Technology & Entrepreneurship
  • Bio Folder (0)
    Save attorney bios to the Bio Folder to email page links or generate a PDF containing all of your saved pages.
  • Print
  • Text Size A

Technology & Entrepreneurship

Tips for Building Your Personal and Business Brand

Data Breach Prevention and Response

The threat of data breaches is higher than ever. Large scale and highly publicized breaches are hitting companies across a wide range of industries, from retailers to hospitals and financial institutions. Watch an interactive discussion with Foley Hoag and Kroll on best practices companies should implement to prevent and respond to data breaches. More »

Podcast: Coping with Non-Competes

Podcast: Coping with Non-Competes

An infringement on innovators’ personal liberties or a legitimate way for innovative companies to protect their intellectual property rights? Mike Rosen discusses the debate over non-compete agreements.
Click here to listen
to the podcast.
Join the LinkedIn Group

Join the LinkedIn Group

Join the Boston Women Entrepreneurship Network group on LinkedIn!
This group brings together entrepreneurs and other professionals to share advice, support and promote the acceleration of more female-led companies in New England. Click here to join.
Patenting in a Post-America Invents Act World

Tech Events

More Events

Industry News

More News

Free TEC Calendar App

The TEC Calendar app offers users the most comprehensive and up-to-date calendar for technology-related business educational and networking events.

Download the app today!

More

Insights

  • A Trap For Santa: The First Santa Claus IP Fight

    December 15, 2014 | David Kluft

    At this time of year, you may be wondering about the first intellectual property case involving Santa Claus. And even if you are not, we are going to tell you.

    More »

  • Medical Billing Provider and its Former CEO Settle FTC Charges That They Misled Consumers About Collection of Personal Health Data

    December 15, 2014 | Jeremy Meisinger

    In an age when many of us briskly scroll through website terms and conditions and check, “I agree” without thinking, how should businesses design their websites to obtain proper authorization to access users’ sensitive information?

    More »

More Insights

Our Team

Previous Next

Gil Arie

Partner

Read Bio | Email

Paul G. Sweeney

Partner

Read Bio | Email

Matthew S. Eckert

Partner

Read Bio | Email

Mark A. Haddad

Partner

Read Bio | Email

Meredith A. Haviland

Partner

Read Bio | Email

Alexander J. Aber

Partner

Read Bio | Email

David A. Broadwin

Partner

Read Bio | Email

Prithvi Tanwar

Associate

Read Bio | Email

Joshua S. Jarvis

Associate

Read Bio | Email

Adrienne Ellman

Associate

Read Bio | Email

More Team Members