Legal Minute: Cybersecurity Reporting Requirements for Government Contractors
Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Tips for Mobile App Privacy Compliance
On December 9, 2014, Bill C-13, An Act to amend the Criminal Code, the Canada Evidence Act, the Competition Act and the Mutual Legal Assistance in Criminal Matters Act, also known as the Protecting Canadians from Online Crime...more
During his recent State of the Union address, President Obama called on Congress “to finally pass the legislation we need to better meet the evolving threat of cyber attacks, combat identity theft, and protect our children’s...more
Most analysts and commentators agree that 2014 was the year mobile reached a tipping point. With over 1 billion mobile smartphones in circulation, 2014 marked the first year that mobile Internet usage surpassed desktop use in...more
The U.S. District Court for the Middle District of Pennsylvania recently ruled that a debt collector did not violate the Fair Debt Collection Practices Act (FDCPA) because it failed to identify itself at the beginning of a...more
If you watched President Obama’s State of the Union Address on January 20, you know that passing comprehensive cybersecurity legislation will be a central focus during his final two years in office. The President actually...more
The world of the popular television show Mad Men may be glamorous, but according to the Director of the Federal Trade Commission’s Bureau of Consumer Protection, Jessica Rich, it depicts more fiction than fact about modern...more
President Obama's State of the Union address highlighted the importance of cybersecurity, data security and privacy to his 2015 agenda:
"No foreign nation, no hacker, should be able to shut down our networks, steal our...more
The EU Article 29 Working Party (WP29) has issued an Opinion on ‘Recent Developments on the Internet of Things’ (Opinion). The Opinion stresses the privacy and security challenges generated by the development of the Internet...more
Turkey’s Parliament has approved Law No. 6563 on the Regulation of Electronic Commerce (Law) aimed at creating a more secure, transparent and accessible e-commerce environment. The Law is expected to come into force 1 May...more
The Dutch data protection authority, College Bescherming Persoonsgegevens (CBP), released a cease and desist order requiring Google to pay €60,000 per day, up to a maximum of €15 million, for violating Dutch data protection...more
The Hong Kong Privacy Commissioner of Personal Data (the “Commissioner”) ended 2014 with a special interest in mobile applications (“apps”)....more
While hundreds of tech companies are racing to develop the newest in Internet-connected “smart” devices, Federal Trade Commission (“FTC”) Chairwoman Edith Ramirez is sending a reminder to those companies of their...more
On January 20, 2015, President Obama will address Congress with his annual State of the Union report. On Monday, the president spoke at the Federal Trade Commission, providing a “sneak peek” of the privacy and cybersecurity...more
The Article 29 Data Protection Working Party (Working Party) released Opinion 9/2014 on ePrivacy Directive 2002/58/EC (amended in 2009), stating that the consent and transparency mechanisms apply to digital fingerprinting of...more
Phase 2 of Canada’s Anti-Spam Legislation (CASL) relating to the installation of computer programs will come into force on January 15, 2015. Commonly referred to as the malware prohibition, CASL goes far beyond prohibiting...more
On December 23, 2014, the Federal Trade Commission ("FTC") announced the filing of a complaint charging a data broker with selling the sensitive personal information of hundreds of thousands of consumers to third parties that...more
The general definition of “personal information” or “PI” used in the majority of statutes is: An individual’s first name or first initial and last name plus one or more of following data elements: (i) Social Security number,...more
Three privacy/security stories that you should know as you start your week:
President Obama to Offer Cybersecurity/Privacy Previews to State of the Union Proposals -
In a series of speeches this week, President...more
Companies with online sites and services that expressly target a young audience, such as websites and mobile apps providing entertainment, games or educational enrichment specifically oriented toward children, should already...more
Open access internet and free WiFi are ubiquitous. For many denizens of the mobilesphere, especially in urban environments, telephone networks are relics.
It’s therefore not surprising that the French Data Protection...more
What privacy, advertising and digital media trends will make headlines in 2015? Digital Health for one, Big Data for another....more
The International Standards Organization’s new cloud standard, ISO 27018, strives to ensure that public cloud service providers (such as Amazon, Google, and Rackspace) “offer suitable information security controls to protect...more
Welcome to the first Privacy Tuesday of 2015!
We hope that you enjoyed our 12 Days of Privacy series (and if you missed it, they are all linked in the right column of the blog…).
Three things that you should...more
Earlier in 2014, the International Standards Organisation (ISO) developed a new voluntary standard, ISO 27018 (Standard), establishing commonly accepted control objectives and guidelines to protect personal information for a...more
Find a Privacy Author »
Back to Top