This is Sean Harrington's Typepad Profile.
Join Typepad and start following Sean Harrington's activity
Join Now!
Already a member? Sign In
Sean Harrington
Recent Activity
National security and the safety and right to life of and the pursuit of happiness by every law-abiding person is, without reservation, at the very top of my personal list of priorities. But, such passionate convictions are not inconsistent with... Continue reading
On March 10, 2015 the Center for Strategic and International Studies, in concert with the Cybersecurity Unit of the Criminal Division of the U.S. Department of Justice, convened a group of private sector cybersecurity practitioners for a roundtable discussion regarding... Continue reading
Based on the ABA's 20/20 ethics committee, Minnesota is the latest state to adopt some new amendments, effective April 01, 2015. As these changes relate to technology, the following are some important highlights: Rule 1.1 (Competence) now includes the comment,... Continue reading
I will be presenting a two hour lecture on retaliatory hacking. If you have interest in cyber security topics, this is a great local and affordable conference to attend: http://secure360.org/ — Sean Continue reading
May 14-16, 2015 in Minneapolis | http://www.uianet.org/en/evenement/type-46990/brain-software-genomics-and-personalized-medicine Topics include" · Neurobiology & brain-based technologies · Neurocognitive enhancers & treatments · How patent attorneys & other lawyers protect innovation · Corporate biotech best practices · Regulations, treaties, & conventions relating to... Continue reading
Held yesterday, November 18th ___________________________ Co-sponsored by the Computer and Technology Law Section of the MSBA and Minnesota CLE, the 2014 Institute featured: • Thought-Provoking Opening Plenaries Presented by Privacy Experts • Top 10 Tech Law Developments in 2014 •... Continue reading
The Minnesota eDiscovery Working Group papers were published today (here): The undersigned provided legal & technical editing for the papers captioned, "An Electronic Discovery Primer," "Using Legal Holds for Electronic Discovery," and "IT Technologies and How to Preserve ESI Cost... Continue reading
A recent American Bar Association survey, Security Snapshots: Threats and Opportunities, conducted by the ABA's Legal Technology Resource Center, asserts that "Fully 70% of large firm respondents reported that they didn't know if their firm had experienced a security breach."... Continue reading
By guest author Thom Miranda* Are you one of the exploding number of small firms storing data in the cloud? Consider using redundant resources before putting all your eggs in one (cloud) basket. A few months ago, a fairly significant... Continue reading
DATE & LOCATION Tuesday, November 19, 2013 Minnesota CLE Conference Center 600 Nicollet Mall, Suite 370 Third Floor City Center, Minneapolis Below are the individual CLE topics and abstracts, in chronological order of their planned presentation. The Year in Review:... Continue reading
The Report and Resolution 118, adopted at the 2013 Annual Meeting in San Francisco, "condemns intrusions into computer systems and networks utilized by lawyers and law firms and urges federal, state, and other governmental bodies to examine and amend existing... Continue reading
Attend “You Love it, You Hate it. Now You Have to Live With it: E-Discovery” and you’ll hear a variety of perspectives on what e-discovery requires in litigation and the latest nuances in the e-discovery world. Speakers and panelists include... Continue reading
A discussion draft is currently circulating in the House for the “National Cybersecurity and Critical Infrastructure Protection Act of 2013,” which concerns on the authorities of the Department of Homeland Security. The bill, which appears to both substantially overlap with... Continue reading
Earlier in January, I reported that Congresswoman Lofgren has proposed amending the Computer Fraud and Abuse Act ("CFAA") in response to the prosecution and subsequent suicide of Aaron Swartz and the JSTOR academic documents hacking, and in response to criticism... Continue reading
Last week, on April 18, the House passed the Cyber Intelligence Sharing and Protection Act ("CISPA"). The bill, including amendments, is here: http://www.rules.house.gov/Legislation/legislationDetails.aspx?NewsID=1078. Currently, there is no corresponding Senate bill. The Senate is widely expected, however, to reintroduce information sharing... Continue reading
The Dep't of Justice ("DoJ") and Federal Trade Commission ("FTC") have extended the comments period for the Patent Assertion Entities/Antitrust workshop. In December, a joint workshop was held by the DoJ and FTC to discuss Patent Assertion Entity (PAE) behavior,... Continue reading
The above-captioned hearing was held before the House Committee on the Judiciary, Subcommittee on Crime, Terrorism, Homeland Security, and Investigation on March 13, 2013. Members in attendance included: Jim Sensenbrenner (R-WI, Chairman), Louie Gohmert (R-TX, Vice Chairman), Howard Coble (R-NC),... Continue reading
The above-captioned hearing was before the House Committee on Homeland Security, held March 13, 2013. Members in attendance included Michael McCaul (R-Texas) Chairman, Peter T. King (R- New York) , Patrick Meehan (R-Pennsylvania), Steven M. Palazzo (R-Mississippi), Chris Stewart (R-Utah),... Continue reading
The above-captioned was a hearing before the House Committee on Armed Services Subcommittee on Intelligence, Emerging Threats, and Capabilities, held March 13, 2013. The entirety of the statements can be found here. Read more after the bump. Members in attendance... Continue reading
On February 26, the National Institute of Standards and Technology (NIST) published a request for information ("RFI") on the “Framework for Reducing Cyber Risks to Critical Infrastructure,” as directed by the February 13 Executive Order on Improving Critical Infrastructure Cybersecurity.... Continue reading
The Social Networking Online Protection Act (SNOPA), "A bill to prohibit employers and certain other entities from requiring or requesting that employees and certain other individuals provide a user name, password, or other means for accessing a personal account on... Continue reading
The above-captioned Executive Order signed yesterday was developed to manage cybersecurity risks to critical infrastructure, and addresses two key issues: information sharing and development of a cybersecurity framework. Information Sharing Under this Executive Order, the Government will expand current information... Continue reading
Presidential Policy Directive on Critical Infrastructure Security and Resilience The Presidential Policy Directive, PPD-21, released on February 12 supersedes the 2003 Homeland Security Presidential Directive (PPD-7). The intent of the Directive is to provide an “all hazards” approach to the... Continue reading
Rep. Mike Rogers (R-Mich.), the chair of the US House Intelligence Committee intends to reintroduce H.R. 3523, the Cyber Intelligence Sharing and Protection Act ("CISPA"), which would provide for the sharing of certain cyber threat intelligence and cyber threat information... Continue reading
Introduced yesterday, it's just one page: http://www.lofgren.house.gov/images/stories/pdf/draft%20lofgren%20bill%20to%20exclude%20terms%20of%20service%20violations%20from%20cfaa%20%20wre%20fraud%20011513.pdf This is in response to the prosecution and subsequent suicide of Aaron Swartz and the JSTOR academic documents hacking, and in response to criticism that the preexisting law is both vague and outdated.... Continue reading