Cullen & Dykman Sees Colleges Calling for Title IX Help v
Legal Minute: Cybersecurity Reporting Requirements for Government Contractors
Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
In this Guide:
- Managing the Internal Investigation
- Disclosure from Third Parties
- Steps to Preserve Assets/Documents
- Civil Proceedings
As previously reported, on 26 August 2014, the Federal Court determined that The Cash Store Pty Ltd (in liquidation), a payday lender, and Assistive Finance Australia Pty Ltd, a loan funder, committed seven separate breaches...more
Cybersecurity is an increasing concern for companies. Last April, the UK Department for Business, Innovation & Skills (BIS) published the 2014 information security breaches survey: technical report. The report comprises the...more
Federal District Judge Paul Magnuson has ruled that banks that issued credit and debit cards to customers whose data was stolen in the December 2013 Target data breach could continue to litigate claims against Target for...more
Cyber security, corruption and unethical behavior pose significant risks for business enterprises, according to a new survey by EY titled “Overcoming Compliance Fatigue’. At the same time business organizations may be...more
Recently, the Maryland Attorney General’s Office announced that it reached a settlement with Snapchat, Inc. over alleged deceptive trade practices in violation of Maryland law and violations of federal laws that are intended...more
A recent case contains some salutary lessons for service providers concerning liability for fraudulent use of their services. It appears that unless the contract has clear terms to the contrary then the service provider, not...more
A shareholder of Wyndham Worldwide Corp. (“Wyndham”) recently filed a derivative action against Wyndham’s board of directors arising out of three high profile data breaches occurring from 2008 to 2010. Dennis Palkon filed...more
Hot on the heels of our recently released publication, ‘Cyber risks and the impact on company directors’, it has been revealed that a shareholder has commenced a derivative action in the district of New Jersey (USA) against...more
All this week, we are featuring a series “Cyber Risks – Director Liability and Potential Gaps in D&O Coverage”
Part 2 of 5: Why Directors Should Be Concerned...more
To read the full 2014 Class Action Survey report, please visit ClassActionSurvey.com.
Fifty-two percent of major companies are currently engaged in class action litigation. This percentage has remained fairly consistent...more
A decision is expected shortly in the highly publicized so-called confidential witness “scandal” involving the Robbins Geller Rudman & Dowd law firm. Judge Suzanne B. Conlon of the United States District Court, Northern...more
. . . a data breach class action.
Hackers and plaintiffs’ lawyers could combine to make 2014 the year when class actions concerning theft of sensitive information proliferate. On this 11th Day of Privacy, we look...more
Cyber security is top of mind for companies, and cyber-security oversight is top of mind for corporate directors. I recently co-moderated a panel discussion for directors on board oversight of cyber security and...more
An outline of privacy law that cites to potential causes of action, whether common law or statutory, with a focus on New York law....more
Key Takeaway: Companies that follow these 3 steps can use the Computer Fraud and Abuse Act as a tool to combat the misuse of their computers (and information) by (1) actively monitoring for misuses, (2) taking reasonable...more
What happens when the employee who set up the company’s LinkedIn account leaves? ...more
In Ignat v. Yum! Brands (March 18, 2013) an employee claimed a violation of her right of privacy when her supervisor publicly disclosed to coworkers her bipolar condition. The trial court granted summary judgment to the...more
If your picture has appeared in a publication and you are concerned about the message being incorrect or defamatory; or if there is some other possible defamatory publication recently made about you, you will want to read...more
With the rise of BaaS (or Backend as a service) platforms, it is easier than ever to create a mobile app on the fly. But Fenwick privacy co-chair Tyler Newby advises that companies should be aware of some important privacy...more
Lawsuits brought in the U.S. that result in judgments against Chinese companies often have problems with enforceability, unless the Chinese company has assets in the US or assets in another country that enforces US judgments....more
LinkedIn is a social media site catering exclusively to professionals with 200 million registered users in 200 countries. For many businesses, marketing via social media is a critical component to success. Employees use...more
With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more
Cybersecurity may be the SEC’s newest area for enforcement actions. While the SEC first released Disclosure Guidance concerning cybersecurity in 2011, the recent media attention surrounding significant cybersecurity breaches...more
A personal injury law firm can buy search terms using the names of a competing law firm’s partners without violating Wisconsin’s privacy laws because the use of the names is “non-visible,” an appellate court found.
Find a Privacy Author »
Back to Top