News and Published Articles

  • “No, Not All ICOs are Securities”, Coindesk, February 18, 2018
  • “The agency that stepped up: Federal Trade Commission”, SC Magazine, March 2, 2015
  • “Beyond the Honey Pot”, CFO, October 7, 2013
  • “State Social Media Privacy Laws a Mixed Bag for Businesses”, ComputerWorld, May 13, 2013
  • “Taking Copyright Fight to ISPs too Punitive, say critics”, CSO, March 5, 2013
  • “The Network Security and Privacy Gauntlet”, New Jersey Law Journal, February 6, 2012
  • “Digital Risk Management”, The Risk Report, Volume XXXIV, Issue 3, November 2011
  • “Breach Insurance Gains Steam”, Security Management, September 22, 2011
  • “Does Our Network Security and Privacy Policy Cover Cloud Exposures?”, Betterley Report at 12, June 2011
  • “Elephant in the Room: The Potential for Data Breach Statutory Damages”, ABA ISC Information Security and Privacy News, Summer 2011
  • “Cost-Effective Risk Management of Electronic Health Information”, ISSA Journal, February 2011
  • Information Security and Privacy: A Practical Guide for Global Executives, Lawyers, and Technologists (Chapter on Risk Treatment), ABA Books, February 2011
  • “Managing the Risk of EHR Usage in 2010”, ABA ISC Information Security and Privacy News, Spring 2010
  • “Risk Management of Electronic Health Records”, The Risk Management Quarterly, Spring 2010
  • “Are You Covered: Why Insurance Should be Part of Your SAM Program”, 4 ITAK Journal 1, 2008
  • “Are You Covered: Insurance for First-Party IT Risk”, 3 ITAK Journal 7, 2007
  • “The Need for Network Security Insurance”, Federation Flyer, the Newsletter of the Federation of Defense and Corporate Counsel, Spring 2005
  • “Gaps in Traditional Coverage: The Need for Network Security Insurance”, The Risk Management Letter, Volume 25, Issue 2, 2004
  • “Virtual Reality Liability Update”, The Risk Management Letter, Volume 23, Issue 3, 2002
  • “Virtual Reality Liability, Part II”, The Risk Management Letter, Volume 19, Issue 7, 1998
  • “Copyright Violations Causing a Furor Over Net Piracy”, The Star-Ledger, December 2, 1996
  • “Virtual Environment Products: Avoiding Product Liability Suits”, CyberEdge Journal, Jan/Feb 1994
  • “Judicial Treatment of Damages Exclusions Negotiated in Custom Software Licenses”, 25 U.C.C.  Law Journal 240, 1993
  • “Freedom of Contract Under the UCC: The Ability of Software Vendors to Exclude Recovery of Consequential Damages”, 25 U.C.C. Law Journal 133, 1992
  • “Commercial Party May Not Recover Economic Losses Under Product Liability Claim – East River S.S. Corp. v. Transamerica Delaval, Inc., 106 S.Ct. 2295 (1986), 17 Seton Hall L. Rev. 505, 784 (1987)
  • Res Ipsa Loquitur, Software Protection, March 1986
  • Res Ipsa Loquitur, Software Patentability, February 1986

Intellectual property and data breach counsel