Patrick Fowler

Patrick Fowler

Snell & Wilmer

Contact  |  View Bio  |  RSS

Latest Publications

Share:

Can the U.S. – EU Safe Harbor Weather the Storm?

On 24 March, the Court of Justice for the European Union (CJEU) heard argument on a case that could significantly impact, if not invalidate altogether, the Safe Harbor framework that facilitates the flow of personal data from...more

3/25/2015 - CJEU Data Privacy Data-Sharing EU Safe Harbors

Why You Need a Privacy Policy – Part 2: Avoiding Three Common Fumbles

In Part 1, we covered some basic privacy policy concepts. Here in Part 2, we address three problems associated with privacy policies in practice. 1. You Don’t Have One, But You Really Should - There is no...more

3/13/2015 - COPPA Corporate Counsel FCC FTC Gramm-Leach-Blilely Act HIPAA Personally Identifiable Information Privacy Policy

What is a Privacy Policy? – Part 1

A privacy policy is a key legal document in this new era of Big/Data/Breaches. When distilled to its essence, a privacy policy is simply “say what you do, and do what you say” with others’ personal information. A growing...more

3/11/2015 - Big Data Data Breach Data Collection Data Protection Personally Identifiable Information Popular Privacy Policy

Another Good Reason to Pay Heed to Cyber Security

For many companies, the prospect of a dreadful, costly and reputation-damaging cyber-attack and data breach is all the motivation they need to assess and improve their cyber security and data protection posture RIGHT NOW. ...more

3/9/2015 - Anthem Blue Cross Cybersecurity Data Breach Data Protection FTC Government Investigations Regulatory Agenda Risk Mitigation

Update: Hotel Industry Members Withdrawal FCC Wi-Fi Petition

This is an update to an article we posted on January 28, Can Hotels Legally Block Wi-Fi Hot Spots? The FCC Says No, and Fines a Hotel $600,000 For Doing It. On August 25, 2014, the American Hotel & Lodging Association,...more

3/5/2015 - Cybersecurity FCC Hospitality Industry Hotels Wireless Technology

Cleared for Takeoff? Feds Release Proposed Regulations for Unmanned Aircraft Systems

On February 15, 2015, the federal government unveiled two key documents concerning the future of Unmanned Aircraft Systems (UAS)—sometimes referred to as “drones”—in the United States. The FAA released a highly anticipated...more

2/20/2015 - Airspace Commercial Use Drones FAA Licensing Rules NPRM TSA Unmanned Aircraft Systems

Pass it On: New Executive Order Pushes Greater Sharing of Cyber-Threat Information

The federal government continues to steadily ratchet up its focus on cybersecurity. On February 13, 2015, President Obama signed an Executive Order to improve real-time sharing of cyber-threat information between government,...more

2/20/2015 - Barack Obama CTIIC Cybersecurity Cybersecurity Summit DOJ Executive Orders FTC Information Sharing ISAOs Private Sector Public Entities

It Takes More Than a Village: Protecting Student Privacy in the Age of Big Data

High-profile data breaches and cyber-attacks on well-known brands and businesses have dominated the news cycle for more than a year. Yet during the same time, less visible, but no less important efforts have been made to...more

2/13/2015 - Barack Obama Data Breach Data Protection Legislative Agendas Public Schools School Districts Student Digital Privacy Act Student Privacy Students

Can Hotels Legally Block Wi-Fi Hot Spots? The FCC Says No, and Fines a Hotel $600,000 For Doing It.

In a public notice issued this week, the Federal Communications Commission (FCC) warned hotels, convention centers and other businesses that it is illegal to willfully block or interfere with their guests’ Wi-Fi hot spots...more

1/29/2015 - Enforcement Guidance FCC Hospitality Industry Hotels Internet Public Access Laws Wifi

Can the NSA Legally Collect Telephone Metadata?

Earlier this month the Ninth Circuit Court of Appeals became the third federal appellate court this year to hear argument on the legality of the NSA’s bulk collection of telephone metadata....more

12/22/2014 - Appeals Data Collection Metadata NSA Patriot Act Popular

Bankruptcy Sales of Personally Identifiable Information: Does it Satisfy the Privacy Policy?

Companies that are looking to sell, transfer or buy personally identifiable information (“PII”) via bankruptcy asset sales would be wise to confirm that such a transfer is consistent with the debtor’s privacy policy. If it...more

11/19/2014 - Bankruptcy Code BAPCPA Commercial Bankruptcy FTC Personally Identifiable Information Privacy Policy Sale of Assets

Breaching Bad: New Cyber Security Regs for Defense Contractors

Defense contractors with access to classified information will soon be required to quickly notify Defense Department (DOD) officials if the company’s computer network or information system is successfully penetrated in a...more

9/2/2014 - Cybersecurity Data Protection DOD Federal Contractors Popular

5 Things Every Company's Data Security Program Should Include

What's the one thing every company's data security program must include? That's the question we put recently to experts in the field, knowing that, especially after Heartbleed, the diversity of responses would create an...more

4/24/2014 - Corporate Counsel Cybersecurity Cybersecurity Framework Data Breach Data Protection Heartbleed Legal Perspectives Need to Know

A Brief Survey of Current and Future Developments in Privacy, Data Protection and Cyber Security Law

The challenges confronting corporate counsel regarding privacy, data protection and cyber security have never been more daunting: dealing with the threat of increasingly sophisticated cybercriminals, responding to data breach...more

4/18/2014 - Corporate Counsel Cyber Attacks Cybersecurity Data Breach Data Protection Privacy Laws Surveillance

Malware in the Machines: Cybersecurity for Medical Devices and Hospital Networks

Within the last week the Food and Drug Administration (FDA) issued a pair of Safety Communications directed towards the medical device and healthcare industries regarding cybersecurity. Computer virus and other malware...more

6/21/2013 - Cyber Threats Cybersecurity Data Protection FDA Healthcare Malware Medical Devices Safety Precautions

15 Results
|
View per page
Page: of 1

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×