January 08, 2008 | New York Law Journal
Computer LawRichard Raysman and Peter Brown, partners at Thelen Reid Brown Raysman & Steiner, write that software companies continue to market programs that detect Web-based malicious computer code and prevent computers from being infected with spyware. Consequently, in some instances, these companies have been forced to defend their products in civil litigation commenced by "adware" distributors and marketers. They briefly review some of the recent litigation involving providers of adware, as well as some FTC actions.
By Richard Raysman and Peter Brown
15 minute read
January 09, 2007 | New York Law Journal
Computer LawRichard Raysman and Peter Brown, partners at Thelen Reid Brown Raysman & Steiner, write that some Internet Service Providers have proposed a tiered system in which content providers would pay to have their data or applications delivered in a prioritized manner. Under this system, a content owner might be charged additional fees for priority handling of their data based on the type of content being sent, the size of the content (e.g., text file, video streaming) or a combination of both.
By Richard Raysman and Peter Brown
10 minute read
August 12, 2002 | New York Law Journal
Computer LawA S COMPANIES assess their organizations for areas where efficiencies can be gained and costs cut, outsourcing has emerged as an increasingly important fiscal tool. But according to recent remarks made by a Gartner Group consultant, 2002 will be a record year for bad outsourcing deals. 1 This may be due in part to companies having rushed into long-term outsourcing relationships for short term cost-reduction objectives in an effort to appease the market and investors. A prudent approach to outsourcing arrang
By Richard Raysman And Peter Brown
12 minute read
August 13, 2007 | New York Law Journal
Computer LawRichard Raysman and Peter Brown, partners at Thelen Reid Brown Raysman & Steiner, write that as the Internet has gained greater acceptance and become more relied upon in society at large, it is no surprise that Fed. R. Evid. 901 is finding its way into federal courtrooms, as it provides attorneys with new territory in which to invoke the rule on authentication.
By Richard Raysman and Peter Brown
10 minute read
November 10, 2009 | New York Law Journal
Computer LawRichard Raysman, a partner at Holland & Knight, and Peter Brown, a partner at Baker & Hostetler, write that as technology companies and inventors seek business opportunities to monetize patents or speed up the commercialization of inventions or patented processes, licensing remains an effective method to maximize a patent's potential and protect intellectual property rights. Over the past year, there have been several important developments in patent licensing involving "have made" rights, the effect of a merger on infringement liability, and the reach of the patent exhaustion doctrine.
By Richard Raysman and Peter Brown
13 minute read
July 13, 2010 | New York Law Journal
Recent Rulings Highlight Software Licensing DisputesIn their Technology Law column, Richard Raysman, a partner at Holland & Knight, and Peter Brown, a partner at Baker & Hostetler, discuss software licenses generally, the availability of copyright and contract claims in the event of a breach, and other areas of disagreement that may arise in a software licensing dispute.
By Richard Raysman and Peter Brown
11 minute read
March 12, 2009 | Legaltech News
Data Breaches in Credit Card TransactionsAttorneys Richard Raysman and Peter Brown discuss the Payment Card Industry Data Security Standards initiated by credit card brands to safeguard sensitive cardholder data and recent litigation and state legislative developments in merchant liability for data security breaches.
By Richard Raysman and Peter Brown
13 minute read
April 13, 2010 | New York Law Journal
Rising Cybercrime Poses New Risks in Commercial BankingRichard Raysman, a partner at Holland & Knight, and Peter Brown, a partner at Baker & Hostetler, discuss the handling of electronic fund transfers under the UCC, online banking customer authentication methods and recent litigation between banks and small- and medium-sized businesses that were victims of cyber-theft
By Richard Raysman and Peter Brown
14 minute read
January 07, 2002 | New York Law Journal
Computer LawA s Beethoven labored to write his great compositions and score them for a hundred-member orchestra, he could not have imagined that some of his most monumental works would one day be reduced to a five- or 10-second ring tone played out on a mobile telephone handset.
By Richard Raysman And Peter Brown
11 minute read
August 14, 2006 | Law.com
Preventive Measures for Public EmployersRecent years have seen a rise in the number of lawsuits brought by employees against cities, counties and other public entities under the Fair Labor Standards Act. These actions, which are brought as "collective actions" specifically authorized by the FLSA, can impose substantial liability on public employers. Attorneys Peter Brown and David Urban describe the dangers of FLSA collective actions and explain preventive measures public employers can take to avoid such lawsuits.
By Peter Brown and David Urban
8 minute read
Trending Stories