Publications and Speeches

BOOKS

LAW REVIEW ARTICLES

PROFESSIONAL ARTICLES

  • A Practical Approach to Mitigating Data Breach Exposure in an Interconnected World (with Spasser and Conner), LexisNexis® Emerging Issues Analysis (Aug. 2011)
  • Should the Electronic Communications Privacy Act be Reformed, Or Is It Still Adequate Protection? (with Lening and Koepsel), LexisNexis® Emerging Issues Analysis (Nov. 2010)
  • Whether Social Media "Harvesting" or "Scraping" is a Crime (with Lening and Koepsel), LexisNexis® Emerging Issues Analysis (Oct. 2010) 
  • The Effects and Means of Combating State-Sponsored Cyberthreats (with Lening and Koepsel), LexisNexis® Emerging Issues Analysis (Sept. 2010)
  • The Right of Privacy in Data Stored in “Cloud Computing” (with Lening and Koepsel), LexisNexis® Emerging Issues Analysis (Aug. 2010)
  • The Impact of Social Media and Web 2.0 Services on the Federal Government (with Lening and Koepsel), LexisNexis® Emerging Issues Analysis (July 2010)
  • Whether the Federal Government Should Regulate the Protection of Personal Data (with Lening and Koepsel), LexisNexis® Emerging Issues Analysis (June 2010) 
  • Do the FISA Procedural Rules Cover the National Security Agency? (with Lening and Koepsel), LexisNexis® Emerging Issues Analysis (May 2010)
  • Liability for Data Security and Privacy Breaches, 3:2 Andrews Privacy Reporter 16 (Oct. 2005)
  • Don’t Sign the Boilerplate! Negotiating Custom-Designed Software Contracts, 1 Awareness in Action, The Journal of New Hampshire Public Risk Management 59 (2005)
  • Cyber Policies: A Brave New World for Business Insurers, The (Concord, NH) Sunday Monitor (June 29, 2003); The (Manchester, NH) Union Leader (July 10, 2003)
  • Data Security and Privacy Law, New Hampshire Bar News (Mar. & May 2003) 
  • Cyberprotection Can Grow Your Firm, The (Philadelphia) Legal Intelligencer (Mar. 5, 2003)
  • Security Strategies, Law Technology News (Feb. 2003)
  • Beware the Cyberattacker, Philadelphia Lawyer Magazine (Winter 2003)
  • Getting the Upper Hand Against Cybersquatters, American Corporate Counsel Association e-Commerce Committee Newsletter and Intellectual Property Committee Newsletter (May 2001)
  • Internet Commerce Contract, American Corporate Counsel Association e-Commerce (June 2000)
  • E-Security and the Law, American Corporate Counsel Association e-Commerce Committee Newsletter (May 2000)
  • Y2K Update: Failures, Litigation & Legislation, Mealey's Year 2000 Report (Jan. 2000)
  • Information, the Gem of the Millennium, 6 Special Libraries Association Legal Division Quarterly 2 (Winter 2000)
  • The Year 2000 Problem, in Commercialization of Software in Brazil (Editora Forense 1999)
  • The Y2K Act: Summary, Tabular Analysis and Text, President's Council on Year 2000 Conversion website (July 1999) (distributed by Council throughout high technology industry)
  • The Y2K Act Provides Some New Protections, PC Week Online (July 1999)
  • Y2K State of the Art: Who Knew What and When?, 9 ABA Computer Litigation Journal (Apr. 1999)
  • Year 2000 Insurance Coverage: Is the Millennium Computer Crisis "Fortuitous"?, Y2K Advisor (Apr. 1999)
  • Year 2000 Information and Readiness Disclosure Act: Significant Definitions, President's Council on Year 2000 Conversion website (Mar. 1999) (hard copies distributed by Council to all federal agencies)
  • Year 2000 Compliance Surveys: Due Diligence or Dilemma?, Westergaard Year 2000 (Oct. 1998)
  • Y2K State of the Art: Who Knew What and When?, 1:9 Lexis Countdown 2000 (Oct. 1998) (cited in Michael R. Cashman, et al., Understanding, Preventing and Litigating Year 2000 Issues: Practical Strategies and Industry-Specific Solutions, Patents, Copyrights, Trademarks, and Literary Property Course Handbook Series, 556 Prac. L. Inst. 1187 (Mar.-Apr. 1999); Jason Coomer, The Y2K Millennium Bug, 62 Tex. Bar J. 282 (Mar. 1999))
  • SEC Issues Specific Y2K Disclosure Guidelines, Andrews Derivatives Litigation Reporter 10 (Oct. 1, 1998)
  • Analysis of New Y2K Litigation, 1:8 Lexis Countdown 2000 1 (Sept. 1998) (cited in Jennifer B. Cannata, Time is Running Out for Customized Software: Resolving the Goods Versus Service Controversy for Year 2000 Contractual Disputes, 21 Cardozo L. Rev. 283 (1999))
  • Y2K Remediation: Intellectual Property Infringement?, 1:3 Y2K Advisor (Sept. 1998)
  • SEC Issues More Detailed Y2K Disclosure Guidelines, 1:7 Andrews Year 2000 Law Bulletin 29 (Sept. 1998)
  • Year 2000 Compliance Survey and Agreement, 1:8 Mealey’s Year 2000 Report 39 (Sept. 1998)
  • Y2K Remediation: Intellectual Property Infringement?, 1:15 Hanson Y2K Lawyer’s Update 1 (Aug. 15, 1998)
  • Year 2000 Compliance Surveys: Due Diligence or Dilemma?, 1:7 Lexis Countdown 2000 3 (Aug. 1998)
  • Internet Commerce Contract, 12 American Corporate Counsel Association Newsletter 2 (Spring 1998)
  • Internet Service Provider Agreement, in Entertainment Industry Contracts, Matthew Bender & Co. (Oct. 1997)
  • Clean Rooms for Code Development and M&A Due Diligence, Phila. Legal Intelligencer (Nov. 1995)
  • Computer Vaporware and Computer Malpractice, Computer Law Reporter (Mar./Apr. 1990)

SELECTED PRESENTATIONS


LAW SCHOOL COURSES

  • CyberCrime, University of New Hampshire School of Law (2003-2014)
  • Software Licensing, University of New Hampshire School of Law (2007-2012)

PROFESSIONAL PRESENTATIONS

  • Legal Issues Every Fitness Business Should Know About, BOLD MindBody Conference, San Diego (Sept. 28, 2017), Hollywood, CA (Oct. 6, 2016)
  • Legal Issues Underlying Yoga Studio Creation and Management, Yoga Journal Conferences 2010-2016, Boston, Colorado, Florida, New York City, San Francisco and San Diego
  • 1st Annual IP Cafe: IP Licensing Panel, University of New Hampshire School of Law (Apr. 2011)
  • ISP Safe Harbor Protection Under the DMCA, Asociación Interamericana de la Propiedad Intelectual, Lima, Peru (Oct. 2009)
  • CyberCrime, U.S. Department of Justice, Washington, D.C. (Dec. 2008)
  • Security Breach Notification Laws, Boston University Security Camp (Mar. 2008)
  • CyberCrime, International Systems Security Association, Boston, (Nov. 2007)
  • CyberCrime, Minnesota Association of Corporate Counsel (Dec. 2006)
  • CyberCrime, International Systems Security Association, Boston (July 2006)
  • CyberCrime, International Systems Security Association, New Hampshire (June 2006)
  • Data Security and Privacy Law, New York City Bar Association (Aug. 2005)
  • Data Security and Privacy Law, Hartford (June 2005)
  • Privacy Roundtable with Professor Arthur R. Miller, West Group, Minneapolis (May 2005)
  • Data Security and Privacy Law, RSA Annual Security Conference, San Francisco (Feb. 2005)
  • CyberCrime, New Hampshire Public Radio (Apr. 2004)
  • Data Security and Privacy Law, Advanced Computer Law Institute, Washington, DC (Mar. 2004)
  • Data Security and Privacy Law, Boston Bar Association (Apr. 2003)
  • Data Security and Privacy Law, New York County Lawyers' Association (Feb. 2003)
  • Internet Law Update 2001, Pennsylvania Bar Institute, Philadelphia (May 2001)
  • Hackers, Spammers, Cybersquatters, ABA Annual Convention, New York City (July 2000)
  • Y2K, Computer Law Association Annual Convention, Washington, DC (Apr. 2000)
  • Y2K, Advanced Computer Law Institute Annual Meeting, Washington, DC (Mar. 2000)
  • Y2K, International Bar Association Annual Convention, Barcelona, Spain (Sept. 1999)
  • Y2K, ABA Annual Convention, Atlanta (Aug. 1999)
  • Y2K, National Bar Association Annual Convention, Philadelphia (July 1999)
  • Y2K, American Corporate Counsel Association, Houston (July 1999)
  • Y2K, Southwestern Association of Law Librarians Annual Convention, Denver (Apr. 1999)
  • Y2K, Testimony before the City Council, City of Philadelphia (Mar. 1999)
  • Y2K, LegalTech Annual Convention, New York City (Jan. 1999)

NOTABLE MEDIA QUOTES

  • Risk management tips for protecting your livelihood, Mindful Studio Magazine (Dec. 27, 2016) 
  • Yoga Journal Live: Keeping your studio in line with the law, SNews Yoga (Oct. 20, 2014)
  • 3 Reasons to Take a Summer Course, The National Jurist (Feb. 2012)
  • Lawyer: Student Setup Illegal, Concord Monitor (May 15, 2008)
  • Data Security & Privacy Law, ThompsonReutersLegal (Nov. 5, 2009)
  • Who’s Using Your Wi-Fi Network? The Risk of Surfing Unsecured, New Hampshire Bar News (May 9, 2008)
  • Ex-Girlfriend Accused of Net Campaign, Manchester Union Leader (Oct. 5, 2006)
  • Feds Go After Alleged NH-Based Spyware Operation, 11:12 Interface Tech News (Dec. 2005)
  • Internet Crime and Prosecution, New Hampshire Public Radio’s “The Exchange” (Apr. 27, 2004)
  • Protecting Yourself from Identity Theft, FindLaw.com (Mar. 14, 2003)
  • Lawsuit Via E-Mail Ruled Legal, SiliconValley.Internet.com (Mar. 22, 2002)
  • Internet Law Experts Warn: "Code Red Worm Just the Beginning," Findlaw.com (Aug. 21, 2001)
  • New York Court Makes Y2K Ruling, Office.com (Jan. 15, 2001)
  • Deciding Domain-Name Disputes Worldwide, The Legal Intelligencer (Oct. 10, 2000)
  • Year 2000 Rollover Problem, The Sequel, New York Times (Feb. 28, 2000)
  • A Y2K Glitch For Lawyers, Washington Post (Jan. 10, 2000)
  • It Ain't Over 'Til … A Post-Y2K Analysis of Y2K Litigation & Legislation, 31 Tex. Tech. L. Rev. 1195 (2000)
  • Y2K Glitches May Linger for Weeks, Associated Press, nationwide (Dec. 1999)
  • Insurance Companies Target for Y2K Suits, Associated Press nationwide (Dec. 1999)
  • Y2K, West Group video news release, nationwide (Fall 1999)
  • Y2K, WPVI-6 ABC News, Philadelphia (Fall 1999)
  • Insurance Coverage of Potential Year 2000 Claims, 23 Am. J. Trial Advoc. 49 (Summer 1999)
  • Y2K Law Affects Every Lawyer, Lawyers Weekly USA (Aug. 23, 1999) 
  • Y2K Countdown, CIO Magazine (Aug. 1, 1999)
  • Y2K Act, Congressional Quarterly Magazine (May 1999)
  • Y2K Act U.S. Senate debate, in Senate Congressional Record, 106 Cong. Rec. S4226-27 (daily ed. Apr. 27, 1999); 106 Cong. Rec. S6820 (daily ed. June 10, 1999); 106 Cong. Rec. S6979 (daily ed. June 15, 1999) (statements by Sen. Hollings)
  • Y2K Legal Battles Begin, BankRate.com (May 7, 1999)
  • The Millennium Bug: Digital Apocalypse Now?, 17 Temp. Envtl. L. & Tech. J. 15 (Fall 1998)
  • Speculation Runs Rampant as Lawyers Prepare for the Worst, 1:5 BNA Y2K Law Report (Aug. 1, 1998)
  • Revenge! How You Can Fight Code Theft, 12:11 Software Success Weekly 1 (Mar. 23, 1998)