Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Jason Maloni on Data Security
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Ted Hester on Congressional Investigations
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
On the heels of a recent survey that found that cyber-security is becoming the primary concern of corporate general counsels and directors, see C. Dunn, Cybersecurity Becoming No. 1 Concern for GCs and Directors, Corporate...more
Senator John D. Rockefeller IV (D., W.Va.) recently sent a letter to the CEOs of all Fortune 500 companies asking the companies for more information about their cybersecurity practices. The letter comes a month after Senate...more
For those of us who were watching this proposed legislation unsuccessfully move its way through the 2012 General Session, we see now that it was passed as part of the Connecticut General Assembly’s Special Session by...more
On April 3, 2012, the Lead Director Network (LDN) gathered in Washington, DC, for its 12th meeting. Members examined the role of the board and lead director in overseeing strategic risks. This issue of...more
Business executives and national security leaders are of one mind over the need to improve the security of computers that control elements critical to the U.S. infrastructure. But the two groups are divided over the question...more
Find a Privacy Author »
Back to Top