Cullen & Dykman Sees Colleges Calling for Title IX Help v
Legal Minute: Cybersecurity Reporting Requirements for Government Contractors
Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Employee Who Provided False social Security Number and Other Information Was Barred from Suing For Disability Discrimination
Employer Did Not Violate CFRA by Transferring Employee upon Her Return from 19-Week Stress Leave...more
Few attorneys have more experience than Sebastian Gibson in the field of modeling law. If you have a modeling contract that’s been offered to you or if you are already signed with a modeling agency and have a modeling agency...more
On June 10, 2009, the Second Circuit vacated a summary judgment decision that permanently enjoined menswear designer Joseph Abboud from making commercial use of his own name. J.A. Apparel Corp. v. Abboud, No. 08-3181-cv, 2009...more
In deciding whether the unauthorized use of a third party’s name, voice, likeness or persona (collectively, “Image”) violates such third party’s publicity rights, the first level of inquiry is whether the use is properly...more
Find a Privacy Author »
Back to Top