The Goals of Animal Rights and Animal Welfare Groups Do Not Align.

  Reports from two animal-related trade organizations provide insight into the current status and goals of animal rights organizations intent on eliminating the use of animals by humans, without regard to how humanely those animals are treated. Based on these revealing comments from activists it remains vitally important that the public is exposed to the differences between animal rights activists and animal-related industries whose goals are to ensure that animals under the care of humans are treated humanely. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

Chief Judge Stark Grants Defendants’ Motion for Invalidity of ‘405 Patent for Nonenablement

By Memorandum Opinion entered by The Honorable Leonard P. Stark in Enzo Life Sciences, Inc. v. Abbott Laboratories et al., Civil Action No. 12-274-LPS (D.Del. August 18, 2017 (public version), the Court granted Defendants Abbott Laboratories and Abbott Molecular, Inc.’s Motion for Summary Judgment of Invalidity of U.S. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

USDA Re-posts a New Version of Its Searchable Database of Animal Welfare Act Licensees

As USDA had previously suggested, it just posted a new version of the searchable database that had been dismantled this past February.  Access to the new version is available here. Many animal rights organizations and animal-trade organizations had expressed outrage or concern when USDA initially dismantled its database.   View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

Issues with Online Emotional Support Animals Medical Verifications

By | Fair Housing Defense | August 18, 2017
  The issue of online medical verifications for emotional support animals (ESA’s) is an ongoing problem for professional apartment management. As written in this space before, we want to approve all legitimate reasonable accommodation requests for our residents who need assistance animals. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

Hackers Surveyed On Their Favorite Ways to Access Your Data

Cybercrooks’ preferred path to critical data is through privileged accounts, those held by users who have broad access and powers within the target’s network. That’s according to a recent survey conducted by the cybersecurity firm Thycotic at the recent Black Hat conference in Las Vegas, reported Infosecurity Magazine.   View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

Immigrant Visa Processing Changes – EB1 China/India Will Become Current; EB2/3 India and China Continue to Advance; EB2/3 Worldwide Will Remain Current; Visa Office On Priority Dates, Demand, and Predictions

By | Immigration View | August 16, 2017
In our continuing series of reports, Charles (“Charlie”) Oppenheim, Chief of the Visa Control and Reporting Division, U.S. Department of State, shares his most recent analysis of current trends and future projections for the various immigrant preference categories with AILA (the American Immigration Lawyers’ Association). View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

What Can a California Employer Do About Off Duty Conduct?

By | California Employment Law | August 15, 2017
The news is full of stories of employers taking action, or allegedly not taking sufficient action, for employee off duty conduct.  The contexts are vast and varied: An engineer who shares his views about why there are so few women in tech; A prominent medical school dean who engages in excessive drug use and associates with prostitutes in hotel rooms; Workers “outed” for participating in a pro-White Supremacist rally. View Full Post
Tweet Like LinkedIn LinkedIn Google Plus

NIST Issues New Password Security Recommendations: Keep It Simple, Long and Memorable

Shata Stucky writes: Username and password login fields, online securityThe United States National Institute for Standards and Technology (NIST) has issued new guidelines for creating secure passwords.  NIST guidelines, which are directed to “federal government systems,” often become best practice recommendations across the security industry. The new guidelines are a significant break from previous rules.  View Full Post
Tweet Like LinkedIn LinkedIn Google Plus