NEXT

Peter Brown

Peter Brown

January 08, 2008 | New York Law Journal

Computer Law

Richard Raysman and Peter Brown, partners at Thelen Reid Brown Raysman & Steiner, write that software companies continue to market programs that detect Web-based malicious computer code and prevent computers from being infected with spyware. Consequently, in some instances, these companies have been forced to defend their products in civil litigation commenced by "adware" distributors and marketers. They briefly review some of the recent litigation involving providers of adware, as well as some FTC actions.

By Richard Raysman and Peter Brown

15 minute read

January 09, 2007 | New York Law Journal

Computer Law

Richard Raysman and Peter Brown, partners at Thelen Reid Brown Raysman & Steiner, write that some Internet Service Providers have proposed a tiered system in which content providers would pay to have their data or applications delivered in a prioritized manner. Under this system, a content owner might be charged additional fees for priority handling of their data based on the type of content being sent, the size of the content (e.g., text file, video streaming) or a combination of both.

By Richard Raysman and Peter Brown

10 minute read

August 12, 2002 | New York Law Journal

Computer Law

A S COMPANIES assess their organizations for areas where efficiencies can be gained and costs cut, outsourcing has emerged as an increasingly important fiscal tool. But according to recent remarks made by a Gartner Group consultant, 2002 will be a record year for bad outsourcing deals. 1 This may be due in part to companies having rushed into long-term outsourcing relationships for short term cost-reduction objectives in an effort to appease the market and investors. A prudent approach to outsourcing arrang

By Richard Raysman And Peter Brown

12 minute read

August 13, 2007 | New York Law Journal

Computer Law

Richard Raysman and Peter Brown, partners at Thelen Reid Brown Raysman & Steiner, write that as the Internet has gained greater acceptance and become more relied upon in society at large, it is no surprise that Fed. R. Evid. 901 is finding its way into federal courtrooms, as it provides attorneys with new territory in which to invoke the rule on authentication.

By Richard Raysman and Peter Brown

10 minute read

November 10, 2009 | New York Law Journal

Computer Law

Richard Raysman, a partner at Holland & Knight, and Peter Brown, a partner at Baker & Hostetler, write that as technology companies and inventors seek business opportunities to monetize patents or speed up the commercialization of inventions or patented processes, licensing remains an effective method to maximize a patent's potential and protect intellectual property rights. Over the past year, there have been several important developments in patent licensing involving "have made" rights, the effect of a merger on infringement liability, and the reach of the patent exhaustion doctrine.

By Richard Raysman and Peter Brown

13 minute read

July 13, 2010 | New York Law Journal

Recent Rulings Highlight Software Licensing Disputes

In their Technology Law column, Richard Raysman, a partner at Holland & Knight, and Peter Brown, a partner at Baker & Hostetler, discuss software licenses generally, the availability of copyright and contract claims in the event of a breach, and other areas of disagreement that may arise in a software licensing dispute.

By Richard Raysman and Peter Brown

11 minute read

March 12, 2009 | Legaltech News

Data Breaches in Credit Card Transactions

Attorneys Richard Raysman and Peter Brown discuss the Payment Card Industry Data Security Standards initiated by credit card brands to safeguard sensitive cardholder data and recent litigation and state legislative developments in merchant liability for data security breaches.

By Richard Raysman and Peter Brown

13 minute read

April 13, 2010 | New York Law Journal

Rising Cybercrime Poses New Risks in Commercial Banking

Richard Raysman, a partner at Holland & Knight, and Peter Brown, a partner at Baker & Hostetler, discuss the handling of electronic fund transfers under the UCC, online banking customer authentication methods and recent litigation between banks and small- and medium-sized businesses that were victims of cyber-theft

By Richard Raysman and Peter Brown

14 minute read

January 07, 2002 | New York Law Journal

Computer Law

A s Beethoven labored to write his great compositions and score them for a hundred-member orchestra, he could not have imagined that some of his most monumental works would one day be reduced to a five- or 10-second ring tone played out on a mobile telephone handset.

By Richard Raysman And Peter Brown

11 minute read

August 14, 2006 | Law.com

Preventive Measures for Public Employers

Recent years have seen a rise in the number of lawsuits brought by employees against cities, counties and other public entities under the Fair Labor Standards Act. These actions, which are brought as "collective actions" specifically authorized by the FLSA, can impose substantial liability on public employers. Attorneys Peter Brown and David Urban describe the dangers of FLSA collective actions and explain preventive measures public employers can take to avoid such lawsuits.

By Peter Brown and David Urban

8 minute read