Cullen & Dykman Sees Colleges Calling for Title IX Help v
Legal Minute: Cybersecurity Reporting Requirements for Government Contractors
Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
The Bill’s provisions on international data transfers are most relevant to foreign companies that do business in Brazil.
The Brazilian government has issued a Bill for the Protection of Personal Data (Bill) for public...more
2014 has been perhaps the biggest year Information Governance (“IG”) has seen. A relatively small and, if not unknown, at least undefined field only a few years ago has grown into an area of interest—and concern—to many...more
In July 2014, Russian Federation President Vladimir Putin signed Federal Law No. 242-FZ (the "Law"), which amends existing Russian data privacy laws to require that personal data of Russian citizens be processed by servers...more
The Department of Transportation’s National Highway Traffic Safety Administration (“NHTSA”) announced in 2014 that it would begin steps toward implementing vehicle-to-vehicle (“V2V”) technology with an aim toward decreasing...more
The list of states requiring the disposal or destruction of personal data is growing, and companies need to respond accordingly by adopting data destruction plans. Delaware recently became the latest in a series of states to...more
This week, after a seemingly endless year of construction, my family and I moved into our new, energy-efficient home. As I was in the kitchen unpacking, my daughter cried out, somewhat dramatically, “Mama, come here…. The...more
Let’s face it: technology has made the world smaller. It’s no longer extraordinary for what was once termed a “mid-sized” or “regional” company to trade and outsource in foreign markets. Indeed, the Internet has made it...more
Last month, I discussed some of the salient compliance requirements associated with using Social Media.* Then, a few days later, I offered to you my article, entitled Social Media and Networking Compliance. This month, on...more
In the video, Robert Brownstone, co-chair of Fenwick’s Electronic Information Management Group, describes how the world of data security impacts every organization regardless of size. He identifies three main areas of...more
This article explains to in-house corporate counsels the risks, benefits, and issues to investigate regarding cloud storage of data....more
Web 2.0, mobile applications and cloud based services have revolutionized how companies communicate and interact with customers, current and prospective, and how businesses process, transmit, secure and store information. ...more
Originally publisHed in E-Commerce Law & Policy in UK this article analyses the meaning of consent in the EU as it relates to processing of personal data....more
Explanation of how social media investigation and evidence can form the basis of consumer transactions and be subject to consumer protection laws and be evidence useful in litigation. Methods of social media evidence...more
Pay attention to the hard drive on your copier or scanner. It could be storing social security numbers, payroll information, tax returns, health records and other personal and sensitive information. If someone accesses your...more
Find a Privacy Author »
Back to Top