Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Polsinelli Podcast - Telephone Consumer Protection Act and Consequences for Corporations
Cullen & Dykman Sees Colleges Calling for Title IX Help v
Legal Minute: Cybersecurity Reporting Requirements for Government Contractors
Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
It’s inevitable that you will have to share some confidential information with potential buyers during the course of a sale process. Anyone thinking about buying your business will want to do at least some level of diligence...more
Although Insights is intended to cover a wide range of issues, there are a number of topics we believe will be of particular interest to directors and senior corporate executives. Below is an introduction to these topics and...more
This post is co-authored by Tamara Jack of LMI Government Consulting. Federal government contractors, especially those in the manufacturing sector, continue to experience the economic impact of budget cuts, decreased federal...more
Although we are seeing the tail end of many of the claims which arose from the Global Financial Crisis, the sophisticated plaintiff’s bar and ever-developing class action landscape means that companies and their officers will...more
Most M&A transactions require parties to exchange at least some personal information, whether it is the seller's employee or customer personal information. Addressing privacy compliance at an early stage of the M&A...more
In This Presentation:
- Data Breaches: By the numbers
- Costs of Data Breach
- Cybersecurity Considerations in Business Transactions
- Cybersecurity in M&A Transactions
- Cybersecurity –...more
Technology Risks Have Changed: Know What To Look For -
The perfect storm created by the intersection of (on the one hand) the dramatic increase in the business use of cloud computing, open source software, prolific...more
More companies looking to keep pace with the fast-changing mobile market are busily buying up app developers. Google spent almost $1 billion in June to acquire traffic app developer Waze. Apptopia is a growing online...more
On June 25, 2013, the French Supreme Court rendered a corner-stone decision for all agreements dealing with personal data.
In 2008, a company sold its electronic customer file to its successor in business. It quickly...more
What exactly is the '"best" solution for an international business needing to handle and transfer personal data across borders?
This has become an increasingly important and common question as business becomes more...more
A number of national enforcement agencies recently indicated they are going to start actively enforcing 2009/135/EC Directive (the “EU Cookie Directive”). If a US company has business operations in an EU member country, or...more
One business wants to buy the assets of another business. Assume that the consent obtained to the collection, use and disclosure of personal information from the customers of the seller did not include consent to disclose...more
Cloud computing is one of the current waves in information technology. This article explores some of the key legal issues in cloud computing.
Cloud computing allows the user to transfer many (if not all) of the user’s...more
Financial Services Report, Spring 2008
In this issue:
Ahead of the Summons
Find a Privacy Author »
Back to Top