| Information Technology Law Institute 2013 TOC |
|
|
| Chapter 1: Trademark Counterfeiting: On the Internet |
Heather J. McDonald ~ Baker & Hostetler LLP
|
|
| Chapter 2: Computer Hacking—The Threat to Personal and Business Security |
David Nardoni ~ PricewaterhouseCoopers LLP
Joseph V. DeMarco ~ DeVore & DeMarco LLP
|
|
| Chapter 3: Strategies for Navigating Government Requests to Monitor Online Activity |
David Nardoni ~ PricewaterhouseCoopers LLP
Joseph V. DeMarco ~ DeVore & DeMarco LLP
|
|
| Chapter 4: Congress Fixes Loophole in the Economic Espionage Act |
Joseph V. DeMarco ~ DeVore & DeMarco LLP
|
|
| Chapter 5: Legal Issues with Emerging Active Defense Security Technologies |
Kimberly Kiefer Peretti ~ Alston & Bird LLP
|
|
| Chapter 6: Why Privacy and Data Security Should Be at the Top of Every Business Agenda |
Lisa J. Sotto ~ Hunton & Williams LLP
|
|
| Chapter 7: Legal Implications of Big Data |
David Navetta ~ Info Law Group
|
|
| Chapter 8: Cloud Computing, Security Implications, and Mobile Privacy |
Paola Zeni ~ Director, Global Privacy - Legal and Public Affairs, Symantec Corporation
|
|
| Chapter 9: Pandora’s Printer: 3D Printing and Coming Intellectual Property Challenges |
Peter Brown ~ Peter Brown & Associates
|
|
| Chapter 10: JOBS Act: Jump Start Our Business Start-Ups |
John C. Yates ~ Morris, Manning & Martin, LLP
|
|
| Chapter 11: Data Breach: What’s My Exposure? |
Steven V. Hunter ~ Quarles & Brady LLP
|
|
| Chapter 12: The EU Delivers “One–Two Punch” to Computer Software Companies |
Steven V. Hunter ~ Quarles & Brady LLP
|
|
| Chapter 13: Recent Developments in Copyright Disputes Involving Online Content |
Peter J. Pizzi ~ Connell Foley LLP
|
|
| Chapter 14: Technology Assisted Review: What and Why? |
Peter J. Pizzi ~ Connell Foley LLP
|
|
| Chapter 15: Using Mobile Devices and Apps: What Are Your Confidentiality Obligations? |
Vincent J. Syracuse ~ Tannenbaum Helpern Syracuse & Hirschtritt, LLP
|
|
| Chapter 16: Legal Ethics in the Era of IPods, Cloud Computing and Facebook: Social Media and the Modern Jury Trial |
James Q. Walker ~ Richards Kibbe & Orbe LLP
|
|
| Chapter 17: Cloud Computing by Lawyers: Ethical Considerations and Managing Risk |
Merri A. Baldwin ~ Shareholder, Rogers Joseph O'Donnell, PC
|
|
| Chapter 18: Federal Trade Commission Tech & Privacy Law Enforcement |
Lesley Fair ~ Bureau of Consumer Protection, Federal Trade Commission
Marc S. Roth ~ Manatt Phelps & Phillips LLP
|
|
| Chapter 19: Social Media Leaps to the Small(er) Screen |
Joseph J. Lewczak ~ Davis & Gilbert LLP
|
|
| Chapter 20: Digital Comes to the Book Industry—Ebooks in 2013 |
Devereux Chatillon ~ Owner, Devereux Chatillon, Esq., Digital and IP Attorney
|
|
| Chapter 21: Digital Distribution and the Changing Worlds of Film, Television and Digital Media |
Lindsay Conner ~ Manatt, Phelps & Phillips, LLP
|
|
| Chapter 22: Computer Hacking—The Threat to Personal and Business Security (PowerPoint slides) |
David Nardoni ~ PricewaterhouseCoopers LLP
Joseph V. DeMarco ~ DeVore & DeMarco LLP
|
|
| Chapter 23: Hot Topics in Privacy and Data Security (PowerPoint Slides) |
Lisa J. Sotto ~ Hunton & Williams LLP
JoAnn Stonier ~ SVP/Global Privacy & Data Usage Officer, MasterCard Worldwide
|
|
| Chapter 24: Index to Information Technology Law Institute 2013 |
|
|