Latest Publications

Share:

Privacy Alert: The Privacy Shield, As It Stands Today

Following the invalidation of the US-EU Safe Harbor by the Court of Justice of the European Union in October last year (see From a Safe Harbor to a Privacy Shield), the U.S. Department of Commerce and the EU Commission have...more

ESI & eDiscovery FRCP Changes @ 12/1/15 — While You Were Leftover-Eating

Introduction: Now that you’ve likely had your fill of turkey sandwiches, turkey salad, turkey soup and the like, there is a new development on which to focus. On midnight December 1, 2015 the eDiscovery-related Federal Rules...more

Electronic Signature (eSignature) Court Decision — a rare one

In an odd electronic signature (eSignature) context, on December 30, 2014 a California appellate court reversed a trial court’s upholding of a settlement agreement based on a typewritten name in an email string. See J.B.B....more

Heartbleed: It’s 10 PM; Do You Know Where Your Data is?

The Heartbleed vulnerability is, by now, an item about which we have all assuredly heard a lot. To get caught up on your reading on the technology aspects of this issue, see the linked articles I have compiled in the ”To...more

European (EU) Data Protection Law Handbook now live

This 214-page document, “Handbook on European data protection law,” looks incredibly comprehensive. It ends with 13 pages of citations to European case law on various issues....more

While You Are Gorging — FRCP 45 (Non-Party Subpoenas) Changes Take Effect 12/1/13

When we all return to work from Thanksgivukkah weekend, Federal Rule of Civil Procedure (FRCP) 45, governing non-party subpoenas, will have changed, effective December 1, 2013. To review the new content, follow one or both...more

Redaction Redux — Be a Do-Bee, Not a Don’t-Bee

Despite many well-publicized gaffes in legal, political and business arenas, many folks do not properly electronically redact sensitive information before letting a document loose into the wild. Supposedly blacked-out or...more

New Jersey 13th State to Protect Social Media Passwords

On Thursday August 29, New Jersey Governor Chris Christie signed revised legislation, namely A.B. 2878, which, among other restrictions, forbids employers to ask applicants or employees for their social-media or other online...more

Employers’ Technology Acceptable Use Policies — Top Ten Tips

Every U.S. private and public sector employer should develop, maintain and enforce an effective, appropriate workplace technology-acceptable-use policy (“TAUP”). In large part, a TAUP is a no-expectation-of-employee-privacy...more

Safeguards against Data Security Breaches (Part One) [Video]

With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more

Safeguards against Data Security Breaches (Part Two) [Video]

Are you looking to guard your company's “secret sauce?” Fenwick’s Robert Brownstone says companies should safeguard their data by limiting the number of employees with access to certain confidential information. Following up...more

3/10/2013

Three Key Data Retention Questions [Video]

Your company has been sued – what do you need to consider to comply with data preservation requirements? How do you address litigation holds, ediscovery and data retention? Robert Brownstone, litigation attorney and chair of...more

1/22/2013  /  Data Retention

Top 3 Concerns in Data Security [Video]

In the video, Robert Brownstone, co-chair of Fenwick’s Electronic Information Management Group, describes how the world of data security impacts every organization regardless of size. He identifies three main areas of...more

eWorkplace Policies – Social-Media, Privacy & Internet-Security

Traditional concerns for employers have included: harassing or other discriminatory actions; other conduct leading to liability to third-parties; forbidden fraternizing; criminal activity; “frolic and detour” or other...more

Privacy and EIM Alert: Data Breach Laws Become Even Stricter For All Companies With California Or Massachusetts Customers Or Users

How can a 21st century U.S. company do its best to comply with data-security-related obligations imposed by the various laws of 46 states? (Only Alabama, Kentucky, New Mexico, and South Dakota have not enacted laws requiring...more

3/9/2012
16 Results
/
View per page
Page: of 1

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!