blogging beyond

We have a lot of opinions and ideas—and we are not shy about sharing them. Here, you will find fresh content from the Sequel team and guest bloggers about the latest legal, Internet, technology and market developments and trends. Have an idea for a future topic to be addressed and discussed in our blog? Please contact us at info@sequeltechlaw.com with your idea.

Posted by Sequel on August 21, 2015
Topic: blogs
Tags: Bloomberg BNA, Cohen & Jessup LLP, cybercrime, cybersecurity, data breach, data privacy, Data Security, Ervin, Patrick Fraioli, Privacy, Security, small and medium-size businesses, SMBs

What Small and Medium-Size Businesses Can Do To Recover from Cybercrime

We found Bloomberg BNA’s recent interview with Patrick Fraioli, partner and chairman of the Data Privacy & Security Workgroup at Ervin, Cohen & Jessup LLP, quite insightful. The overarching theme of Mr. Fraioli’s interview is that small and medium-size businesses (SMBs) are feeling the greatest impact from cybercrime. As Sequel has said before, and as […]

> read more
Posted by Sequel on August 21, 2015
Topic: blogs
Tags: data privacy, data protection, Europe, European Commission, European Parliament, International Business Machine, Liam Benham

U.S. Businesses Need To Get Serious About Europe’s Data Protection

Guidelines for U.S. firms operating in Europe could become much tighter as Europe’s data protection watchdog is calling to enforce costly fines on businesses violating new data-privacy rules. This should act as a wakeup call for U.S. businesses to get serious about this issue. The European Commission and many national governments are pushing for a […]

> read more
Posted by Sequel on June 17, 2015
Topic: blogs
Tags: cyberattacks, hackers, internal processes, network security, personal data, verbal confirmation

Verbal Confirmation: Protecting Yourself Against Sophisticated Cyberattacks

Small businesses and law firms are not immune to cyberattacks, which is why regularly evaluating network security and internal processes is critically important. Hackers now have the ability to pull together disparate pieces of information about you using computerized brute force attacks, which are essentially massive computers with pre-programmed algorithms trying every possible logical password. […]

> read more
Posted by Sequel on July 2, 2014
Topic: blogs, Copyrights
Tags: Google, Scanning Books

Federal Court Rules Scanning of Library Holdings Falls Within ‘Fair Use’ Exception

In a closely watched case, the Federal Court of Appeals for the Second Circuit has ruled that the scanning of book contents by libraries for archival and research purposes constitutes a ‘Fair Use’ of those copyrighted materials. Ruling in Authors Guild, Inc. v. HathiTrust, No. 12-4547, 2014 U.S. App. Lexis 10803 (2d Cir. Jun. 10, […]

> read more
Posted by Sequel on June 27, 2014
Topic: blogs, Patents
Tags: Enforcement, Method patents, Process patents, Supreme Court

Supreme Court Makes it Tougher to Defend Method Patents

In a unanimous decision earlier this month the U.S. Supreme Court ruled that in order for an infringement suit defending a method patent to succeed, every step in the method must be infringed by the same party or parties under its direct control. The case, Limelight Networks, Inc. v. Akamai Technologies, Inc., involved a situation […]

> read more