Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Jason Maloni on Data Security
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Ted Hester on Congressional Investigations
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
Weekly Brief: New Round of Layoffs Hit Law Firms
Safeguards against Data Security Breaches (Part Two)
How to Protect Your Company From Hackers
How to Respond to President Obama's Cybersecurity Executive Order
Three Key Data Retention Questions
Corporate Law Report: Cybersecurity, CEO Social Media, New Workplace Laws, Healthcare Reform in 2013
Top 3 Concerns in Data Security
Christopher Garcia on Cyber Threats
Threats to data privacy are not going away, but establishing appropriate security measures up-front, performing regular stress-tests on a security system, putting in place procedures to address a data breach and implementing...more
The vulnerability caused by the Heartbleed bug circumvents the purpose of OpenSSL: encryption. Therefore, the conclusion would appear to be that any data breach during the time of OpenSSL vulnerability would be reportable...more
Bennett Jones launches Canadian Anti-Spam Information Site
TORONTO, January 22, 2014 – In response to the long-awaited regulations pertaining to the Canadian government's anti-spam legislation, Bill C-28, Bennett Jones LLP...more
In this LEVICK Daily video interview, LEVICK Senior Vice President Jason Maloni discusses the key forensic and communications challenges that accompany instances of data loss and...more
A detailed social media policy specifically addressing the ownership of social media accounts is key to a corporation’s ability to maintain ownership of an employee’s account after the employee leaves the corporation....more
In March 2012, the Obama Administration announced its Big Data Research and Development Initiative. The program involves a total of over $200 million in new commitments from several departments and agencies to improve the...more
In This Issue:
- Corporate Humor Context is Key
- Cyber Security
- Technology’s Impact on Reputation
- Blogs Worth Following
- LEVICK In the News
- Excerpt from Corporate Humor, Context is...more
Life is full of anxieties. We all know that. Some suffer worse anxieties than others. As I often say, anxiety comes and goes. Anxiety cannot be measured but is something that everyone experiences on their own terms....more
The message–that’s what I’m talking about–who’s gonna get the message sent to them first?
Data breaches, hacking, and privacy are one of the biggest news stories since 2011 and there is no sign that will be changing...more
Cyber-attacks against U.S. companies have been skyrocketing in recent years, with 2011 seeing an increase of nearly 44 percent according to the National Security Agency. While many businesses have implemented and continue to...more
application. The case highlights the evolution of publicity rights in the face of social media.
Publicity rights have been protected since the advent of the Hollywood celebrity in the second half of the 20th century. In...more
The Federal Trade Commission (“FTC”) announced the release of revised “Green Guides” on October 1, 2012. The Green Guides are intended to help marketers avoid making misleading environmental claims.
The Green Guides are...more
Infographic: The Growing Impact of Social Media
Social media sites are transforming not only the daily lives of consumers, but also how companies interact with consumers. As with the Internet boom during the mid-to-late...more
The European perspective on managing cyber risk is valuable for US companies operating internationally and also as risk management guidance when operating in the US.
Recently, an arm of the UK Government Communication...more
The CAN-SPAM act sets legal rules for commercial E-Mail and includes various provisions that apply to “any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial...more
California takes citizen privacy rights seriously.
That’s the unmistakable message communicated by a recent announcement that the Office of the Attorney General of California is creating a Privacy Enforcement and...more
This week, Apple shareholders requested that its Board of Directors publish a report explaining how the board oversees privacy and data security risks. The proposal was prompted by concern that recent issues such as the...more
This article explains to in-house corporate counsels the risks, benefits, and issues to investigate regarding cloud storage of data....more
Google’s business model is based on delivering relevant search results and, increasingly, relevant ads to those who use its products. In order to do so, Google needs to know a user’s search history since search history and...more
The Federal Trade Commission (FTC) issued a report in March 2012 setting forth best practices for businesses to protect the privacy of American consumers and give them greater control over the collection and use of their...more
Elisabeth Murdoch, daughter of media baron Rupert Murdoch and a successful media executive in her own right, recently criticized her brother James, a top executive at News Corp., for pursuing profit at all costs.
Michelle Cohen recently joined Ifrah Law as a partner. Here is an edited transcript of a recent interview with Ms. Cohen.
Question: What are some of your legal experiences and strengths that you’d like to...more
Find a Privacy Author »
Back to Top