Jonathan Cain

Jonathan Cain

Mintz Levin

Contact  |  View Bio  |  RSS

Latest Publications

Share:

Wearable Devices in the Workplace Challenge Data Security and Privacy

Wearable devices, including health and activity monitors, video and audio recorders, location trackers, and other interconnected devices in the form of watches, wristbands, glasses, rings, bracelets, belts, gloves, earrings,...more

8/22/2014 - Corporate Counsel Data Protection Employer Liability Issues Employment Policies Liability Popular Privacy Concerns Wearable Technology

Labor Department Adds Gender Identity and Transgender Status to Prohibition on Sex Discrimination

On August 19, 2014, the Department of Labor issued a guidance advising that it will consider cases of discrimination based upon gender identity and transgender status to be violations of Title VII of the Civil Rights Act and...more

8/21/2014 - Civil Rights Act Discrimination DOL Executive Orders Federal Contractors Gender Discrimination Gender Identity Title VII Transgender

Proposed Counterfeit Parts Rule Would Expand Coverage to Commercial Products Sold to Any Federal Agency

On June 10, 2014 the federal government proposed to expand the coverage of the rule designed to weed out counterfeit electronic parts in products sold to the Government. The new rule, if adopted in the form proposed, would...more

6/13/2014 - Counterfeiting DOD Electronics Federal Contractors Manufacturers New Regulations

Health Data Breach Victims Have Standing to Sue Says WV Supreme Court

The most common defense against class actions for data breach has itself been breached in a ruling last week by the West Virginia Supreme Court....more

6/4/2014 - Class Action Class Certification Confidential Information Corporate Counsel Data Breach Doctor-Patient Privilege HIPAA Invasion of Privacy Medical Records Patient Confidentiality Breaches

State Data Security Breach Notification Laws

The general definition of “personal information” or “PI” used in the majority of statutes is: An individual’s first name or first initial and last name plus one or more of following data elements: (i) Social Security number,...more

4/24/2014 - Breach Notification Rule Data Breach Data Protection

Federal IT Acquisition Policy Recommendations Focus on Cybersecurity

The Department of Defense and the General Services Administration, which together spend more than $500 billion annually on information technology, have released a joint report to the White House recommending steps to upgrade...more

1/31/2014 - Cybersecurity Cybersecurity Framework Department of Defense Executive Orders GSA NIST

Data Brokers Under Scrutiny

The Senate Commerce Committee released this morning its majority staff report, A Review of the Data Broker Industry: Collection, Use, and Sale of Consumer Data for Marketing Purposes, on the practices data brokers use to...more

12/19/2013 - Data Brokers Data Collection Data Protection Investigations Right to Privacy

On the Sixth Day of Privacy, the Congress Gave to Me…..

Not much...perhaps we should send them a box of coal. So, we look ahead... If you believe that Congress does best when it does least, then 2013 was an outstanding year – at least as far as privacy and data protection...more

12/16/2013 - CISPA Cybersecurity Cybersecurity Framework FISMA NIST Privacy Laws Privacy Policy

On the Fourth Day of Privacy, the Internet gave to me….

Web cameras, burglar alarms, fitness monitors, smartphones, and a host of other internet connected devices all have the potential to invade privacy by collecting and sharing personal information. Yet in many cases, the...more

12/12/2013 - Cybersecurity Data Breach Data Collection FTC Internet Personally Identifiable Information

Data Security Advisory for Federal Contractors: Safeguarding Unclassified Controlled Technical Information

The Department of Defense (DoD) has published its new final rule governing the security measures imposed on DoD unclassified technical information resident on or passing through the unclassified information systems of its...more

12/12/2013 - Contractors Cybersecurity Data Protection DFARS DOD NIST Subcontractors

NIST Opens 45-Day Comment Period on Cybersecurity Framework

We have published prior advisories concerning the development by the National Institute of Standards and Technology of a cybersecurity “Framework” intended to be adopted by owners of critical infrastructure to enhance the...more

10/31/2013 - Cybersecurity NIST Public Comment

Privacy Monday: October 28, 2103 — NIST Cybersecurity “Framework” Published for Comment

The National Institute of Standards and Technology (NIST) has published its preliminary cybersecurity “Framework” that it was directed to develop in Executive Order 13636. The Executive Order requires that NIST develop and...more

10/29/2013 - Cybersecurity Cybersecurity Framework NIST

NIST Publishes Preliminary Federal Cybersecurity “Framework” for Comment

On October 22, the National Institute of Standards and Technology (NIST) published a preliminary cybersecurity “Framework” that it was directed to develop in Executive Order 13636. The Executive Order requires that NIST...more

10/25/2013 - Cybersecurity Cybersecurity Framework NIST

Federal Cybersecurity “Framework” Advances to Draft

After several months of work, the National Institute of Standards and Technology (NIST) has published a draft of the cybersecurity “Framework” it is developing in response to Executive Order 13636. In publishing the Framework...more

9/6/2013 - Critical Infrastructure Sectors Cybersecurity Cybersecurity Framework Executive Orders NIST Proposed Legislation

Health Care Services Providers to Federal Health Plan Members Subject to Federal Affirmative Action Compliance Audit

On March 30, the US District Court for the District of Columbia held that three University of Pittsburgh Medical Center-affiliated hospitals were federal subcontractors to an HMO that provided a managed care health plan to...more

4/9/2013 - Affirmative Action Audits DOL Federal Employees HMOs Hospitals Medicare OFCCP Subcontractors

Cloud Computing with Export-Controlled Data

Security and privacy are the most frequently expressed concerns about cloud computing (defined for this article to include software as a service, platform as a service and storage as a service), but for companies that engage...more

3/13/2013 - Cloud Computing Data Protection Export Administration Regulations Exports ITAR

Sequestration: Responding to Government Contract Delays and Changes

Recent hardening of the rhetoric between Congressional Republicans and the White House is leading to growing acknowledgment that across-the-board reductions in federal agency budgets are likely to be imposed, at least...more

2/21/2013 - Delays Federal Budget Sequestration Stop Work Orders

Energy & Clean Tech Connections: Your Law Firm Link to Industry News -- January 2013

In the January edition of Energy & Clean Tech Connections, we’ve gathered recent information from a wide variety of sources in an effort to keep you abreast of what’s new in the world of clean energy. We draw your attention...more

1/9/2013 - Biofuel China Clean Tech Fiscal Cliff Investment Tax Credits Offshore Wind Production Tax Credit REIT Renewable Energy Solar Energy Wind Power

Final SBIR Rules Published

On December 27, 2012, the US Small Business Administration (SBA) published a final rule to amend regulations governing eligibility for the Small Business Innovation Research (SBIR) and Small Business Technology Transfer...more

1/5/2013 - Hedge Funds NDAA Private Investment Funds SBA Small Business Innovation Research STTR Venture Funding

19 Results
|
View per page
Page: of 1