Corcoran: Infighting on Compensation Costs BigLaw Time and Money
Conducting Corporate Internal Investigations
Zimmermann: "Two Class" Partnership Culture Emerging in BigLaw
Appel: Corporate Inversions Could Mean Big Tax Bills For Shareholders
Hedge Funds Word of the Day™ – Accelerated Share Repurchase
Data Privacy: The Next Frontier of Corporate Compliance
Planning For The Exit – What’s Your Exit Strategy?
Hedge Funds Word of the Day™ – CFTC
What are the Implications of Alice v. CLS?
What Questions CEOs and Board Members Should Be Asking Themselves About Tax Inversions
Hedge Funds Word of the Day™ – Derivative
Legal Considerations for Web-Based Start-Ups
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Hedge funds word of the day™ – Big Boy Letter
How Leading Philippine Companies are Using Bonds to Their Advantage
Hedge Funds Word of the Day™ – 10b5-1 Plan
Private Equity's Inversion Excursion: Pepper Hamilton Talks Tax With the Deal
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
Warning Signs that Signal You Might be Terminated from Your Job
How is Graphene Currently Used and What is the Hope for the Future?
The list of states requiring the disposal or destruction of personal data is growing, and companies need to respond accordingly by adopting data destruction plans. Delaware recently became the latest in a series of states to...more
While Congress continues its aggressive push on cybersecurity legislation, regulatory oversight and legal efforts continue across the spectrum of industries effectively filling the gap in addressing now every day concerns...more
Each day this week, we are going to explore some of the issues in the rapidly growing area of cyberliability. We will examine the recent increase in focus on privacy issues, why directors should be concerned, the top...more
What's the one thing every company's data security program must include? That's the question we put recently to experts in the field, knowing that, especially after Heartbleed, the diversity of responses would create an...more
Kamala Harris, California's Attorney General, issued a set of recommendations for preventing and responding to cyber attacks and security breaches. The recommendations, called Cybersecurity in the Golden State, are directed...more
The recent string of well-publicized data breaches has demonstrated that cyber criminals are targeting companies of all sizes and in all industries. Even companies with the most sophisticated security systems admit that the...more
With the rise of BaaS (or Backend as a service) platforms, it is easier than ever to create a mobile app on the fly. But Fenwick privacy co-chair Tyler Newby advises that companies should be aware of some important privacy...more
The message–that’s what I’m talking about–who’s gonna get the message sent to them first?
Data breaches, hacking, and privacy are one of the biggest news stories since 2011 and there is no sign that will be changing...more
It’s no surprise that people trust online reviews from consumers more than traditional advertisements. After all, advertisements are created by the company selling a product of service, whereas third party reviews are by...more
application. The case highlights the evolution of publicity rights in the face of social media.
Publicity rights have been protected since the advent of the Hollywood celebrity in the second half of the 20th century. In...more
In the video, Robert Brownstone, co-chair of Fenwick’s Electronic Information Management Group, describes how the world of data security impacts every organization regardless of size. He identifies three main areas of...more
This article explains to in-house corporate counsels the risks, benefits, and issues to investigate regarding cloud storage of data....more
These days everyone subscribes to something. Whether you’re a consumer or a business, the goods and services you depend on or enjoy on a regular basis are often available by subscription.
Subscribers prefer the low...more
A review and analysis of the proposed EU Data Protection Reform: the General Data Protection Regulation and the Police and Criminal Justice Data Protection Directive. ...more
In the past month, plaintiffs’ lawyers have filed a number of class action lawsuits alleging that companies’ websites fail to provide notices regarding disclosure of personal information under...more
The class action arises out of Best Buy's alleged practice of swiping Drivers' Licenses of customers without prior authorization, resulting in possible unauthorized disclosure of restricted personal information to Best Buy or...more
Health care social media continues to be a hot-button issue for hospitals and other provider types around the country. Health care provider organizations considering taking a first step into social media often articulate...more
The U.S. Department of Commerce (DOC) issued its proposed framework as to consumer privacy regulation in December 2010. An updated proposal is anticipated in early 2012. The paper includes five recommendations:
In December 2010, the Federal Trade Commission issued its preliminary proposed Framework for Consumer Data Privacy Protection for Businesses and Policy makers, entitled "Protecting Consumer Privacy in an Era of Rapid Change."...more
Every organization in business today is holding personal information about individuals. Whether they are consumers, customers, clients, patients, employees, or business partners, you collect a mass of personal information...more
The FTC has received a lot of press attention lately for its investigations of Apple, Facebook, and Google, but the actions that could affect you the most have not. In particular are the FTC's extension of the Red Flags Rule...more
“We are required to notify you of a security breach in which your name, address, social security number, date of birth and medical history may have been released.”
How would you like to send this notice to your 450,000...more
Japan’s Law Concerning the Protection of Personal Information (the “Law”) came into effect for private sector
businesses in April 2005. The Law provides only a broad outline for the Japanese privacy regime, the details...more
Addressing the growing concerns about identity theft and data breach, the Illinois Governor on June 16, 2005, signed into law the Illinois Personal Information Protection Act (“PIPA”). This law applies to privately and...more
Find a Business Organization Author »
Back to Top