Robert Brownstone

Robert Brownstone

Fenwick & West LLP

Contact  |  View Bio  |  RSS

Latest Publications


European (EU) Data Protection Law Handbook now live

This 214-page document, “Handbook on European data protection law,” looks incredibly comprehensive. It ends with 13 pages of citations to European case law on various issues....more

2/19/2014 - Cybersecurity Data Protection EU EU Data Protection Laws Handbooks

Alice Corp. v. CLS Bank Amicus Briefs Filed, Reckoning Day Approaches

Last week, we filed two amicus briefs with the Supreme Court in Alice Corp. v. CLS Bank, one on behalf of Advanced Biological Laboratories (ABL), and one for Ronald M. Benrey (Benrey). It goes without saying that this is the...more

2/4/2014 - CLS Bank CLS Bank v Alice Corp Computer-Related Inventions Patent Applications Patent-Eligible Subject Matter Patents Software

While You Are Gorging — FRCP 45 (Non-Party Subpoenas) Changes Take Effect 12/1/13

When we all return to work from Thanksgivukkah weekend, Federal Rule of Civil Procedure (FRCP) 45, governing non-party subpoenas, will have changed, effective December 1, 2013. To review the new content, follow one or both...more

11/29/2013 - Non-Parties Rules of Civil Procedure Subpoenas

Redaction Redux — Be a Do-Bee, Not a Don’t-Bee

Despite many well-publicized gaffes in legal, political and business arenas, many folks do not properly electronically redact sensitive information before letting a document loose into the wild. Supposedly blacked-out or...more

10/18/2013 - Confidential Information Discovery Document Productions Electronically Stored Information Public Disclosure Redaction Software

New Jersey 13th State to Protect Social Media Passwords

On Thursday August 29, New Jersey Governor Chris Christie signed revised legislation, namely A.B. 2878, which, among other restrictions, forbids employers to ask applicants or employees for their social-media or other online...more

9/2/2013 - Passwords Right to Privacy Screening Procedures Social Media

Employers’ Technology Acceptable Use Policies — Top Ten Tips

Every U.S. private and public sector employer should develop, maintain and enforce an effective, appropriate workplace technology-acceptable-use policy (“TAUP”). In large part, a TAUP is a no-expectation-of-employee-privacy...more

8/15/2013 - Acceptable Use Policy Compliance Privacy Policy Reasonable Expectation of Privacy SCOTUS Technology

Safeguards against Data Security Breaches (Part One) [Video]

With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more

3/19/2013 - Bring Your Own Device Cybersecurity Data Breach Data Protection Encryption Notice Requirements Personally Identifiable Information

Three Key Data Retention Questions [Video]

Your company has been sued – what do you need to consider to comply with data preservation requirements? How do you address litigation holds, ediscovery and data retention? Robert Brownstone, litigation attorney and chair of...more

1/22/2013 - Data Retention

Top 3 Concerns in Data Security [Video]

In the video, Robert Brownstone, co-chair of Fenwick’s Electronic Information Management Group, describes how the world of data security impacts every organization regardless of size. He identifies three main areas of...more

12/6/2012 - Cybersecurity Data Protection Internet

9 Results
View per page
Page: of 1