Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Jason Maloni on Data Security
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Ted Hester on Congressional Investigations
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
Weekly Brief: New Round of Layoffs Hit Law Firms
Safeguards against Data Security Breaches (Part Two)
How to Protect Your Company From Hackers
We hope that you remembered to “spring forward” over the weekend —
Today’s Privacy Monday is a bit longer than usual – but an important read, particularly if you are a mobile app developer.
After a year in which the California Legislature passed a spate of privacy laws, wireless providers and third party mobile application providers do not need to add privacy regulations from the California Public Utilities...more
In this issue:
- Digital Advertising Alliance Releases Mobile Guidance
- House Energy and Commerce Task Force on Privacy
- The Senate Committee on Commerce Considers Cybersecurity
- House Energy...more
The U.S. government can get historical cell phone records, including geolocational information, from cell phone providers without a warrant, the Fifth District Court of Appeals ruled.
The appellate court reversed the trial...more
Cybersecurity initiatives are moving rapidly within the federal government and require owners and operators of critical infrastructure – including in particular Communication and Energy Systems, and those who supply and...more
On April 3, 2013, the National Institute of Standards and Technology (NIST) held a workshop at the Department of Commerce in which it offered a sneak preview of the Cybersecurity Framework required under the recently-issued...more
On February 26, following close on the heels of the recent executive order setting forth the administration’s approach to the regulation of critical infrastructure network security, the National Institute of Standards and...more
During his State of the Union address on February 12, 2013, President Barack Obama announced his signing of a long-anticipated Executive Order on cybersecurity. After months of discussions with technology companies the...more
Smart Grid technology enables electric utilities to use communications and computing technology to glean consumer electric usage patterns to facilitate more efficient network management. It has been identified by the FCC as a...more
Find a Privacy Author »
Back to Top