National Law Journal | Commentary
By Raqiyyah Pippins | February 20, 2020
FDA and FTC announce plans to further examine influencer advertising.
Daily Business Review | Commentary
By Charles M. Tatelbaum and Thomas B. Sternberg | February 20, 2020
The cases concerned unwanted and unsolicited telephone calls received by the plaintiffs in their respective cases. The ruling creates a new opportunity for massive litigation to be filed against those who telemarket.
By Aaron Gin, Michael Borella, and Joseph Herndon, McDonnell Boehnen Hulbert & Berghoff | February 20, 2020
A few tips to help both draft effective AI/ML-based patent applications and develop an intentional AI/ML-based patent portfolio strategy.
By Gary Salman, Black Talon Security | February 19, 2020
A significant paradigm shift in the cybersecurity world has seen threat actors with significantly enhanced capabilities to target individual businesses and managed service providers (MSPs) or IT companies.
By Doreen Edelman, Kathleen McGee and Abbey Baker, Lowenstein Sandler | February 19, 2020
The U.S. Department of Treasury's Office of Foreign Assets Control (OFAC) has been active in exerting control over digital assets. So what can cyber currency users, hosts and financial institutions do to stay on the right side of the law?
By Phil Sherrell and Esme Strathcole, Bird & Bird | February 18, 2020
There is no one-size-fits-all solution to the ever changing landscape of content moderation but it seems that tech giants are focused on finding the right combination of sophisticated technologies and human oversight.
By Wes Johnson, BIA | February 14, 2020
Many don't realize how that data can be forensically collected and used to prove innocence or guilt in legal matters, making it extremely valuable to attorneys.
By Paul Ragusa, Baker Botts | February 13, 2020
Different types of AI can require different IP protection, dependent on both the form of the AI innovation and the applicable business strategy.
By Diana J.P. McKenzie, Nicole L. Pope and Puja Jabbour, HunterMaclean | February 12, 2020
While we are now seeing more security-related provisions in healthcare IT agreements than we once did, most vendor form agreements still lack necessary provisions that customers should require.
By Aman Khanna, ThumbSignIn | February 11, 2020
One employee falling for a phishing email can compromise a firm's entire database. Will your client information be protected if that were to happen?
Presented by BigVoodoo
This conference aims to help insurers and litigators better manage complex claims and litigation.
Recognizing innovation in the legal technology sector for working on precedent-setting, game-changing projects and initiatives.
Legalweek New York explores Business and Regulatory Trends, Technology and Talent drivers impacting law firms.
McCarter & English, LLP, a well established and growing law firm, is actively seeking a talented and driven associate having 2-5 years o...
Gill & Chamas, LLC seeks a Personal Injury attorney to work in their Woodbridge, NJ office. Candidate must possess the following: ...
We are seeking an attorney with a minimum of four years of experience in transactional work to join our well-established, nationally renowne...