Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Jason Maloni on Data Security
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Ted Hester on Congressional Investigations
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
Weekly Brief: New Round of Layoffs Hit Law Firms
Safeguards against Data Security Breaches (Part Two)
How to Protect Your Company From Hackers
A decision is expected shortly in the highly publicized so-called confidential witness “scandal” involving the Robbins Geller Rudman & Dowd law firm. Judge Suzanne B. Conlon of the United States District Court, Northern...more
If your picture has appeared in a publication and you are concerned about the message being incorrect or defamatory; or if there is some other possible defamatory publication recently made about you, you will want to read...more
LinkedIn is a social media site catering exclusively to professionals with 200 million registered users in 200 countries. For many businesses, marketing via social media is a critical component to success. Employees use...more
On January 18, 2012, the Ontario Court of Appeal recognized a common law tort of “intrusion upon seclusion” in Ontario law in its decision in Jones v. Tsige. This decision has potentially significant implications, not just...more
Have you started getting collection calls or collection letters for a debt that you do now owe? Were you the victim of identity theft? Have you discovered items on your credit report that aren't yours? Are you having...more
Employee Who Provided False social Security Number and Other Information Was Barred from Suing For Disability Discrimination
Employer Did Not Violate CFRA by Transferring Employee upon Her Return from 19-Week Stress Leave...more
The Computer Fraud and Abuse Act (“CFAA”) is the omnibus federal computer crime statute outlawing theft and destruction of data, hacking, use of viruses, theft of passwords and extortionate threats to damage computers. 18...more
The pursuit of trademark infringers on the Internet, specifically the use of a party’s trademark by an unauthorized second party, poses problems that are unique in trademark infringement law. How do you uncover who is the...more
Find a Privacy Author »
Back to Top