, 2012 | New York Law Journal

The ITC and Trade Secret Misappropriation

In their Privacy Matters column, Richard Raysman, a partner at Holland & Knight, and Peter Brown, a partner at Baker & Hostetler, write that in 2011, a record number of complaints were filed with the International Trade Commission regarding claims of infringement of statutory intellectual property rights and other forms of unfair competition in import trade.

By Richard Raysman and Peter Brown

10 minute read

November 23, 2004 | Law.com

Spyware: Time for Action?

Attempts to address the issues created by spyware have been complicated by difficulties in distinguishing objectionable spyware from legitimate monitoring technologies and disagreements over the legitimacy of some uses of spyware technology. Attorneys Richard Raysman and Peter Brown say that, with concerns about spyware increasing, public annoyance may give way to further government action.

By Richard Raysman and Peter Brown

11 minute read

August 13, 2013 | New York Law Journal

Courts Tackle Accidental Access, 'Catfishing' and Unsecured WiFi

In their Privacy Matters column, Richard Raysman, a partner at Holland & Knight, and Peter Brown, the principal at Peter Brown & Associates, discuss new practices and technologies - some of which cross ethical norms - that do not neatly fit within the boundaries of existing privacy laws.

By Richard Raysman and Peter Brown

10 minute read

April 11, 2003 | Law.com

Understanding, Averting and Surviving a Software Audit

According to a report released earlier this year by the Business Software Alliance, one out of every four business software applications installed in the United States is unlicensed, and thus a potential copyright infringement violation. Software vendors are increasingly making businesses aware of the unlicensed software problem and requesting that businesses perform a "software audit" -- a determination of whether unlicensed software exists on its computer system.

By Richard Raysman and Peter Brown

11 minute read

January 10, 2012 | New York Law Journal

Proving Contributory Online Trademark Infringement

In their Technology Law column, Richard Raysman of Holland & Knight and Peter Brown of Baker & Hostetler discuss trademark owners' online policing of the sale of counterfeit goods and review the ongoing congressional debate surrounding online intellectual property infringement.

By Richard Raysman and Peter Brown

11 minute read

June 12, 2012 | New York Law Journal

Hard Drive Encryption and the Fifth Amendment

In their Privacy Matters column, Richard Raysman, a partner at Holland & Knight, and Peter Brown, a partner at Baker & Hostetler, write that some encryption software shrouds the entire file system so that a third party examining the hard drive's file directories cannot discern whether the encrypted drive contains active files or just blank space. These protections, they say, can thwart both criminals and law enforcement from gaining access to sensitive data.

By Richard Raysman and Peter Brown

11 minute read

April 09, 2013 | New York Law Journal

Social Media Use and Researching Jurors in the Courtroom

In their Privacy Matters column, Richard Raysman, a partner at Holland & Knight, and Peter Brown, the principal at Peter Brown & Associates, write: Despite preventative steps, the problem of jurors violating trial instructions through social media usage persists. Some of the dangers of Facebooking jurors include directly communicating with or "friending" witnesses or parties, divulging confidential information about the trial or the deliberative process, disclosing personal information about fellow jurors, or revealing an unacceptable bias for or against one party.

By Richard Raysman and Peter Brown

11 minute read

February 07, 2003 | Law.com

Sample Source Code Escrow Agreement

In any software licensing agreement, delivery of the source code can become one of the key issues because of its great value to both the vendor and the user. This sample source code agreement favors the user by providing the user with access to the complete source code from the vendor.

By Richard Raysman and Peter Brown

6 minute read

January 15, 2013 | New York Law Journal

EU's 'UsedSoft' Ruling Tackles User Rights in Licensed Software

In their Technology Law column, Richard Raysman, a partner at Holland & Knight, and Peter Brown, a partner at Baker & Hostetler, write that many users might be surprised to learn that the software running on their computers is "licensed," not "sold," and subject to contractual restrictions that may not necessarily qualify a particular user as an "owner" of a copy of the software with the implicit rights of resale under the Copyright Act's first sale doctrine.

By Richard Raysman and Peter Brown

12 minute read