Quantcast
Channel: MSBA Computer and Technology Law Section
Browsing all 28 articles
Browse latest View live

CLE: Texts, Lies and Backup Tapes

The following is a review by Diane Vlassis, JD, of the CLE entitled, "Texts, Lies and Backup Tapes: What You Must Know about E-Discovery to Prove Your Case and Avoid Big Mistakes," which both Sean...

View Article



Senate Defeats Cybersecurity Act a Second Time

Last night, the Senate voted on cloture of S.3414 (The Cybersecurity Act), which failed by 51-47, and which previously failed August 2d vote by failed 52-46.The OpenCongress.org bill summary is, as...

View Article

Congresswoman Lofgren proposes amending the Computer Fraud and Abuse Act

Introduced yesterday, it's just one...

View Article

New Cyber Security Bills to be Introduced to the House & Senate

Rep. Mike Rogers (R-Mich.), the chair of the US House Intelligence Committee intends to reintroduce H.R. 3523, the Cyber Intelligence Sharing and Protection Act ("CISPA"), which would provide for the...

View Article

Presidential Policy Directive on Critical Infrastructure Security and Resilience

Presidential Policy Directive on Critical Infrastructure Security and ResilienceThe Presidential Policy Directive, PPD-21, released on February 12 supersedes the 2003 Homeland Security Presidential...

View Article


Executive Order - Improving Critical Infrastructure Cybersecurity

The above-captioned Executive Order signed yesterday was developed to manage cybersecurity risks to critical infrastructure, and addresses two key issues: information sharing and development of a...

View Article

Bill, Social Networking Online Protection Act, Reintroduced 2/06/2013

The Social Networking Online Protection Act (SNOPA), "A bill to prohibit employers and certain other entities from requiring or requesting that employees and certain other individuals provide a user...

View Article

NIST Publishes RFI on CyberSecurity Framework

On February 26, the National Institute of Standards and Technology (NIST) published a request for information ("RFI") on the “Framework for Reducing Cyber Risks to Critical Infrastructure,” as directed...

View Article


“Information Technology and Cyber Operations: Modernization and Policy Issues...

The above-captioned was a hearing before the House Committee on Armed Services Subcommittee on Intelligence, Emerging Threats, and Capabilities, held March 13, 2013.  The entirety of the statements can...

View Article


DHS Cybersecurity: Roles and Responsibilities to protect the Nation’s...

The above-captioned hearing was before the House Committee on Homeland Security, held March 13, 2013.Members in attendance included Michael McCaul (R-Texas) Chairman, Peter T. King (R- New York) ,...

View Article

“Investigating and Prosecuting 21st Century Cyber Threats”

The above-captioned hearing was held before the House Committee on the Judiciary, Subcommittee on Crime, Terrorism, Homeland Security, and Investigation on March 13, 2013.Members in attendance...

View Article

Comments period extended for the Patent Assertion Entities/Antitrust workshop

The Dep't of Justice ("DoJ") and Federal Trade Commission ("FTC") have extended the comments period for the Patent Assertion Entities/Antitrust workshop. In December, a joint workshop was held by the...

View Article

House passes H.R. 624, the “Cyber Intelligence Sharing and Protection Act”

Last week, on April 18, the House passed the Cyber Intelligence Sharing and Protection Act ("CISPA").  The bill, including amendments, is...

View Article


House Judiciary Committee reviewing the Computer Fraud and Abuse Act

Earlier in January, I reported that Congresswoman Lofgren has proposed amending the Computer Fraud and Abuse Act ("CFAA") in response to the prosecution and subsequent suicide of Aaron Swartz and the...

View Article

Up next: ‘‘National Cybersecurity and Critical Infrastructure Protection Act...

A discussion draft is currently circulating in the House for the “National Cybersecurity and Critical Infrastructure Protection Act of 2013,” which concerns on the authorities of the Department of...

View Article


E-discovery law symposium tomorrow at Wlm Mitchell College of Law

Attend “You Love it, You Hate it. Now You Have to Live With it: E-Discovery” and you’ll hear a variety of perspectives on what e-discovery requires in litigation and the latest nuances in the...

View Article

ABA Cybersecurity Legal Task Force issues Report and Resolution 118

The Report and Resolution 118, adopted at the 2013 Annual Meeting in San Francisco, "condemns intrusions into computer systems and networks utilized by lawyers and law firms and urges federal, state,...

View Article


2013 Computer & Technology Law Institute

DATE & LOCATIONTuesday, November 19, 2013Minnesota CLE Conference Center 600 Nicollet Mall, Suite 370 Third Floor City Center, MinneapolisBelow are the individual CLE topics and abstracts, in...

View Article

Don't put all your eggs in one —er— cloud.

By guest author Thom Miranda* Are you one of the exploding number of small firms storing data in the cloud?   Consider using redundant resources before putting all your eggs in one (cloud) basket.A few...

View Article

ABA survey: lawyers at most large firms unaware of data breaches

A recent American Bar Association survey, Security Snapshots: Threats and Opportunities, conducted by the ABA's Legal Technology Resource Center, asserts that "Fully 70% of large firm respondents...

View Article
Browsing all 28 articles
Browse latest View live




Latest Images