Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Jason Maloni on Data Security
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Ted Hester on Congressional Investigations
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
Weekly Brief: New Round of Layoffs Hit Law Firms
Safeguards against Data Security Breaches (Part Two)
How to Protect Your Company From Hackers
Cyber security, corruption and unethical behavior pose significant risks for business enterprises, according to a new survey by EY titled “Overcoming Compliance Fatigue’. At the same time business organizations may be...more
A recent case contains some salutary lessons for service providers concerning liability for fraudulent use of their services. It appears that unless the contract has clear terms to the contrary then the service provider, not...more
A shareholder of Wyndham Worldwide Corp. (“Wyndham”) recently filed a derivative action against Wyndham’s board of directors arising out of three high profile data breaches occurring from 2008 to 2010. Dennis Palkon filed...more
An outline of privacy law that cites to potential causes of action, whether common law or statutory, with a focus on New York law....more
In Ignat v. Yum! Brands (March 18, 2013) an employee claimed a violation of her right of privacy when her supervisor publicly disclosed to coworkers her bipolar condition. The trial court granted summary judgment to the...more
Lawsuits brought in the U.S. that result in judgments against Chinese companies often have problems with enforceability, unless the Chinese company has assets in the US or assets in another country that enforces US judgments....more
In this case, a corporate successor, Central Trust Investment Company (hereafter also "Central Trust") sued the former employee (Kennedy) of its acquired company, Springfield Trust & Investment Company (hereafter also "STC"),...more
If your company uses a browsewrap license agreement on your website, it may not be legally binding on site visitors. That’s the message from a recent case, In re Zappos.com Inc., Customer Data Security Breach Litigation,...more
We previously reported on Sargon Enterprises v. Univ. of Southern California (November 26, 2012) in which the California Supreme Court made clear that expert testimony regarding lost profits may not succeed if it is too...more
The Federal Trade Commission (“FTC”) has been active in recent years pursuing companies that suffer data security breaches and arguably failed to live up to the data security standards promised in their privacy policies....more
It’s no surprise that people trust online reviews from consumers more than traditional advertisements. After all, advertisements are created by the company selling a product of service, whereas third party reviews are by...more
California legislators have been active passing several employment law bills that impact local businesses in recent months. Here’s a recap of some with brief summaries. Legal counsel should be sought for a complete...more
You’ve read the tile of this article. There it is, up above. Let me repeat:
Preventing Unfair Competition in the Absence Of A Noncompete Agreement
What I really want you to focus on is the last part. The part that reads:...more
California takes citizen privacy rights seriously.
That’s the unmistakable message communicated by a recent announcement that the Office of the Attorney General of California is creating a Privacy Enforcement and...more
The European perspective on managing cyber risk is valuable for US companies operating internationally and also as risk management guidance when operating in the US.
Recently, an arm of the UK Government Communication...more
The CAN-SPAM act sets legal rules for commercial E-Mail and includes various provisions that apply to “any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial...more
Recently, the U.S. Court of Appeals for the Eleventh Circuit, in a case of first impression, held that the named plaintiffs in a putative class action could pursue their claims for monetary loss from a health care company...more
Google’s business model is based on delivering relevant search results and, increasingly, relevant ads to those who use its products. In order to do so, Google needs to know a user’s search history since search history and...more
The Federal Trade Commission (FTC) issued a report in March 2012 setting forth best practices for businesses to protect the privacy of American consumers and give them greater control over the collection and use of their...more
Freeman, et al. v. Quicken Loans, Inc.: Supreme Court Declines To Expand Consumer Protections Beyond Congress’ Exact Words. The Freeman decision demonstrates that administrative agencies cannot expand federal consumer...more
Find a Privacy Author »
Back to Top