Cullen & Dykman Sees Colleges Calling for Title IX Help v
Legal Minute: Cybersecurity Reporting Requirements for Government Contractors
Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Federal District Judge Paul Magnuson has ruled that banks that issued credit and debit cards to customers whose data was stolen in the December 2013 Target data breach could continue to litigate claims against Target for...more
A decision is expected shortly in the highly publicized so-called confidential witness “scandal” involving the Robbins Geller Rudman & Dowd law firm. Judge Suzanne B. Conlon of the United States District Court, Northern...more
Lawsuits brought in the U.S. that result in judgments against Chinese companies often have problems with enforceability, unless the Chinese company has assets in the US or assets in another country that enforces US judgments....more
We previously reported on Sargon Enterprises v. Univ. of Southern California (November 26, 2012) in which the California Supreme Court made clear that expert testimony regarding lost profits may not succeed if it is too...more
Social media postings, messages and records are subject to discovery in lawsuits. But like other forms of discovery, there are limits.
Courts don’t like fishing expeditions and will use state and federal laws to deny...more
Reconsider how you select a jury by considering these tips and statistics on how your potential jurors use the internet....more
A non-disclosure agreement (NDA) is an agreement between (at least) two parties, where one is the provider of the information that is to be protected and another is the receiver of the information. The non-disclosure...more
Where U.S. litigation discovery obligations were argued to be in conflict with foreign civil and criminal privacy statutes, many recent opinions found that discovery should proceed under the Federal Rules over the protest of...more
On July 14, 2010, the Electronic Frontier Foundation (EFF), a group that defends the privacy and online rights of computer and Internet users, served a motion to quash two dragnet subpoenas issued by the plaintiffs in a...more
EFF has served a motion to quash dragnet subpoenas that put privacy and anonymity at risk for the operators of dozens of Internet blogs and potentially hundreds of commenters.
The subpoenas stem from a state lawsuit filed...more
A primer on the Health Insurance Portability and Accountability Act of 1996 (HIPAA)....more
Find a Privacy Author »
Back to Top