Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Jason Maloni on Data Security
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Ted Hester on Congressional Investigations
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
Weekly Brief: New Round of Layoffs Hit Law Firms
Safeguards against Data Security Breaches (Part Two)
How to Protect Your Company From Hackers
On May 1, the White House’s working group on “big data” and privacy published a report on the findings of its 90-day review. In addition to considering privacy issues associated with big data, the group assessed the...more
Full-text copy of “A Review of the Data Broker Industry: Collection, Use, and Sale of Consumer Data for Marketing Purposes,” a 36-page Congressional report on how data brokers collect, maintain, and sell information on...more
Full text copy of “Information Resellers: Consumer Privacy Framework Needs to Reflect Changes in Technology and the Marketplace,” the US Government Accountability Office’s report to the Senate Committee on Commerce, Science,...more
The final rule is significant for any organization that is considered to be a HIPAA covered entity (“CE”) (health systems, health care providers, health plans, etc.) or the more broadly defined business associate (“BA”)....more
On November 26, 2012, the Department of Health and Human Services Office for Civil Rights (“OCR”) published a thirty-two page document titled “Guidance Regarding Methods for De-identification of Protected Health Information...more
The paper is about a new stream called Gamification. Gamification has both risks & chances in its' concept for mankind. İt can be used to help you do daily jobs by having fun and on the other hand it can be used to...more
In This Issue:
Wyndham's Misrepresentations About Security Lead to FTC Suit; Consumer Groups Take Aim at Claritin's Ad Campaign; Facebook "Likes" California AG's App Agreement; ADA Applies to Online Businesses, Court...more
A brief article on F.O.I.L. Request and the Privacy Act with the U.S. Government. ...more
Mexico's Federal Law for the Protection of Personal data (la Ley Federal de Protección de Datos Personales en Posesión de los Particulares) (the "Law") protects an individual's personal data by restricting its use and...more
Find a Privacy Author »
Back to Top