How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Jason Maloni on Data Security
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Ted Hester on Congressional Investigations
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
Weekly Brief: New Round of Layoffs Hit Law Firms
Safeguards against Data Security Breaches (Part Two)
How to Protect Your Company From Hackers
How to Respond to President Obama's Cybersecurity Executive Order
The Internet of Things is expected to lead to 50 billion connected devices by 2020 collecting and exchanging personal data about their users, their lives, their preferences and tastes. This will lead not only to relevant data...more
The FBI has seen an increase in sophisticated “spear phishing” scams targeting executives across industry sectors. Spear phishing is when a criminal sends an e-mail that appears to be from a trusted source to a specific...more
In this guide Harneys considers the scope of the Cayman Islands’ Confidential Relationships (Preservation) Law and the sanctions that apply to contraventions of it.
The Cayman Islands government considers the...more
As April comes to a close, it’s time once again for Verizon Enterprise Solutions’ Data Breach Investigations Report to remind us just how important data security is to the corporate world.
Released Wednesday, the report,...more
In the United States alone, it is estimated that the cost of “[c]yber-espionage and other malicious cyber crimes...[i s] between $24 billion and $120 billion annually.” In 2008, the U.S. Department of Defense’s classified...more
The Personal Data Protection Act 2012 (Act) was passed by the Singapore Parliament on 15 October 2012 and came into effect in Singapore on 2 January 2013. One major component of the Act was to put in place general data...more
The FBI’s Warning:
Point-of-sale (POS) systems are under attack. In the wake of breaches at Neiman Marcus, Target and other stores over the 2013 holiday season, the FBI is now warning retailers to expect similar cyber...more
Earlier this month, the Department of Justice announced the indictment of 13 individuals associated with the hacker organization Anonymous for a widespread scheme to disrupt and shut down commercial and government websites....more
Investigative Powers -
Sazant v. College of Physicians and Surgeons of Ontario, 2013 CanLII 22324 (S.C.C.), dismissing leave to appeal of a decision in 2012 ONCA 727 -
In Sazant, a physician faced both criminal...more
Important developments on the companies’ liability for data protection breaches.
As you may know, Italian law (so called “Law 231?) provides indeed a regime of criminal corporate liability and sanctions in the event...more
On July 25, the DOJ announced the indictment of five individuals accused of conspiring in a worldwide hacking and data breach scheme that targeted major corporate networks, stole more than 160 million credit card numbers and...more
One of the things that has long puzzled me is what led to the significant rise in the enforcement of the Foreign Corrupt Practices Act (FCPA) beginning in the 2003-2004 time frame? ...more
There’s no denying that the present-day Internet, while extraordinary, is increasingly scary. Cyber attacks of various types continue to escalate across the globe. As stated by one recent commentator: “Cybercrime is raging...more
Multinational businesses are subject to a patchwork of laws of the various jurisdictions in which they operate. Complying with the myriad rules and regulations can be challenging. Compliance obligations vary from one country...more
Assistant Attorney General Bill Baer in charge of the Department of Justice’s Antitrust Division recently announced changes to the division’s “carve-out practice” regarding corporate plea agreements. The changes aim to...more
Every day the headlines report another Fortune 500 company suffering a hacking incident. For companies, the hack itself creates substantial risks of economic devastation caused by the theft of valuable trade secrets. Add to...more
Several recent stories have highlighted the concerns over personal information, privacy and the reach of mobile apps. Once again, the law is labouring to keep up with technology....more
For the first time, online retail sales exceeded $1 billion on Black Friday and reached nearly $1.5 billion on Cyber Monday this year. Analysts expect this increase in e-commerce to continue, and Forrester Research estimates...more
Originally published in MainBiz on November 26, 2012.
Last July, the federal First Circuit Court of Appeals issued a first-of-its kind decision regarding the obligations of banks and their commercial customers in...more
The South Carolina Supreme Court recently had occasion to consider the application of the federal Stored Communications Act. Three of the five Justices on the Court issued opinions in the case, underscoring the difficulties...more
If your organization suffers a loss as a result of someone hacking into your network, will your insurance policy's computer fraud rider cover the loss? The answer, of course, depends on the language of your policy and the...more
Last month, the U.S. Court of Appeals for the Sixth Circuit affirmed a district court holding that the computer fraud rider to a retailer’s Crime Policy covered losses resulting from the theft of customers’ financial...more
Cyber hacking, data breaches and privacy concerns have become commonplace headlines. While not always front page news, one study reported on 1,700 instances of computer hacking, cyber terrorism, and other data breaches in the...more
As many predicted, cybercriminals continue to increase their targeting of middle-market businesses. These criminals presume - often correctly so - that a small business will have less robust defenses than a Fortune 500...more
In a ruling that might provide a new path to data breach insurance coverage, DSW Shoe Warehouse, Inc. has prevailed in its attempt to obtain insurance coverage for losses associated with a data breach under a commercial crime...more
Find a Privacy Author »
Back to Top