Blog

Brian Mund
November 7, 2017

For most companies, it is only a matter of time before a savvy hacker slips through their Information Technology security infrastructure and accesses material non-public information. Unlike in the past, data breaches now trigger a slew of regulatory hurdles for the victimized company.

John S. Ehrett
April 18, 2017

The hotly contested 2016 presidential election was replete with misinformation, including widely-shared news stories suggesting that Pope Francis had endorsed Donald Trump for president[1] and that a Washington, D.C.

Ignacio Cofone, L.L.M. Candidate, Yale Law School
January 11, 2016

In February 2015, the FCC approved net neutrality rules by classifying broadband as a utility under Title II of the Communications Act[i] and banning paid prioritization of data packages, which would effectively divide the Internet into “fast lanes” and “slow lanes.”[ii] However, in December, Republicans in Congress inserted a rider into the appropriati

Robin Feldman, Vern Norviel
January 8, 2016

Roughly twenty years ago, newspaper headlines were packed with stories about Dolly the sheep — the first cloned mammal. More recently, in 2014, In re Roslin[iii] finally laid the patent claims related to Dolly to rest.  Although Roslin speaks specifically to cloning technologies, the saga highlights an essential problem in the current judicial approach to patenting life science inventions.  We will look first at the history of Roslin and then at its implications for patent law.

Jessica L. Roberts, Valerie Gutmann Koch
January 6, 2016

Inconsistencies in the Common Rule and the Law

Pages