fcpa Compliance and Ethics Report-Episode 106-interview with Gini Deitrich
A Moment of Simple Justice - Snitching Ain't Easy
Polsinelli Podcasts - Be Careful What you Put in Writing - What Companies Need to Know About Document Retention
Jail Time for Revenge Porn Offenses?
FCPA Compliance and Ethics Report-Episode 3-Interview with Marie Patterson, Vice President of Marketing for Hiperos
What you need to know about Canada's new Anti-Spam Law (CASL)
Why Ending FCC Blackout Rules May Be Broadcast TV's Demise
FCC Proposes New Rules On Local Wireless Siting
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
What to expect from FCC Post-Governement Shutdown
Employer Social Media Policies – Interview with Mitch Danzig, Member, Member, Mintz Levin
JOBS Act Implementation Regulations
Polsinelli Podcast - Public Policy Issues in 2013
Condo Adviser: Condominium Rules and Enforcement
Condo Adviser: What is 'FHA approved,' exactly?
Condo Owners and Dealing with Uncooperative Management Companies
Reserve Funds: Purposes and Common Mistakes
Instapundit: America's IP Laws Need to be "Pruned Back"
Polsinelli Podcast - Social Media at Work - What's Allowed and What Isn't?
Release of new book on the 'Best Practices Under the FCPA and Bribery Act"
Chief Judge Loretta A. Preska of the U.S. District Court for the Southern District of New York affirmed Magistrate Judge James C. Francis IV’s opinion and ordered that the U.S. Department of Justice (DOJ) could compel...more
..A relatively new site called Wanelo combines the features of a social media site and an e-commerce site by permitting users to “save” products that they are interested in, and showing them to their online friends. The site...more
A perspective on the recent Fourth Amendment and privacy considerations raised by Judge James C. Francis' recent Memorandum and Order: 'In The Matter Of A Warrant To Search A Certain E-Mail Account Controlled And Maintained...more
In many criminal cases, cellular telephone records are an invaluable resource. These records may shed light on whether an alleged victim or witness communicated with someone of importance in a case, and when. There are...more
In April 2013, Rehtaeh Parsons died after her parents took her off life support following a suicide attempt after months of enduring cyber bullying. The harassment was the result of a photo depicting Parsons allegedly being...more
Can the United States search your laptop, camera, iPhone/iPad, or other devices at the border? Read this article on the Fourth Amendment rights and exceptions....more
Last month, we summarized the N.Y. Supreme Court case, Fawcett v. Altieri, which involved the production of electronically stored social media content. What the post did not address, however, was the simple two prong analysis...more
The People of the State of New York, v. Malcolm HARRIS, –N.Y.S.2d–, 2012 WL 1644956 (N.Y. City Crim.Ct. May 7, 2012)
On May 15, 2012, we discussed a New York criminal court’s decision to deny Defendant Malcolm Harris’...more
The incidents of war happened in the real world is mirrored in cyber space, given the recent incidents of hacking of government websites by state or non state group of hackers for political, military, espionage purposes. As...more
cyber attacks on corporates have become common either by competitors or state sponsored actors of foriegn state, Security to organisations and legal compliance has become important...more
The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecom giant of violating the law and the privacy of its customers by collaborating with the National...more
Find a Communications & Media Author »
Back to Top