Google’s Potential Influence: How The 2016 Presidential Election Could Be Decided

Political influence is a funny thing because it comes in a variety of forms and originates from a variety of sources. Fortune 500 companies inherently possess the ability to have an astounding amount of political influence on the world’s population because of the substantial amount of wealth that these companies control. In 2015, Google was


A Game of I Spy: Neighborhood Drone Usage

In July, a Kentucky man was arrested after he shot down a neighbor’s drone that he says was hovering over his yard where his daughter was sunbathing.William “Willie” Merideth, 47, of Bullitt County was charged with first degree criminal mischief and first degree wanton endangerment for shooting down an $1,800 drone that he says was


Silicon Valley backing “Siri for legal knowledge”

Picture this: You take your seat in your first-year Contracts course. The topic of the day is the Statute of Frauds. After outlining a hypothetical and quickly scanning the seating chart, your professor puts you on the spot: “Under these facts, would the Statute of Frauds preclude enforcement of the parties’ agreement?” Under cold call


CISA: Here We Go Again

SOPA, PIPA, CISPA, and now CISA, there has been no shortage of battles between those seeking to preserve the privacy historically associated with the internet and those worried about potential abuses of such anonymity. Members of the second group typically are concerned either with IP pirates’ use of the internet to more easily violate the


The End of Interoperability: U.S. Supreme Court Denies Certiorari in Oracle v. Google

On June 29, 2015, the U.S. Supreme Court took an action that has the potential to sabotage software innovation, put an end to open source software, and further confuse the already muddled state of copyright law regarding APIs. The following statement by technology expert Brian Proffitt regarding the significance of APIs serves to underscore the


Should Other Verein-Structured MegaFirms Worry after Dentons’ ITC Disqualification?

In May a U.S. International Trade Commission judge granted an order to disqualify Dentons U.S. LLP from representing the Ohio-based company RevoLaze against Gap in a patent suit. The case at issue began last August when Dentons partner Mark Hogge for RevoLaze filed a complaint with the U.S. International Trade Commission (“ITC”) accusing The Gap,


Apple’s New Security Features in iOS 9 Certain to Cause Problems for Law Enforcement

At Apple’s annual World Wide Developer Conference (WWDC) last month, the company announced their latest mobile operating system for phones and tablets, iOS 9. As is typical with Apple, this event included much fanfare and hyperbole. In addition to the announcements about all the software you didn’t know you needed, Apple quietly ratcheted up security


Plaintiffs Win Big in the “Case of the Devious Defecator”

On June 22, Jurors awarded $2.25 million in damages for plaintiffs Jack Lowe and Dennis Reynolds, whose DNA was unlawfully obtained by their employer, Defendant Atlas Logistics Retail Services (Atlanta), LLC. An Atlanta Judge had already ruled in the case of first impression that Atlas was violating the Genetic Information Nondiscrimination Act (“GINA”), 42 U.S.C.


DNA Testing Catches Rogue Chili’s Employee Who Spit in Customer’s Beverage

Tech law is not always about macro-level global headlines like drones, autonomous vehicles, or Edward Snowden. No, sometimes it’s just about a guy trying to enjoy dinner at Chili’s. Those who work in the food industry have been known to get back at rude or annoying customers from time to time by doing inappropriate things


Sanctions for Cyber Hackers? The White House Considers its Options

In April, in response to the cyberattacks on Sony Pictures last November, President Obama announced an executive action that allows the Treasury Department to impose punitive financial sanctions on hackers that threaten national security. In light of the recent cyberattacks on the computer system at the Office of Personnel Management, during which hackers gained access