David Adler

Opinions expressed by ICN authors are their own.

David M. Adler is a transactional attorney with more than 18 years of experience guiding entrepreneurs, executives, creative professionals and organizations through the dynamic and sometimes murky legal challenges presented by the interrelated areas of trademarks, copyrights, trade secrets, privacy, information security, marketing and advertising, social media, digital business, regulatory compliance, litigation and corporate-commercial transactions. He has been designated by his peers for five consecutive years as an Illinois SuperLawyer in the areas of intellectual property and entertainment and media law. David has significant in-house counsel experience managing the legal affairs of industry-leading software providers in the public relations and marketing industries, negotiating, and drafting enterprise-level software-as-a-service (SaaS) agreements and vendor and third-party contracts with a heavy emphasis on proprietary rights.

He is a prolific writer, maintaining a technology-focused blog (www.adlerlaw.wordpress.com) and a newsletter (Ping) devoted to helping entrepreneurs and professionals identify, protect and monetize their creative content and ideas, and take advantage of the opportunities presented by today’s digital business platforms.

Outside the practice of law, David was an adjunct professor teaching music law at DePaul College of Law, he also taught entertainment law and introduction to e-business at Columbia College Chicago and once chaired the Chicago Bar Association's media and entertainment law committee. He is currently a member of the Illinois State Bar Association intellectual property law committee.

The opinions expressed in this blog are those of David Adler and do not necessarily represent those of IDG Communications Inc. or its parent, subsidiary or affiliated companies.

Who is winning in text message (SMS) marketing?

Cybersecurity is one of the top risks organizations must manage in 2017

Cybersecurity is one of the top risks organizations must manage in 2017

Cybersecurity and privacy continue to make headlines. Experts have more questions than answers addressing risk management concerns in the evolving cybersecurity market.

Trump's executive order travel ban and IT workers

Trump's executive order travel ban and IT workers

In light of the executive order restricting immigration from certain countries, should U.S. companies that rely on temporary or contract IT workers, or recruit skilled tech pros from other countries, be concerned about the visa status...

Echo chamber: Amazon device creates new legal privacy twist for smart home systems

Echo chamber: Amazon device creates new legal privacy twist for smart home systems

Given the sensitive nature and legal protections afforded to digital information obtained within the home, should law enforcement have the right to access data gathered by smart home devices?

5 questions to ask your retail clients about GPS tracking and geolocation

5 questions to ask your retail clients about GPS tracking and geolocation

As retailers and marketing consultants roll out GPS tracking, iBeacons and other tracking tools, those charged with implementing and understating tracking programs and technologies probably have a few questions. How does it work? Does...

FTC v. Wyndham and corporate cybersecurity

FTC v. Wyndham and corporate cybersecurity

Privacy and security are often perceived as weaknesses or risks, but they can be an opportunity. Reputation and brand protection have been identified as two of the biggest drivers behind increased IT spending to address security...

New federal Defend Trade Secrets Act expands protection, adds safe harbor

New federal Defend Trade Secrets Act expands protection, adds safe harbor

The continuous press for innovation in technology and media will challenge intellectual property laws to evolve. The new Defend Trade Secrets Act provides a powerful new tool to protect a business's intangible assets and a major...

5 key terms to know for vendor contracts

5 key terms to know for vendor contracts

Vendor and third-party contract management is a challenge for every organization. Focus on key contract areas to address risks from effects of mobile, social, cloud and big data on employee, vendor and customer access and use of...

4 questions from the standoff between the FBI and Apple

4 questions from the standoff between the FBI and Apple

At this year's RSA Conference on cybersecurity innovation - the world’s biggest digital security expo - the iPhone dispute between Apple and the FBI touched every conversation. The battle over access to encrypted data on an iPhone...

4 things CIOs need to know about the FCC, broadband and innovation

4 things CIOs need to know about the FCC, broadband and innovation

CIOs should take notice of recent developments with the Federal Communications Commission (FCC). It’s rulemaking authority are making many question if the FCC may write new rules applicable to Internet services specifically, and what...

Load More