Just as the U.S. Department of Commerce’s National Institute of Standards and Technology (“NIST”) completes its version 1.0 National Framework for Improving Critical Infrastructure Cybersecurity, California Attorney General Kamala Harris has made clear she intends a leadership role for California. With the just published guide entitled “Cybersecurity in the Golden State: How California Businesses Can […]
Copyright Owners Would Enjoy Greater Protections Under Legislation Pending in U.S. Congress
Last week we discussed pending legislation working its way through the U.S. Congress that would strengthen several statutes to better protect protect IP owners from trade secret misappropriation and provide them with more sweeping and powerful remedies in the event their trade secrets are stolen. This week we discuss several pieces of legislation being proposed […]
Pending Trade Secret & Copyright Legislation Could Further Protect American IP Owners
Several bills moving their way through the United States Congress would establish or substantially amend certain federal statutes pertaining to protecting, enforcing, and exploiting trade secrets and copyrights created in the United States. Some legislation is aimed at establishing a private right of action for trade secret theft under federal law and to prevent trade […]
Protecting California’s Children in the Digital World
The California legislature has taken another step in the enormous task of protecting children in the digital world. And Governor Brown has endorsed its efforts. On September 23, 2013, Governor Brown signed California’s minor “eraser law,” which is the first of its kind in the country and will require web companies like Facebook, Twitter, and […]
California Consumer Privacy Protections Expanded
In 2002, California became the first state in the union to enact a data breach notification law. The statute requires California businesses or businesses that own or license computerized data that includes personal information of California residents to disclose when there has been a breach of a security system used to protect that data. Since […]

