Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
Former FBI Executive and Cybersecurity Leader Herbert Stapleton Joins Dinsmore’s National Corporate Practice
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
A Counterintuitive Approach to Winning Without Litigation: One-on-One with Haley Morrison
Lawyers Beware: There Could Be Serious Ethics Issues With The New AI Browsers
LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
Fox on Podcasting: Harnessing the Power of Niche
Navigating Employee Integration in Mergers and Acquisitions: Lessons From Pretty Woman — Hiring to Firing Podcast
FCPA Compliance Report: Stay the Course: Ellen Lafferty on Navigating Anti-Corruption Compliance in 2025
Multijurisdictional Employers, P2: 2025 State-by-State Updates on Non-Compete/Non-Solicitation Agts
6 Takeaways | From Tension to Teamwork: Real Strategies for Legal Collaboration
Hsu Untied interview with David Cohen, General Counsel at Infinite Athlete
Hsu Untied interview with Brad Waugh, General Counsel at TP-Link
Compliance Tip of the Day – New FCPA Enforcement Memo – What Does it Mean?
Hsu Untied interview with D'Lonra Ellis, CLO of Oakland A's
Your Guide to Dealing with Subpoenas Effectively
Episode 371 -- DOJ's New Corporate Enforcement Program
Shout Outs and Rants: Episode 153, The CW 25 Edition
Regulatory Ramblings: Episode 68 - Why Geopolitical Risk Matters to Compliance and Legal Staff with Mark Nuttal and Chad Olsen
Innovation in Compliance: Strategic Compliance in Regulated Industries with Kerri Reuter
It both rivals and compounds the transformation brought to us by advancements in computing technology, mobile technology, and the internet. The rapid evolution and commercialization of artificial intelligence (AI) tools has...more
A recent lawsuit involving an AI chatbot represents another indication of a possible shift in how courts will approach software under traditional strict products liability principles. Traditionally, courts have been hesitant...more
The Court of Justice of the European Union ("CJEU") ruled that modifying temporary variables in the working memory of a computer without enabling the reproduction or further execution of such a program does not constitute...more
Federal and state antitrust enforcers, as well as private plaintiffs, are actively investigating and challenging both the companies using pricing algorithms, and the software vendors or the data analytics firms providing the...more
As anticipated, cartel enforcement is ramping up at the start of 2024 and investigations relating to artificial intelligence (AI) are taking center stage. Leadership of both the broader Department of Justice (DOJ) and the...more
Generative artificial intelligence (AI) is a technology promising to disrupt how artwork is created, software is developed, and text is written. This disruption brings with it a host of new legal questions surrounding...more
On Friday, October 7, 2022, the Bureau of Industry and Security (BIS) released an interim final rule containing an enormous set of export controls that will likely damage the Chinese semiconductor, advanced computing, and...more
On December 10, 2021, multiple media outlets, the Cybersecurity and Infrastructure Security Administration (CISA), and the director of cybersecurity at the National Security Agency (NSA) began alerting to a significant...more
After several years of foreign and domestic negotiations surrounding controls on intrusion software, the U.S. Department of Commerce’s Bureau of Industry & Security (BIS) published an interim final rule on October 21, 2021,...more
On October 21, 2021, the Department of Commerce’s Bureau of Industry and Security (BIS) issued an interim final rule (the rule) implementing expanded export controls on cybersecurity items based on the belief that these items...more
On October 7, 2020, the Supreme Court heard arguments in Google v. Oracle, a decade-long battle challenging Oracle’s claim to own copyrights in certain aspects of its Java software platform that Google implemented in Android...more
A recent ruling in Parziale v. HP, Inc., arising out of the implementation by Hewlett-Packard (“HP”) of a remote firmware update on many models of the company’s printers, highlights the potentially broad application of the...more
United States export control, sanctions, and foreign investment (CFIUS) regulations advance U.S. national security and foreign policy interests, but in very different ways. They are also quite complex. As a result, media...more
A Maryland federal court recently weighed in on the still-murky world of insurance coverage for cybersecurity losses, finding replacement costs necessitated by a ransomware attack were “direct physical loss or damage” to a...more
The UK government recently released a policy paper outlining proposed requirements for makers of Internet of Things (IoT) devices to take certain actions to better protect IoT devices from growing cybersecurity threats....more
We’ve written extensively about the numerous lawsuits, dismissals and settlements surrounding the Illinois Biometric Information Privacy Act (BIPA). The statute, generally speaking, prohibits an entity from collecting,...more
Shortly after the new year, the Federal Trade Commission filed suit in the Northern District of California against D-Link Corporation, a Taiwan-based maker of wireless routers, Internet Protocol (IP) cameras, and software...more
Europe’s highest court has ruled that software owners have potentially greater rights to prevent the resale of back-up copies of their works than may exist in relation to the original licensed programs. The Court of...more
On September 7, 2016, the Fifth Circuit in GlobeRanger Corp. v. Software AG affirmed a $15 million judgment in a trade secret case. Although much of the opinion focused on jurisdictional issues, the portion of the opinion on...more
Trademark Office rules generally prohibit the broadening of goods and services identified in existing trademark registrations. But on September 1, the USPTO announced a new pilot program that will create a limited exception...more
On August 10, 2015, the Federal Circuit, acting en banc, ruled that the International Trade Commission (ITC) has the authority to prevent importation of products based on claims for induced infringement where the predicate...more
Websites sometimes present their terms of use (“TOU”) to users merely by including a link to those TOU on the website without requiring users to affirmatively accept the terms by, for example, checking a box or clicking an “I...more
As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more
It has been a challenging year for software patent owners following the Supreme Court’s decision in Alice Corp. v. CLS Bank International. Since that ruling was handed down, a large number of software patents have been...more
Following the Supreme Court's recent guidance in Alice Corp. v. CLS Bank International, several software patents have been invalidated by the Federal Circuit, and district courts. In Alice Corp., the court set out a two...more