Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Jason Maloni on Data Security
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Ted Hester on Congressional Investigations
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
Weekly Brief: New Round of Layoffs Hit Law Firms
Safeguards against Data Security Breaches (Part Two)
How to Protect Your Company From Hackers
Recently, the Maryland Attorney General’s Office announced that it reached a settlement with Snapchat, Inc. over alleged deceptive trade practices in violation of Maryland law and violations of federal laws that are intended...more
An outline of privacy law that cites to potential causes of action, whether common law or statutory, with a focus on New York law....more
What happens when the employee who set up the company’s LinkedIn account leaves? ...more
LinkedIn is a social media site catering exclusively to professionals with 200 million registered users in 200 countries. For many businesses, marketing via social media is a critical component to success. Employees use...more
If your company uses a browsewrap license agreement on your website, it may not be legally binding on site visitors. That’s the message from a recent case, In re Zappos.com Inc., Customer Data Security Breach Litigation,...more
The Federal Trade Commission (“FTC”) has been active in recent years pursuing companies that suffer data security breaches and arguably failed to live up to the data security standards promised in their privacy policies....more
The European perspective on managing cyber risk is valuable for US companies operating internationally and also as risk management guidance when operating in the US.
Recently, an arm of the UK Government Communication...more
The CAN-SPAM act sets legal rules for commercial E-Mail and includes various provisions that apply to “any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial...more
Google’s business model is based on delivering relevant search results and, increasingly, relevant ads to those who use its products. In order to do so, Google needs to know a user’s search history since search history and...more
Reconsider how you select a jury by considering these tips and statistics on how your potential jurors use the internet....more
EPIC Files Complaint, Urges FTC to Investigate Verizon's Recent Changes to Privacy Practices
EPIC filed a complaint with the Federal Trade Commission charging that Verizon Wireless has engaged in unfair and deceptive...more
An article in Mishpacha, the Jewish Family Weekly, about defamation, the Internet and good sense....more
In this issue: Tesla Sues BBC Over TV Show Depiction; CAN-SPAM Applies to Facebook Messages, Court Rules; FDA Proposes Rules for Calorie Disclosure; Will California Enact Its Own Privacy Law?; and FTC Settles with Oreck Over...more
EFF has served a motion to quash dragnet subpoenas that put privacy and anonymity at risk for the operators of dozens of Internet blogs and potentially hundreds of commenters.
The subpoenas stem from a state lawsuit filed...more
Official newsletter of The Internet Law Group providing cutting-edge insights and updates regarding notable developments in the world of e-commerce and internet law. ...more
Find a Privacy Author »
Back to Top