Day 1: January 31, :00-8:30 am: CONTINENTAL BREAKFAST in Aspen, 2 nd Fl.

Size: px
Start display at page:

Download "Day 1: January 31, 2014 8:00-8:30 am: CONTINENTAL BREAKFAST in Aspen, 2 nd Fl."

Transcription

1 Cyberspace Law Institute and Winter Working Meeting January 31-February 1, 2014, Denver, CO Agenda Cyberspace Law Institute and WWM, Agenda, Day 1 January 31, 2014 Day 1: January 31, :00-8:30 am: CONTINENTAL BREAKFAST in Aspen, 2 nd Fl. 8:15-8:50 am: OPENING PLENARY (CLC Chair Jon Rubens presents welcome, introductions, housekeeping) -- A, 2 nd Fl. 8:50-2:50 pm: CYBERSPACE LAW INSTITUTE-- A, 2 nd Fl. TIME TITLE PRESENTER(S) DESCRIPTION 8:55-9:25 AM Ubiquitous Computing and the State of the Third- Party Doctrine Jeffrey L. Vagle, Attorney, Pepper Hamilton LLP, Philadelphia, PA In the context of Fourth Amendment searches and seizures, the third-party doctrine stands for the proposition that a person does not have a reasonable expectation of privacy in information that he or she has voluntarily exposed or communicated to a third party. When the third-party doctrine was first articulated in the courts, the data it covered included the address information on the outside of envelopes, landline telephone billing records, paper bank records, and the like. Today, it is much more common to send an or text message than mail a letter, and the phones we now use share a great deal more information with the carrier, including detailed GPS location data. Since the advent of smartphones, many of us are carrying an Internet-connected computer in our pocket at all times. Thus, while the data covered by the third-party doctrine today still may not include the actual content of messages, the data that it does apply to, often called metadata, can yield just as much and sometimes more information about the message than the actual content. Where does that leave the third-party doctrine? This CLE will summarize the current state of the third-party doctrine in today s law. This topic has become especially important in light of recent cases involving government use of cell site data, text messages, and metadata, and the recent revelations of wide-scale government surveillance. Topics covered will include: What is the basis for the third-party doctrine, and where are courts finding friction points with the current use of technology? Does it matter whether customers know how much and what kind of data they are sharing with their carriers and ISPs? Where do and text messages fall under third-party doctrine? Where does third-party doctrine fit with the concept of big data analytics?

2 9:30-10:00 AM 10:05-10:35 AM 10:35-10:45AM When Past Performance May Be Indicative of Future Results Legal Implications of Using Location-Based Services Data to Predict Future Behavior Brainspray and the Law Bruce Antley, Assistant General Counsel, America Online Line, Washington, DC Ted F. Claypoole, Attorney, Womble Carlyle Sandridge & Rice, LLP, Charlotte, NC Location-based services (LBS) such as navigation and check-in apps particularly those delivered through smart phones are increasingly becoming a part of everyday life. The ability to know specifically where a person is located is a powerful asset for businesses. That information can be used to help deliver relevant services such as traffic and weather reports and even advertising for nearby businesses. Even more powerful, though, is the ability to use current location data combined with historical location data to make predictions about a person s future behavior and deliver services that are relevant to what the person will be doing. This use of LBS technology and data, however, raises critical issues, including data and privacy protection. Join a lawyer from MapQuest/AOL to discuss the implications of these services. Fueled in part by the astronomical growth in sales of smart phones and other devices that track location, businesses are able to tap into an enormous supply of LBS data concerning the whereabouts of their customers. This data is being used to provide services based on the current location of users, but as businesses begin to combine current location data with past location and other data, they will be able to make predictions about future behavior. Existing laws and regulations, written before the boom in LBS, do not provide clear guidance on how this data may be collected and used, but the potential risks to businesses may be enormous. Over the past ten years, scientists, technologists and businesses have begun to develop technology that can externally read and interpret brain signals, or brainspray. Numerous experiments have demonstrated that the power of thought can be harnessed for replacing lost limbs or even training others without a word. Businesses have been founded to allow human/computer interaction based only on directed thoughts. The U.S. military is experimenting with ways to harness the direct brain power of its pilots, soldiers and sailors. Before the commercial use of brainspray becomes commonplace, lawyers should understand the implications for privacy and intellectual property. There are currently no rules restricting invasive use of the technology or protecting intellectual property from being drawn directly from the heads of others, but conflicts in these areas are coming. The presentation will show the scientific, technical and legal issues raised by the harvesting of brainspray for medical or commercial purposes, and will discuss what lawyers can do to direct the rules into the right direction. BREAK in Aspen, 2 nd Fl. 10:45-11:15 AM Bitcoins: Where They Came From and Where They Are Headed Andrew Shipe, Attorney at Law, Arnold & Porter LLP, Washington, DC Presentation will cover highlights in the evolution of bitcoin from an algorithm generated by a group of anonymous computer geeks to a digital currency that has captured international attention. Key developments include the rise of bitcoin exchanges, intensive competition in mining new bitcoins, increasing venture capital investment in all sorts of companies related to bitcoin, and the regulatory framework in which bitcoin operates. Then we examine the future of bitcoin, including the SEC filing for a bitcoin trust issuing ETFs backed by bitcoin and the developing alternative digital currencies, such as Peer Coin and Litecoin.

3 11:20-11:55 AM Copyrightability of APIs Jeremy Smith, Registered Patent Attorney, Huntsville, AL The copyrightability of software has always been a contentious issue, both in legal circles as well as among developers. As developers realized that their creations were artistic and elegant (and highly valuable) they sought to protect their creation often through copyright protection. One particularly thorny issue has always been the copyrightability of APIs (or application programming interfaces) which allow software programs to communicate with one another. In Google v. Oracle, the District Court Northern District of California, held that APIs were not copyrightable and thereby invalidated several copyrights held by Oracle. This decision is currently on appeal to the Federal Circuit Court of Appeals. This CLE will review the District Court s opinion, the arguments on appeal, the practical implications for software companies seeking to protect their software, and if an opinion has been rendered, the Federal Circuit s opinion. 12:00-1:10 PM INSTITUTE LUNCH Aspen, 2 nd Fl. TIME TITLE PRESENTER DESCRIPTION 1:15-2:00 PM Snooping, Spying, and Cyber Espionage: Civil Liberties vs. Theft of Trade Secrets Konrad L. Trope, Attorney, Centurion Law Group, P.C., Beverly Hills, CA Jim Spertus, Attorney, Spertus, Landes & Umhofer, LLP. Los Angeles, CA The various cyber-security scandals of recent months involving former NSA contractor Eric Snowden, have caused the press and related media to focus on violations of civil liberties by governments seeking to counter the threats from terrorists. However, subsequent revelations about cyber-espionage attacks by China and Iran have shown that the theft of trade secrets and other electronic data from private industry may be the bigger threat. Indeed, the standards imposed by various governments upon telecommunications systems to assist law enforcement, pose a major threat to the data networks of every industry: from defense and aerospace to health care companies and law firms. This presentation will look at the history of wiretapping by governments around the world and then assess the current technology protocols imposed by world governments for facilitating government eavesdropping, and how those protocols might be the very reason that rogue regimes so often bombard the Internet security walls of private industry.

4 2:05-2:50 PM 2:50-3:00 PM Theft of Trade Secrets Through Cyberspace Roundtable/Breakout Promotion Mark Mermelstein, Attorney, Orrick, Herrington & Sutcliffe LLP, Los Angeles, CA Michael Weil, Attorney, Orrick, Herrington & Sutcliffe LLP, Los Angeles, CA Andy Crain, Vice President of Forensics and Collections, Discovia, San Francisco, CA Theft of IP and trade secrets, whether by an insider or a hacker, has emerged as a significant threat to our nation s businesses, not only in terms of the loss of the stolen IP but also the collateral consequences such as the reputational impact on the company for failure to safeguard its own or client secrets, and the regulatory and civil lawsuits that follow. During this presentation we will discuss: The impact that IP Theft has on companies What to do if it happens to a company; and Steps that a company can take to help prevent IP theft Jon Rubens will highlight the upcoming Roundtables and the breakouts that will follow them in A, 2 nd Fl. Phil Weiser Dean, Law School University of Colorado Aspen, 2 nd Fl. 3:00-3:45 PM Phil Weiser is Dean of the Law School, a Thomson Professor of Law, and Executive Director and Founder of the Silicon Flatirons Center for Law, Technology, and Entrepreneurship at the University of Colorado. Dean Weiser joined the Colorado faculty in January 1999, where he served until July From July 2009-April 2010, he served as the Deputy Assistant Attorney General at the United States Department of Justice s Antitrust Division. From April 2010-June 2011, he served as the Senior Advisor for Technology and Innovation to the National Economic Council Director at the White House. He became Dean of the Law School in July, Dean Weiser graduated with high honors from both the New York University School of Law and Swarthmore College. He served as a law clerk to Justices Byron R. White and Ruth Bader Ginsburg at the United States Supreme Court and to Judge David Ebel at the Tenth Circuit Court of Appeals. Prior to joining the Colorado Law faculty, Dean Weiser served as senior counsel to the Assistant Attorney General in charge of the Antitrust Division at the United States Department of Justice, advising him primarily on telecommunications matters.

5 3:45-5:00 ROUNDTABLES PM ROOM TABLE TOPIC MODERATOR TOPIC B, 2 nd Fl. A, 2 nd Fl. The Patentability of Software When the CFAA and the SCA cause 'Digital Death' Phong Nguyen, Jeremy Smith Christina Kunz The world relies on computers and also the software that controls those computers. It was accepted law in the United States that computer software was, if novel and non-obvious, protectable under the patent law. However, in 2010, the United States Supreme Court issued the Bilski v. Kappos decision which, in many ways, turned the law concerning the patentability of computer software on its head. The courts, the United States Patent Office, litigants and inventors are still grappling with guidance (or lack thereof) set forth in the Bilski decision. This roundtable will discuss the current state of the patentability of software and the implications of the current trends in the law. When a natural person or decedent is represented by a conservator, POA, or personal representative (a "fiduciary"), the fiduciary's attempts to access the online accounts of the represented person or decedent are within the definition of "unauthorized access" (essentially hacking) under the Computer Fraud and Abuse Act. In addition, the Stored Communications Act forbids many (but not all) online service providers from disclosing the account content or allowing account access to fiduciaries. To address some of these concerns, the Uniform Law Commission is drafting a uniform law on Fiduciary Access to Digital Assets. The current draft proposes some interesting state law provisions that try to work around or avoid the federal statutory obstacles. Chris Kunz, the ABA Business Law Section Advisor to the drafting committee, will lead a discussion focused on the internet law issues and solutions being considered by the drafting committee. For the most recent draft, go to Don't avoid this discussion just because you can't remember anything about wills and trust law--it won't matter. Questions regarding the harm caused by violations of expectations of privacy loom large in debates over privacy law. How are people injured when information about them is collected, disclosed, or used in ways that defy their expectations, existing agreements, or established rules or norms? Which of these harms should privacy laws be designed to prevent? And how should those laws go about doing so? These questions are often answered skeptically. Elm, 2 nd Fl. Revisiting Privacy Harm Jason Haislmaier Whether from digital advertisers, developers of new technologies, or our own government, arguments against the notion of harm abound and resistance to reforms runs high. At the same time, new technologies, practices, and techniques of data collection and analysis continue to raise ever newer and potentially greater threats of harm. As regulators and lawmakers consider adopting new ways of talking about harm, and while some privacy advocates move toward more abstract notions of harm or even away from harm entirely, this roundtable will revisit the conversation about harm and discuss how privacy harm is being applied in the privacy laws and standards of today and those looming on the horizon.

6 Ash, 2 nd Fl. Long-term Post- Snowden Reform Proposals for the Executive and Legislative Branches David Delaney President Obama and Congress must jointly begin a multi-year strategic effort to address systemic issues in cyber intelligence programs to improve the nation s strategic posture for the next era of the Information Age. Strategic reform of Congress, the military and intelligence entities has been crucial to prepare for the Cold War, correct excesses of the 1970s and 80s, and meet the demands of protracted counterterrorism undertakings overseas since 9/11. At a time when military, intelligence, and law enforcement communities are significantly expanding and integrating their cyber operations to amass, analyze, and share data on unprecedented scales, it is particularly important to consider changes that can better accomplish strategic national interests while preserving the rule of law through legitimizing organizations and processes. In this discussion Professor Delaney will suggest long-term reform objectives and comment on proposals from Congress, the President s Review Group on Intelligence and Communications Technology, and the Privacy and Civil Liberties Oversight Board. 5:00-6:00 PM Winter Working Meeting Breakout Sessions LOCATION A, 2 nd Fl. SUBCOMMITTEE / PROJECT Authorship Opportunities: Corporate Toolkit Project and Wolters Kluwer e-compliance Chapter Project LEADER(S) Sarah Jane Hughes / Jon Rubens DESCRIPTION Corporate Toolkit Project : For some years, the Corporate Counsel Committee has produced a treatise entitled The Corporate Tool Kit. The book is ready for its next revision, which was delayed from 2013 to At the 2013 WWM, we recruited volunteers to handle some of the "chapters" that the Tool Kit project leaders had identified as needing CLC contributors, and we now expect that Corporate Counsel would like to proceed with the project with chapters due in late May for Fall 2014 publication. This project is separate from, but not necessarily in conflict with, the project for which many CLC members have volunteered to revise the Wolter Kluwer volume. Indeed, there could be useful overlap. Participants who can contribute a section or a full chapter or more are encouraged to attend. Wolters Kluwer e-compliance Chapter Project: We have been asked to help update this ecompliance deskbook chapter. The sections are quite short a few paragraphs to a couple pages. Please consider helping on one of this sections. The unassigned sections are not yet spoken for. Here is a list of sections that may still be available: Advertising - B2B and Antitrust - and Electronic Documents - Spam and Spyware - Securities Law - Tax - Net Neutrality -

7 Elm, 2 nd Fl. Ash, 2 nd Fl. Cybersecurity Checklist Internet Governance Task Force Lisa Lifshitz/ Ariane Siegel David Satola and Michael Kelly The Cloud Security Checklist Project (co-led by Lisa R. Lifshitz and Ariane Siegel) will continue to work on and finalize the draft Cloud Computing Security Checklist that was initially prepared by the Working Group this year. We will be looking for comments and anticipate some good discussions around Cloud Security best practices. We will also discuss the proposed dissemination of the Checklist. The Task Force will report on the proceedings of the recent Internet Governance Forum held in Bali, Indonesia, in October In this working session, the Task Force will also examine the potential impact other recent developments around international efforts at Internet governance in the wake of the Snowden affair, especially the call by the Governments of Brazil, India and South Africa, together with ICANN, to host a summit on the future of multi-stakeholders in Internet governance and the formation of a high-level Panel On the Future of Global Internet Cooperation. One report suggests, for example, that these efforts might result in requirements of ISPs to host data on a country-by-country basis, trending towards a Balkanization of the Internet, reinforcing control of nation states over the Internet. 6:00-10:00 PM COMMITTEE RECEPTION AND DINNER TIME DESCRIPTION LOCATION 6:00 - Cocktail Hour Four Seasons Hotel Bar 7:30 PM 7:30-10:00 PM Official Cyberspace Law Committee Dinner B, 2 nd Fl., Four Seasons Hotel Day 2: February 1, :30-9:00 am: CONTINENTAL BREAKFAST in Aspen, 2 nd Fl. Sponsored by General Dynamics Fidelis Cybersecurity Solutions, Inc 9:00-10:15 AM Winter Working Meeting Breakout Sessions LOCATION TITLE LEADER(S) DESCRIPTION Ash, 2 nd Fl. B, 2 nd Fl. Consumer International Trade John Rothchild / James Nehf John Gregory and Hal Burman The Consumer Protection will host a presentation entitled "Consumers and the Internet of Things." The "Internet of things" refers to the growing number and range of everyday physical objects that are linked through wireless networks, allowing them to communicate with us and with each other. Home thermostats, wi-fi video cameras, the bathroom scale, smart refrigerators, and personal exercise monitoring devices are examples of the limitless sorts of devices that make up the Internet of Things. Privacy and security are the main consumer protection issues that this technology raises. (A) Top item and short turn-around time after the WWM will be recommendations on the latest draft Framework Agreement on E-Commerce of the UN Economic and Social Commission for Asia and the Pacific.

8 A tight time squeeze, but an opportunity for Cyberspace folks to continue to have a meaningful impact on this process in the Asian-Pacific area. There will be a new draft just out and likely be a final UNESCAP working meeting late February which means we can get WWM comments and proposed changes onto that table but will not have much turnaround time after the WWM. By the time it reaches their plenary meeting if it does in May 2014 there won t be as much room to get changes made, so the push would be now and the WWM is situated date-wise to do that. The latest draft will be available online (link will be sent out) or thru co-chairs John Gregory and Hal Burman. (B) Proposals for on-line dispute proceedings for cross border e-commerce and whether that can cover both B2B and B2C. Recommendations can be made in time for the next meeting of UNCITRAL s Working Group III in mid-march at New York (possible coverage of that and the Working Group IV meetings can be discussed). The concepts of how to create meaningful access to enforcement for small and medium size businesses and smaller claims, which constitute a much larger volume of e- commerce, are potentially more difficult than coming to agreement on draft rules for handling online disputes. Whether that should also cover B2C claims is controversial so input on that would be timely. (C ) The status of draft standards on signature authentication, cross-border use of e-documents, etc. at the UN Economic Commission for Europe (UNECE) Centre for Trade Facilitation and Electronic Business (CEFACT), and the draft standards on cross-border transfer of interests in goods at UNCITRAL s Working Group IV, plus the time table for comments/recommendations. (D)Time permitting) current e-commerce projects underway or to be proposed at several international bodies will be considered to see if tracking those and possibly adding some to the s action items would be appropriate. These include the International Telecommunications Union (ITU), and two African regional bodies, OHADA (Organization for the Harmonization of Business Law in Africa) and SADC (Southern African Development Community).

9 Elm, 2 nd Fl. Cloud Computing Checklist Philip Schmandt / Bill Denny The Cloud and IT Services is preparing a Cloud Computing Checklist, intended to aid practitioners when reviewing and negotiating cloud computing contracts or explaining them to clients. This is not, however, a typical checklist. Typically, the purpose of a checklist is to lead the reader through a list of all of the issues or questions that should be considered for the particular transaction. We did not feel this would be possible for a cloud computing checklist due to the multiple different types and purposes of cloud computing contracts. The purpose of this checklist is not to be all-encompassing. Instead, its purpose is to stimulate the reader to ask what other questions may be applicable to the commercial transaction at hand that is being contemplated for the cloud. The checklist will provide direction as to where to find resources and will in some cases provide sample clauses. We are inviting subcommittee members to assist in developing the checklist and to prepare thematically-linked short written pieces that can be packaged together to provide commentary to the checklist. 10:15-10:45 BREAK in Aspen, 2 nd Fl. AM 10:45-12:00 pm: Winter Working Meeting Breakout Sessions LOCATION TITLE LEADER(S) DESCRIPTION Elm, 2 nd Fl. Ash, 2 nd Fl. Digital Media mcommerce Jon Garon Ted Claypoole / Richard Balough The Digital Media will be updating the working group on the status of the Goodlatte Comprehensive Copyright Reform process and discussing whether the committee would like to prepare any written materials for the hearings. Second, the committee will discuss the Department of Commerce s Internet Policy Task Force Green Paper on Copyright Policy, Creativity, and Innovation in the Digital Economy released on July 31, Third, the committee will look into publishing a paper or developing a CLE on the future of TV/Video, particularly in light of the split whether micro-antennae constitute public transmission. Of course, there will also be an opportunity to entertain any other projects suggested by participants. Join the M-Commerce to discuss our upcoming panel presentation on the Internet of Things, and help decide what topics and speakers should be featured. We will be continuing discussion of our Bring-Your-Own-Device white paper and seeking ideas and writers for that project. Time permitting, we will update the team on the latest in mobile tracking technology law, mobile app licensing, and take suggestions for upcoming presentations and projects. B, 2 nd Fl. International Trade John Gregory and Hal Burman Continuation of the 9 am meeting. 12:00-1:15 PM LUNCH--ON YOUR OWN

10 1:15-2:30 pm: Winter Working Meeting Breakout Sessions Block 2 LOCATION TITLE LEADER(S) DESCRIPTION B, 2 nd Fl. Elm, 2 nd Fl. Ash, 2 nd Fl. Criminalization of Technology Task Force Professional Responsibility and Technology Task Force Electronic Financial Services Cathy Gellis Lois Mermelstein/ Juliet Moringello Steve Middlebrook The Criminalization of Technology Task Force will meet again to revisit the ideas discussed last year in Los Angeles. In particular, we'll consider what sorts of written materials we might produce, such as the primer we had earlier considered doing to give business lawyers some guidance on how to identify, prepare for, and respond to government actions taken against their clients' technology use and development, as well as whatever other ideas we might brainstorm. The Task Force on Professional Responsibility and Technology, co-chaired by Lois Mermelstein and Juliet Moringiello, will meet at the Winter Working Meeting in Denver to discuss some "clean up " work involving the Ethics 20/20 amendments related to technology. Some of you provided comments to the Ethics 20/20 Commission regarding these changes, and you may remember that not all of them were adopted. Charlie McCallum, the chair of the Section's Professional Responsibility Committee has asked for our help in explaining to the Standing Committee on Ethics and Professional Responsibility why some of the technology- related amendments were not handled appropriately and in suggesting other technology-related areas in which a formal opinion from the Standing Committee might be helpful. The Electronic Financial Services subcommittee will meet to discuss bitcoin and other virtual currencies. Topics will include FinCEN regulations, law enforcement actions against Liberty Reserve and Mt. Gox, recent Congressional hearings, foreign regulation, bitcoin price volatility, business models and private investment activity. We will discuss potential subcommittee projects related to virtual currencies. 2:30-3:00 PM Plenary Wrap up A, 2 nd Fl. (Chair Jon Rubens: housekeeping, discuss plans for evening)

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs *This is a sample course catalog. BBNA is in the process of moving all of our recorded content on to our new platform. Not all

More information

Solo Practitioner Beverly Hills, California 1989-1998

Solo Practitioner Beverly Hills, California 1989-1998 NINA MARINO 9454 Wilshire Boulevard Suite 500 Beverly Hills, California 90212 Tel: (310) 557-0007 marino@kaplanmarino.com EMPLOYMENT Partner, Kaplan Marino, PC Beverly Hills, California 1998-present Solo

More information

RESUME OF HENRY J. SILBERBERG

RESUME OF HENRY J. SILBERBERG Henry J. Silberberg Silberberg Resolution Services P.O. Box 16496 Beverly Hills, CA 90209 Phone: 310-276-6671 Fax: 716-299-3693 henry@silberbergresolution.com RESUME OF HENRY J. SILBERBERG Introduction

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity

More information

22 ND ANNUAL REVIEW OF THE FIELD

22 ND ANNUAL REVIEW OF THE FIELD 22 ND ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW CO-SPONSORED BY THE AMERICAN BAR ASSOCIATION STANDING COMMITTEE ON LAW AND NATIONAL SECURITY CENTER FOR NATIONAL SECURITY LAW, UNIVERSITY OF VIRGINIA

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

CURRICULUM VITAE. BRYAN C. SKARLATOS 212-808-8100 bskarlatos@kflaw.com. Adjunct Professor, Taxation New York University School of Law

CURRICULUM VITAE. BRYAN C. SKARLATOS 212-808-8100 bskarlatos@kflaw.com. Adjunct Professor, Taxation New York University School of Law CURRICULUM VITAE BRYAN C. SKARLATOS 212-808-8100 bskarlatos@kflaw.com PROFESSIONAL POSITIONS: Partner, Kostelanetz & Fink, LLP 7 World Trade Center New York, New York 10007 Adjunct Professor, Taxation

More information

Information Security Law: Control of Digital Assets.

Information Security Law: Control of Digital Assets. Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security

More information

J. D.,University of La Verne School of Law, California 1989. United States Court of Appeal,Ninth Circuit 1990

J. D.,University of La Verne School of Law, California 1989. United States Court of Appeal,Ninth Circuit 1990 NINA MARINO 9454 Wilshire Boulevard Suite 500 Beverly Hills, California 90212 Tel: (310) 557-0007 kaplan@kaplanmarino.com EMPLOYMENT Partner, Kaplan Marino,PC Beverly Hills, California 1998-present Solo

More information

Email Data Security. The dominant business communication tool

Email Data Security. The dominant business communication tool Email Data Security Jim Brashear General Counsel Zix Corporation Dallas Business Uses Email The dominant business communication tool Time spent on email exceeds time spent on all other communication tools

More information

Telephone: +1 408 918 4523 Fax: +1 408 918 4501 E-mail: neilasmith@comcast.net EDUCATIONAL AND PROFESSIONAL QUALIFICATIONS

Telephone: +1 408 918 4523 Fax: +1 408 918 4501 E-mail: neilasmith@comcast.net EDUCATIONAL AND PROFESSIONAL QUALIFICATIONS ARBITRATION AND MEDIATION CENTER Neil Arthur SMITH Ropers Majeski Kohn Bentley 50 West San Fernando Street Suite 1400 San José, CA 95113 United States of America Telephone: +1 408 918 453 Fax: +1 408 918

More information

Erik B. Wulff. Represented multi-brand global hotel company in connection with worldwide exclusive development ventures for several hotel brands

Erik B. Wulff. Represented multi-brand global hotel company in connection with worldwide exclusive development ventures for several hotel brands Erik B. Wulff Partner EDUCATION Indiana University (1976) J.D. cum laude Indiana University (1973) B.S. Member, Beta Gamma Sigma with distinction ADMISSIONS District of Columbia 500 Eighth Street, NW Washington,

More information

Medical Marijuana. The Times They Are A-Changin. April 1, 2011 Hotel Nikko San Francisco. Hotel Nikko. Hotel Reservations. 222 Mason St.

Medical Marijuana. The Times They Are A-Changin. April 1, 2011 Hotel Nikko San Francisco. Hotel Nikko. Hotel Reservations. 222 Mason St. The Best Faculty. The Best Experience. Since 1983. REGISTER NOW! 2 n d Annual Seminar Medical Marijuana April 1, 2011 Hotel Nikko San Francisco The Times They Are A-Changin Hotel Nikko 222 Mason St. San

More information

ALI-ABA Audio Seminar

ALI-ABA Audio Seminar ALI-ABA Audio Seminar Tiffany v. ebay: Roadmap for Avoiding Liability or Short Detour for Trademark Owners? August 6, 2008 Telephone Seminar/Audio Webcast PROGRAM SCHEDULE FACULTY PARTICIPANTS FACULTY

More information

Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation

Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie Developments in Security Regulation Agenda Introduction PM & C Cybersecurity Review Mandatory Data Retention Legislation Overview

More information

22 nd Annual Review of the Field of National Security Law

22 nd Annual Review of the Field of National Security Law ABA_Security_Law_Program_#72865:Layout 1 11/28/12 1:30 PM Page 1 A NATIONAL SECURITY CONFERENCE 22 nd Annual Review of the Field of National Security Law CO-SPONSORED BY THE American Bar Association Standing

More information

Section Council Scope Notes Revised September 2006

Section Council Scope Notes Revised September 2006 Section Council Scope Notes Revised September 2006 Administrative Law To inform and advise the members of the bar who practice in the field on current developments in administrative law. To provide a forum

More information

UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA WESTERN DIVISION CLASS ACTION SETTLEMENT NOTICE

UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA WESTERN DIVISION CLASS ACTION SETTLEMENT NOTICE UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA WESTERN DIVISION RONALD C. BETTEN and ESTHER LAFA, individually and on behalf of a class of similarly situated individuals, Case No. CV13-02885-CBM-(FFMx)

More information

Intellectual Property. Litigation and. Enforcement PATENT, TRADEMARK COPYRIGHT. 360 IPR Management and IPR Audit

Intellectual Property. Litigation and. Enforcement PATENT, TRADEMARK COPYRIGHT. 360 IPR Management and IPR Audit A Corporate, Tax and Business Advisory Law irm IP & IT Division Intellectual Property Litigation and Enforcement 360 IPR Management and IPR Audit PATENT, TRADEMARK COPYRIGHT THE IRM Vaish Associates is

More information

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November

More information

Efficient alternative dispute resolution (ADR) for intellectual property disputes

Efficient alternative dispute resolution (ADR) for intellectual property disputes 13.1 Efficient alternative dispute resolution (ADR) for intellectual property disputes More and more rights holders are recognizing the benefits of using private neutral mechanisms that allow parties to

More information

understanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats;

understanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats; GermanoLawLLC provides client- focused counsel and assistance regarding cybersecurity and data privacy concerns. We help companies understand, prepare for and address internal and external cybersecurity

More information

DONALD LAWRENCE ZACHARY

DONALD LAWRENCE ZACHARY Personal Data Sheet DONALD LAWRENCE ZACHARY 371 Brockmont Dr. Glendale, CA 91202-1302 Telephone: (818) 637-2495 Telecopier: (818) 549-0524 Email: dzachary@dlzlaw.com www.dlzlaw.com. October 2002 - Present

More information

Retaliatory Hacking: Risky Business or Legitimate Corporate Security?

Retaliatory Hacking: Risky Business or Legitimate Corporate Security? Retaliatory Hacking: Risky Business or Legitimate Corporate Security? 1 Presenter: Sean L. Harrington Cybersecurity Partnership Manager and information security risk assessor in the banking industry; Digital

More information

White House Report May Have Long-Term Effect on Consumer Privacy and How Companies Do Business

White House Report May Have Long-Term Effect on Consumer Privacy and How Companies Do Business White House Report May Have Long-Term Effect on Consumer Privacy and How Companies Do Business April 10, 2012 Boston Brussels Chicago Düsseldorf Houston London Los Angeles Miami Milan Munich New York Orange

More information

Thank you for the opportunity to join you here today.

Thank you for the opportunity to join you here today. Ambassador Daniel A. Sepulveda Remarks on the U.S. Privacy Framework and Signals Intelligence Reforms November 3, 2015 Digital Europe Brussels, Belgium Thank you for the opportunity to join you here today.

More information

STATEMENT OF DAVID A. O NEIL ACTING ASSISTANT ATTORNEY GENERAL CRIMINAL DIVISION UNITED STATES DEPARTMENT OF JUSTICE BEFORE THE

STATEMENT OF DAVID A. O NEIL ACTING ASSISTANT ATTORNEY GENERAL CRIMINAL DIVISION UNITED STATES DEPARTMENT OF JUSTICE BEFORE THE STATEMENT OF DAVID A. O NEIL ACTING ASSISTANT ATTORNEY GENERAL CRIMINAL DIVISION UNITED STATES DEPARTMENT OF JUSTICE BEFORE THE COMMITTEE ON OVERSIGHT & GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT OPERATIONS

More information

United States House of Representatives United States House of Representatives. Washington, DC 20515 Washington, DC 20515

United States House of Representatives United States House of Representatives. Washington, DC 20515 Washington, DC 20515 April 17, 2015 The Honorable John Boehner The Honorable Nancy Pelosi Speaker of the House Democratic Leader United States House of Representatives United States House of Representatives H-232, U.S. Capitol

More information

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote

More information

Sherrese M. Smith. Washington, D.C. Practice Areas. Admissions. Education. Partner, Corporate Department sherresesmith@paulhastings.

Sherrese M. Smith. Washington, D.C. Practice Areas. Admissions. Education. Partner, Corporate Department sherresesmith@paulhastings. Sherrese M. Smith Partner, Corporate Department sherresesmith@paulhastings.com Sherrese Smith is a partner in the Telecommunications, Media, and Technology (TMT) and Privacy and Cybersecurity practices

More information

Douglas M. DePeppe Cyberlaw Attorney

Douglas M. DePeppe Cyberlaw Attorney Douglas M. DePeppe Cyberlaw Attorney doug@aspireip.com Cyber Risk Services Cyber Space Cyber Law International Cyber Frameworks IP Litigation George Washington University Law School, LL.M. The Judge Advocate

More information

Please see Section IX. for Additional Information:

Please see Section IX. for Additional Information: The Florida Senate BILL ANALYSIS AND FISCAL IMPACT STATEMENT (This document is based on the provisions contained in the legislation as of the latest date listed below.) BILL: CS/CS/SB 222 Prepared By:

More information

EDISCOVERY FOR FEDERAL GOVERNMENT PRACTITIONERS

EDISCOVERY FOR FEDERAL GOVERNMENT PRACTITIONERS EDISCOVERY FOR FEDERAL GOVERNMENT PRACTITIONERS Wednesday, June 25, 2014 Georgetown University Law Center Washington, DC CLE 7.0 CLE credit hours (based on a 60-minute credit hour) including 1.0 ethics

More information

Future Proof Your ediscovery Practices

Future Proof Your ediscovery Practices FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Future Proof Your ediscovery Practices Plenary Session February 4, 2015 Patrick Collins, Partner, Perkins Coie Bruce Hartley, Vice President, Celerity Consulting

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

Cyber Risks in the Boardroom

Cyber Risks in the Boardroom Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing

More information

Community. What inspires you? GIVING BACK TO OUR. 16 Beacon Street Boston, MA 02108. To make a difference, visit:

Community. What inspires you? GIVING BACK TO OUR. 16 Beacon Street Boston, MA 02108. To make a difference, visit: GIVING BACK TO OUR Community The BBA s long history has enabled us to form partnerships with organizations which better serve the Boston community. The BBA partners with the Bankruptcy Court in order to

More information

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

Surviving the Era of Hack Attacks Cyber Security on a Global Scale Surviving the Era of Hack Attacks Cyber Security on a Global Scale Dr. Adriana Sanford ASU Lincoln Professor of Global Corporate Compliance and Ethics Clinical Associate Professor of Law and Ethics This

More information

Medical Marijuana. N o w in So u t h e r n California! What A Long Strange Trip Ahead? December 6, 2010 Hyatt Regency Irvine. www.cle.

Medical Marijuana. N o w in So u t h e r n California! What A Long Strange Trip Ahead? December 6, 2010 Hyatt Regency Irvine. www.cle. N o w in So u t h e r n California! The Best Faculty. The Best Experience. Since 1983. Medical Marijuana What A Long Strange Trip Ahead? December 6, 2010 Hyatt Regency Irvine Synopsis of Legal Landmarks

More information

Partner, Kaplan Marino, PC Beverly Hills, California 1998-Present

Partner, Kaplan Marino, PC Beverly Hills, California 1998-Present RICHARD D. KAPLAN 9454 Wilshire Boulevard Suite 500 Beverly Hills, California 90121 Tel: (310) 557-0007 kaplan@kaplanmarino.com EMPLOYMENT Partner, Kaplan Marino, PC Beverly Hills, California 1998-Present

More information

ADELE BERNHARD 78 North Broadway, White Plains, NY 10603 (C) 917-648-4035 (O) 914-422-4230 abernhard@law.pace.edu EMPLOYMENT

ADELE BERNHARD 78 North Broadway, White Plains, NY 10603 (C) 917-648-4035 (O) 914-422-4230 abernhard@law.pace.edu EMPLOYMENT ADELE BERNHARD 78 North Broadway, White Plains, NY 10603 (C) 917-648-4035 (O) 914-422-4230 abernhard@law.pace.edu EMPLOYMENT PACE UNIVERSITY SCHOOL OF LAW, 1994-present Associate Professor of Law I direct

More information

AIPLA. electronics & computer patent law summit AIPLA. Electronics & Computer Patent Law Summit. june 24, 2010. www.aipla.org

AIPLA. electronics & computer patent law summit AIPLA. Electronics & Computer Patent Law Summit. june 24, 2010. www.aipla.org electronics & computer patent law summit Electronics & Computer Patent Law Summit june 24, 2010 the grand hyatt denver, co american intellectual property law association 241 18th street south, suite 700

More information

Presidential Summit Reveals Cybersecurity Concerns, Trends

Presidential Summit Reveals Cybersecurity Concerns, Trends Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,

More information

Fostering Incident Response and Digital Forensics Research

Fostering Incident Response and Digital Forensics Research Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel bruce.nikkel@ubs.com September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital

More information

APPENDIX: OVERVIEW OF PUBLIC INTEREST WORK

APPENDIX: OVERVIEW OF PUBLIC INTEREST WORK APPENDIX: OVERVIEW OF PUBLIC INTEREST WORK Public interest work is done in a wide variety of practice settings. Lawyers also use different advocacy approaches. Finally, different organizations focus on

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

MAIN BIO EXPERIENCE SPEECHES PUBLICATIONS NEWS

MAIN BIO EXPERIENCE SPEECHES PUBLICATIONS NEWS CONTACT INFORMATION mjschmitt@michaelbest.com T 312.596.5828 F 312.222.0818 vcard Chicago Two Prudential Plaza, 180 North Stetson Avenue Suite 2000 60601 LEGAL ASSISTANT Lois T. Spurlock T 312.222.0800

More information

GEORGE L. WILLIS Assoc. Clinical Professor and Director of the Tax Law Clinic

GEORGE L. WILLIS Assoc. Clinical Professor and Director of the Tax Law Clinic GEORGE L. WILLIS Assoc. Clinical Professor and Director of the Tax Law Clinic EDUCATION CHAPMAN UNIVERSITY SCHOOL OF LAW J. D. WITH TAXATION EMPHASIS, 1998 CALIFORNIA STATE UNIVERSITY, LONG BEACH B. A.,

More information

Draft WGIG Issues Paper on Spam

Draft WGIG Issues Paper on Spam Draft WGIG Issues Paper on Spam 1. Issue Spam directly engages a very wide range of stakeholders that includes individual consumers, all organizations of whatever size in the private and public sectors

More information

Michael J. McGuire. Focus Areas. Overview

Michael J. McGuire. Focus Areas. Overview Chief Information Security Officer Shareholder 1300 IDS Center 80 South 8th Street Minneapolis, MN 55402 main: (612) 630-1000 direct: (612) 313-7612 fax: (612) 630-9626 mmcguire@littler.com Focus Areas

More information

2016 SUMMER EXTERNSHIPS THE LOS ANGELES SUPERIOR COURT

2016 SUMMER EXTERNSHIPS THE LOS ANGELES SUPERIOR COURT 2016 SUMMER EXTERNSHIPS THE LOS ANGELES SUPERIOR COURT The Los Angeles Superior Court is now accepting applications for 2016 summer externships. The Court offers full-time externships in the following

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Walter F. Brown Jr. Profile. Practices. Education. Honors. Partner White Collar, Investigations, Securities Litigation & Compliance.

Walter F. Brown Jr. Profile. Practices. Education. Honors. Partner White Collar, Investigations, Securities Litigation & Compliance. Partner White Collar, Investigations, Securities Litigation & Compliance San Francisco (415) 773-5995 Profile Walter F. Brown, Jr., a partner in the San Francisco office, is a seasoned trial lawyer and

More information

Before. The House Committee on Small Business Subcommittee on Regulatory Reform and Oversight. March 16, 2006

Before. The House Committee on Small Business Subcommittee on Regulatory Reform and Oversight. March 16, 2006 Testimony of Ari Schwartz Deputy Director Center for Democracy and Technology Before The House Committee on Small Business Subcommittee on Regulatory Reform and Oversight March 16, 2006 Hearing on The

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

Philip E. Cutler. Legal Experience and Work History. Law Practice. Court Admissions MEDIATOR / ARBITRATOR PROFILE

Philip E. Cutler. Legal Experience and Work History. Law Practice. Court Admissions MEDIATOR / ARBITRATOR PROFILE Philip E. Cutler MEDIATOR / ARBITRATOR PROFILE Cutler Nylander & Hayton PS 1191 Second Avenue, Suite 1650 Seattle, WA 98101 Phone: 206-340-4600 Fax: 206-340-4646 Email: philcutler@cnhlaw.com Web: www.cnhlaw.com

More information

STEPHEN M. ORLOFSKY. Practice Concentration. 900200.00001/30331035v.2 A PENNSYLVANIA LLP

STEPHEN M. ORLOFSKY. Practice Concentration. 900200.00001/30331035v.2 A PENNSYLVANIA LLP A PENNSYLVANIA LLP STEPHEN M. ORLOFSKY 301 Carnegie Center Third Floor Princeton, NJ 08540 609.750.2646 fax 609.897.7286 orlofsky@blankrome.com Practice Concentration Stephen Orlofsky is the administrative

More information

February 17, 2011. Federal Trade Commission 600 Pennsylvania Avenue, NW Washington, DC 20580

February 17, 2011. Federal Trade Commission 600 Pennsylvania Avenue, NW Washington, DC 20580 February 17, 2011 Federal Trade Commission 600 Pennsylvania Avenue, NW Washington, DC 20580 Re: A Preliminary FTC Staff Report on Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework

More information

AIPLA Trade Secret Committee Report

AIPLA Trade Secret Committee Report AIPLA Trade Secret Committee Report DATE: April 9, 2013 COMMITTEE NAME: Trade Secret COMMITTEE LEADERSHIP: Janet Craycroft, Intel Corporation Chair John F. Marsh, Hahn Loeser & Parks LLP Vice Chair SUBCOMMITTEES:

More information

Draft WGIG Issues Paper on E-Commerce

Draft WGIG Issues Paper on E-Commerce Draft WGIG Issues Paper on E-Commerce This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review by all WGIG members, but it does not

More information

Charles A. De Monaco Partner

Charles A. De Monaco Partner Charles A. De Monaco Partner Pittsburgh, PA Tel: 412.394.6929 Fax: 412.391.6984 cdemonaco@foxrothschild.com Charles concentrates his practice in securities litigation and director and officer liability,

More information

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Moderator: Panelists: Honorable Preet Bharara, United States Attorney, Southern

More information

In-House Insurance Defense Counsel

In-House Insurance Defense Counsel In-House Insurance Defense Counsel Permissible Cost-Saving Measure or Impermissible Conflict of Interest? by Nathan Price Chaney Why have In-House Counsel? From Company s point of view: Control Effective

More information

Data Privacy and Cybersecurity Task Force

Data Privacy and Cybersecurity Task Force Data Privacy and Cybersecurity Task Force key contact Josephine Cicchetti Shareholder T: 202.965.8162 F: 202.965.8104 email We provide clients across industries with comprehensive counsel on complex, evolving,

More information

PROFESSOR HENRY H. DRUMMONDS ABBREVIATED CURRICULUM VITAE

PROFESSOR HENRY H. DRUMMONDS ABBREVIATED CURRICULUM VITAE PROFESSOR HENRY H. DRUMMONDS ABBREVIATED CURRICULUM VITAE Lewis & Clark College Northwestern School of Law Portland, Oregon, U.S.A. EDUCATION: J.D. Harvard Law School Senior Editor, Harvard Law Review

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President

More information

Who s Looking At Your Mobile Device? Data Security, Personal Privacy, and Information Governance in the Wireless World

Who s Looking At Your Mobile Device? Data Security, Personal Privacy, and Information Governance in the Wireless World Who s Looking At Your Mobile Device? Data Security, Personal Privacy, and Information Governance in the Wireless World Our Speakers Michael Arnold is a Solutions Program Manager with UnitedLex, a legal

More information

Special Report The HITECH Act

Special Report The HITECH Act Special Report The HITECH Act Privacy and Data Breach Notification Provision An Overview of the HITECH Act On February 17, 2009, President Obama signed into law the $787 billion stimulus package known

More information

Virtual Law Offices: A New and Lasting Frontier? By Devika Kewalramani 07-18-2012

Virtual Law Offices: A New and Lasting Frontier? By Devika Kewalramani 07-18-2012 Virtual Law Offices: A New and Lasting Frontier? By Devika Kewalramani 07-18-2012 The lawyering landscape is changing dramatically with the advent of the virtual law office (VLO): a secure Internet portal

More information

SUMMARY: The Defense Health Agency proposes to alter an. existing system of records, EDTMA 02, entitled "Medical/Dental

SUMMARY: The Defense Health Agency proposes to alter an. existing system of records, EDTMA 02, entitled Medical/Dental This document is scheduled to be published in the Federal Register on 10/27/2015 and available online at http://federalregister.gov/a/2015-27229, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE

More information

What every product manager should know about Intellectual Property: Patents, Copyrights, Trademarks. Varun A. Shah Patent Attorney

What every product manager should know about Intellectual Property: Patents, Copyrights, Trademarks. Varun A. Shah Patent Attorney What every product manager should know about Intellectual Property: Patents, Copyrights, Trademarks Silicon Valley Product Management Association February 3, 2010 Varun A. Shah Patent Attorney Hickman

More information

The Ethical Implications of NSA Surveillance for Lawyers. David G. Ries Clark Hill Thorp Reed

The Ethical Implications of NSA Surveillance for Lawyers. David G. Ries Clark Hill Thorp Reed The Ethical Implications of NSA Surveillance for Lawyers David G. Ries Clark Hill Thorp Reed 2 3 The June 2013 Headlines: NSA collecting phone records of millions of Verizon customers daily The Guardian,

More information

Lawrence D. Finder. Practice description. Practice focus

Lawrence D. Finder. Practice description. Practice focus Practice description Larry Finder has extensive experience in government investigations, corporate compliance counseling, federal grand jury, trial practice, internal investigations and business crimes.

More information

FCC Adopts Controversial Net Neutrality Rules Governing Broadband Internet Access Services

FCC Adopts Controversial Net Neutrality Rules Governing Broadband Internet Access Services January 2011 FCC Adopts Controversial Net Neutrality Rules Governing Broadband Internet Access Services BY CARL W. NORTHROP, MICHAEL LAZARUS & DAVID DARWIN The Federal Communications Commission (the FCC

More information

Chapter 6 The Constitution and Business. Laws that govern business have their origin in the lawmaking authority granted by the federal constitution.

Chapter 6 The Constitution and Business. Laws that govern business have their origin in the lawmaking authority granted by the federal constitution. Chapter 6 The Constitution and Business Laws that govern business have their origin in the lawmaking authority granted by the federal constitution. The Constitutional Powers of Government The Constitution

More information

*I am admitted to practice law in Connecticut, Colorado and the U.S. Federal Court.

*I am admitted to practice law in Connecticut, Colorado and the U.S. Federal Court. MARCIA CANAVAN, J.D., M.P.H. University of Connecticut School of Law 65 Elizabeth Street Hartford, Connecticut 06105 860-570-5133 marcia.canavan@law.uconn.edu EXPERIENCE Academic Acting Director, Lawyering

More information

Preservation of longstanding, roles and missions of civilian and intelligence agencies

Preservation of longstanding, roles and missions of civilian and intelligence agencies Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto

More information

THE STATE BAR OF CALIFORNIA INTELLECTUAL PROPERTY SECTION

THE STATE BAR OF CALIFORNIA INTELLECTUAL PROPERTY SECTION THE STATE BAR OF CALIFORNIA INTELLECTUAL PROPERTY SECTION PRESENTS Earn 7.5 Hours of MCLE Credit which includes 1.25 Hours of Legal Ethics Adults Only IP TUESDAY, FEBRUARY 24, 2015 Los Angeles Airport

More information

If You Paid Overdraft Fees to Bank of America,

If You Paid Overdraft Fees to Bank of America, UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF FLORIDA If You Paid Overdraft Fees to Bank of America, You may be Eligible for a Payment from a Class Action Settlement. A federal court authorized

More information

STEPHEN J. COSENTINO Partner

STEPHEN J. COSENTINO Partner STEPHEN J. COSENTINO Partner stephen.cosentino@stinsonleonard.com 816.691.2450 1201 Walnut Suite 2900 Kansas City, MO 64106 Steve Cosentino, an innovative leader in the information technology, software

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents CRS Reports & Analysis Print Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan, Information Research Specialist (rtehan@crs.loc.gov, 7-6739) View Key CRS Policy Staff May

More information

Subject Matter Conflicts The Next Wave in IP Malpractice Claims? How to spot the potential conflict and deal with it proactively.

Subject Matter Conflicts The Next Wave in IP Malpractice Claims? How to spot the potential conflict and deal with it proactively. Subject Matter Conflicts The Next Wave in IP Malpractice Claims? How to spot the potential conflict and deal with it proactively. Colin P. Cahoon Carstens & Cahoon, LLP 13760 Noel Road Suite 900 Dallas,

More information

HENRY G. MANNE PROGRAM IN LAW & ECONOMICS STUDIES LEC PUBLIC POLICY BRIEFING ON NOMI, SPOKEO, AND PRIVACY HARMS

HENRY G. MANNE PROGRAM IN LAW & ECONOMICS STUDIES LEC PUBLIC POLICY BRIEFING ON NOMI, SPOKEO, AND PRIVACY HARMS HENRY G. MANNE PROGRAM IN LAW & ECONOMICS STUDIES LEC PUBLIC POLICY BRIEFING ON NOMI, SPOKEO, AND PRIVACY HARMS NOVEMBER 12, 2015 HENRY G. MANNE PROGRAM IN LAW & ECONOMICS STUDIES LEC PUBLIC POLICY BRIEFING

More information

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing

More information

Bush Lets U.S. Spy on Callers Without Courts

Bush Lets U.S. Spy on Callers Without Courts Page 1 of 5 Article 1 NYTimes.com Go to a Section Welcome, 75200 - Membe NYT Since 1981 Bush Lets U.S. Spy on Callers Without Courts Advertisement By JAMES RISEN and ERIC LICHTBLAU Published: December

More information

Patrick J. Egan Partner

Patrick J. Egan Partner Patrick J. Egan Partner Philadelphia, PA Tel: 215.299.2825 Fax: 215.299.2150 pegan@foxrothschild.com Patrick is a former co-chair of the firm's White Collar Compliance & Defense Practice. He has more than

More information

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee

More information

FACT SHEET Contact: Office of Legislative and Public Affairs (703) 305-0289 Fax: (703) 605-0365

FACT SHEET Contact: Office of Legislative and Public Affairs (703) 305-0289 Fax: (703) 605-0365 U.S. Department of Justice Executive Office for Immigration Review Office of the Director 5107 Leesburg Pike, Suite 2600 Falls Church, Virginia 22041 FACT SHEET Contact: Internet: (703) 305-0289 Fax: (703)

More information

Law 5211 Trusts and Fiduciary Administration

Law 5211 Trusts and Fiduciary Administration Law 5211 Trusts and Fiduciary Administration The Spring semester course in Trusts (#5211) will cover both common law trusts and the Louisiana Trust Code and Louisiana jurisprudence. In addition to the

More information

GW Law Alumni Elective Courses Survey

GW Law Alumni Elective Courses Survey GW Law Alumni Elective Courses Survey About You 1. Year of graduation (if you hold multiple degrees from GW Law, please select your most recent graduation year) [drop-down list included 1925-2010] 2. Practice

More information

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015 CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015 On March 10, 2015 the Center for Strategic and International Studies, in conjunction with the Cybersecurity Unit of the U.S. Department of

More information

The San Francisco Attorney Fee Dispute Program: Attorney Fee Disputes In a Volatile and Uncertain Economy

The San Francisco Attorney Fee Dispute Program: Attorney Fee Disputes In a Volatile and Uncertain Economy The San Francisco Attorney Fee Dispute Program: Attorney Fee Disputes In a Volatile and Uncertain Economy Golden Gate Law School San Francisco, CA March 19, 2009 Noon-1pm (Lunch Buffet) 1pm-5pm (CLE Program)

More information

September 22, 2010. The Honorable Diane Feinstein 331 Hart Senate Office Building Washington, DC 20510

September 22, 2010. The Honorable Diane Feinstein 331 Hart Senate Office Building Washington, DC 20510 September 22, 2010 The Honorable Diane Feinstein 331 Hart Senate Office Building Washington, DC 20510 The Honorable Barbara Boxer 112 Hart Senate Office Building Washington, DC 20510 Dear Senator Feinstein

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 c11173008 Cybersecurity: Authoritative

More information

MASTER AGREEMENTS How to use them to advance academic and corporate interests

MASTER AGREEMENTS How to use them to advance academic and corporate interests MASTER AGREEMENTS How to use them to advance academic and corporate interests March 30-31, 2015 Purdue University Purdue Memorial Hall West Lafayette, IN The University Industry Demonstration Partnership

More information

NOTICE OF PENDING CLASS ACTION AND PROPOSED SETTLEMENT

NOTICE OF PENDING CLASS ACTION AND PROPOSED SETTLEMENT Karen Washington v. Key Health Medical Solutions Inc. NOTICE OF PENDING CLASS ACTION AND PROPOSED SETTLEMENT READ THIS NOTICE FULLY AND CAREFULLY; THE PROPOSED SETTLEMENT MAY AFFECT YOUR RIGHTS! IF YOU

More information

Government Experience

Government Experience Government Experience UNITED STATES GOVERNMENT Executive Branch The White House White House Counsel (1987-1989) Member, President's Foreign Intelligence Advisory Board (2006-2009) Member, Intelligence

More information

MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT

MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT MASSACHUSETTS WARRANTLESS CELL PHONE SEARCHES CASE HEADS TO THE SUPREME COURT The Fourth Amendment Guarantees a Right to Privacy and Protects Against Unreasonable Searches and Seizures; If Your Fourth

More information