September 02, 2019 | Corporate Counsel
Minimizing Privacy Risk With Data MinimizationWhile the practice of data minimization isn't exactly new, we're now seeing it resonate and discussed at the forefront of the legal industry for the first time.
By Sheryl Falk, Dan Roffman and Steve McNew
6 minute read
June 29, 2018 | Texas Lawyer
What Legal Risks Are Posed by the Internet of Things?We live surrounded by the Internet of Things, or more simply put, connected devices. They know what temperature to heat our rooms, what time we get out…
By Sheryl Falk and Serge Jorgenson
6 minute read
September 25, 2008 | Legaltech News
Use Computer Forensics to Catch a Trade Secrets ThiefAn effective approach to catch a trade secret thief relies on a combination of sophisticated forensics and traditional gumshoe tactics. Early forensics and investigation are likely to shorten the case and achieve better results for less, say Howrey's John Keville and Sheryl Falk.
By John Keville and Sheryl Falk
4 minute read
September 22, 2008 | Texas Lawyer
Formulate a Computer Forensics Action Plan in Trade Secret DisputesAn effective approach to catch trade secret theft relies on a combination of sophisticated forensics and traditional gumshoe tactics, say John Keville and Sheryl Falk of Howrey's Houston office. Early forensics and investigation are likely to shorten the case and achieve better results for less, they say.
By John Keville and Sheryl Falk
4 minute read