China Solicits Comments on Good Supply Practices for Medical Devices
The China Food and Drug Administration recently published a draft regulation setting minimum standards for medical device distribution. The regulation sets forth requirements for procurement, delivery...
View ArticleThe NIST Cybersecurity Framework and Implications for the Financial Services...
The NIST Framework - The National Institute of Standards and Technology (NIST) issued a “Framework for Improving Critical Infrastructure Cybersecurity” on February 12th. This set of voluntary best...
View ArticleNew York DFS Identifies Potential Next Steps For Virtual Currency Regulation
On February 11, at an event on the future of virtual currency, New York DFS Superintendent Benjamin M. Lawsky reiterated his intention to move forward with a virtual currency rulemaking this year as...
View ArticleConsiderations If Conceding Infringement Or Designing Around
A decision issued by the Federal Circuit earlier this year raises a few things to have in mind when considering whether to concede infringement and when planning to design around a patent. In Proveris...
View ArticleNew UK Pharmaceutical Packaging Warnings: Lucy in the Sky with Directions for...
This client alert looks at the impact of a new drug driving offence in the UK which will come into effect during 2014 as part of The Crime and Courts Act 2013 (the “CCA 2013”). It is relevant for UK...
View ArticleBoom or bust for patent trolls?
House of Representatives passing the Innovation Act in December, and now heading for the Senate, does 2014 hold the answer to the patent troll question? Andrew Mizner reports. In 2013, the dockets of...
View Article2013 Year in Review: CDRH Promotion and Marketing Enforcement Letters
In 2013, FDA’s Center for Devices and Radiological Health (CDRH) made publicly available on its website a total of 22 promotion and marketing-related enforcement letters to device manufacturers. Of the...
View ArticleGoogle Settlement Ends Years of EU Antitrust Inquiries
In 2010, European regulators began investigating claims that Google abused its dominance in Internet search and advertising by favoring its own products and services in search results. Google powers 90...
View ArticleDon’t Be A Target: Mitigating Liability From Cyber Attacks
During the holiday season, Bullseye, a big box retailer, was the victim of a cyber attack that compromised the credit and debit card information (including PIN and CVV codes) of nearly 40 million of...
View ArticleWinter 2014 Federal Copyright and Trade Secret Legislation Update
Several bills under consideration in the 113th Congress would establish or significantly amend certain federal statutes related to the protection, enforcement, and exploitation of trade secrets or...
View ArticleEPA Seeks Comments by April 15 Regarding Hazardous Waste Compliance Burdens...
The Resource Conservation and Recovery Act (RCRA) and rules promulgated by U.S. EPA under RCRA regulate “hazardous” wastes generated by U.S. businesses. Under these laws, certain products that can be...
View ArticleFun with Facebook
In the last few months, numerous cases involving Facebook have resulted in amusing rulings that we would be remiss to ignore. On deck for this blog post we have three good ones......By: Greenberg...
View ArticleTowards consolidated rules for Product Placement in Italy?
Branded content is a hype word. Audiovisual content is meddled with products and vice-versa, while advertisers are more creative in devising new solutions. Within this context product placement is...
View ArticleNational Cybersecurity Framework Released - Has Your Organization Considered...
On February 12, 2014, the National Institute of Standards and Technology ("NIST") released the final version of its Framework for Improving Critical Infrastructure Cybersecurity (the "Cybersecurity...
View ArticleSilicon Valley Venture Survey - Fourth Quarter 2013
We analyzed the terms of venture financings for 124 companies headquartered in Silicon Valley that reported raising money in the fourth quarter of 2013....By: Fenwick & West LLP
View ArticleDriving Under the Influence (of Google Glass)
In September 2013, Socially Aware took a close look at the potential legal issues confronting users of Google Glass, the now instantly recognizable, compact head-mounted display mounted on a pair of...
View ArticleSEC Settles with Adviser and Its Principal over Misleading Mutual Fund and...
The SEC settled public administrative proceedings against Navigator Money Management (the “Adviser”), a registered investment adviser, and its principal, Mark A. Grimaldi (the “Principal”), over...
View ArticleImplementing a Bring-Your-Own-Device Policy: What Your Nonprofit Needs to Know
In this presentation: - Current Issues - Overview of BYOD Policies - Integrating BYOD in Your Workforce - Lessons from the Front Lines - Putting It All Together - Hypothetical Situations - Takeaways,...
View ArticleCyber-Security in Corporate Finance
The ICAEW has partnered with a task force, including the Law Society, the London Stock Exchange, the Takeover Panel and the Confederation of British Industry, to publish a guide on ‘Cyber-Security in...
View ArticleTCPA Connect - Feb 19, 2014
District Court Finds Consent a Valid Defense to TCPA Claims, Even When Customer Had Provided Phone Number Ten Years Before Autodialed Call - The issue of prior consent, and when and if such consent was...
View Article