Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Polsinelli Podcast - Telephone Consumer Protection Act and Consequences for Corporations
Cullen & Dykman Sees Colleges Calling for Title IX Help v
Legal Minute: Cybersecurity Reporting Requirements for Government Contractors
Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
The stakes are getting higher regarding cybersecurity. However, there are several steps organizations can take to protect against cybersecurity data breaches. Further, taking these steps can protect companies in the context...more
Effective information governance is about taking information — your most important business asset — and looking at ways to better leverage it in a manner that streamlines the business processes, and reduces costs and risk....more
Now that entities are aware that at least 1.2 billion records have been compromised from websites spanning across all industries, a question arises whether entities have an obligation to investigate whether their websites...more
Before taking any action on this latest data breach news out of Russia, there are a number of things to understand....more
A breach of this nature is reportable under the breach notification laws in both California and Florida, as recently amended: “Personal Information” includes user name or email address, in combination with a password or...more
Canadian registered charities seeking to comply with Canada’s new anti-spam law (CASL) recently received some disappointing news. CASL is a very complex law and many important issues remain ambiguous and uncertain. Several...more
A recap of most popular writings on the recent European Court Ruling that Google must allow citizens the right to be forgotten....more
Part of JD Supra's series on innovation and the law. The NLRB has famously struck down employers’ social media policies based on a law that was adopted during the New Deal and has not been amended since....more
Threats to data privacy are not going away, but establishing appropriate security measures up-front, performing regular stress-tests on a security system, putting in place procedures to address a data breach and implementing...more
The vulnerability caused by the Heartbleed bug circumvents the purpose of OpenSSL: encryption. Therefore, the conclusion would appear to be that any data breach during the time of OpenSSL vulnerability would be reportable...more
Bennett Jones launches Canadian Anti-Spam Information Site
TORONTO, January 22, 2014 – In response to the long-awaited regulations pertaining to the Canadian government's anti-spam legislation, Bill C-28, Bennett Jones LLP...more
A detailed social media policy specifically addressing the ownership of social media accounts is key to a corporation’s ability to maintain ownership of an employee’s account after the employee leaves the corporation....more
In March 2012, the Obama Administration announced its Big Data Research and Development Initiative. The program involves a total of over $200 million in new commitments from several departments and agencies to improve the...more
Life is full of anxieties. We all know that. Some suffer worse anxieties than others. As I often say, anxiety comes and goes. Anxiety cannot be measured but is something that everyone experiences on their own terms....more
The message–that’s what I’m talking about–who’s gonna get the message sent to them first?
Data breaches, hacking, and privacy are one of the biggest news stories since 2011 and there is no sign that will be changing...more
Cyber-attacks against U.S. companies have been skyrocketing in recent years, with 2011 seeing an increase of nearly 44 percent according to the National Security Agency. While many businesses have implemented and continue to...more
application. The case highlights the evolution of publicity rights in the face of social media.
Publicity rights have been protected since the advent of the Hollywood celebrity in the second half of the 20th century. In...more
The Federal Trade Commission (“FTC”) announced the release of revised “Green Guides” on October 1, 2012. The Green Guides are intended to help marketers avoid making misleading environmental claims.
The Green Guides are...more
Infographic: The Growing Impact of Social Media
Social media sites are transforming not only the daily lives of consumers, but also how companies interact with consumers. As with the Internet boom during the mid-to-late...more
The European perspective on managing cyber risk is valuable for US companies operating internationally and also as risk management guidance when operating in the US.
Recently, an arm of the UK Government Communication...more
The CAN-SPAM act sets legal rules for commercial E-Mail and includes various provisions that apply to “any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial...more
California takes citizen privacy rights seriously.
That’s the unmistakable message communicated by a recent announcement that the Office of the Attorney General of California is creating a Privacy Enforcement and...more
This week, Apple shareholders requested that its Board of Directors publish a report explaining how the board oversees privacy and data security risks. The proposal was prompted by concern that recent issues such as the...more
Find a Privacy Author »
Back to Top