Publications for Technology Law
We have written about the significant increase in the usage of drones for both recreational and commercial purposes.
Two weeks after one of the largest data breaches in history was announced, Equifax has come under fire for its breach response.
It's 4:00 p.m. on a Friday afternoon when I receive a call from a company 's legal director. The director tells me that a company executive was traveling when the executive received an urgent email that appeared to be from the company's CEO, asking for a document containing sensitive information of all the organization's employees. After forwarding the requested document, the executive realized that the email was not from the CEO's email address, but from a similar address- now a criminal holds sensitive information.
A recent decision by the U.S. Court of Appeals for the Sixth Circuit (the “Sixth Circuit”) may make it easier for plaintiffs to bring costly lawsuits against companies that allow sensitive data to fall into the wrong hands.
On February 28, 2012, the House passed HB 5335, an amendment that will change an over 25 year old Open Meetings Act interpretation by the Michigan Court of Appeals about telephone participation at public meetings.
State tax laws have not kept pace with the rapid growth of cloud computing.
Social media is proliferating in the workplace. Facebook, My Space, Linked In, and Twitter have become commonplace on employees’ cell phones and computers. Blogging has become a tool for marketing, as well as for revenge.
In what has become an increasing trend, a plaintiff in a personal injury suit has been ordered to produce otherwise "private" postings on her Facebook and MySpace social networking profiles.
A new land-grab is occurring on the World Wide Web.
As you likely know, Michigan's new texting ban went into effect July 1, 2010. The new law prohibits...
If your company is considering a merger, acquisition or internal corporate restructuring, it is important that intellectual property contracts (such as software licenses) be carefully reviewed to determine if the merger may have an effect on the surviving company’s ability to use the software or other intellectual property.
On February 17, 2010, most of the Health Information Technology for Economic and Clinical Health Act ("HITECH") became binding on the health care industry.
Employers who wish to review social media or employees’ personal web sites should have a policy in place informing employees that the company has a right to monitor employee use of the systems.
On February 17, 2010, most of the Health Information Technology for Economic and Clinical Health Act ("HITECH") becomes binding on the health care industry.
Although this has not historically been the case, it has been over 10 years since the patent office started to allow software companies to file patents on their software inventions.
E-Verify is a free Internet-based system operated by the Department of Homeland Security (DHS), U.S. Citizenship and Immigration Services (USCIS) that allows employers to verify the employment eligibility of their employees, regardless of citizenship.
The ultimate goal of trademark protection is to avoid consumer confusion.
Building Information Modeling (BIM) refers to software capable of creating "live" virtual three-dimensional, "intelligent" parametric models.
The American Recovery and Reinvestment Act of 2009 contained provisions requiring health care covered entities and business associates regulated by the Health Insurance Portability and Accountability Act to notify certain parties in the event of a breach of unsecured protected health information.
Facebook, the leading social networking website, is now allowing users to register their own personalized Facebook URL (web address) by selecting a unique "username" for their Facebook profile page.
If you own a trademark, you may prevent Google from selling your name and directing web traffic to your competitors' websites.
Is your company complying with the United States Export laws when transmitting information?
Many employees operate under the mistaken belief that text messages sent through employer-provided cellular devices are private.
Intellectual Property rights are commercially valuable products of the human mind and include copyrightable works, trademarks, patentable inventions and trade secrets.
The Copyright Act generally provides that the person who creates the software initially owns its copyright.