Cullen & Dykman Sees Colleges Calling for Title IX Help v
Legal Minute: Cybersecurity Reporting Requirements for Government Contractors
Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
In this Guide:
- Managing the Internal Investigation
- Disclosure from Third Parties
- Steps to Preserve Assets/Documents
- Civil Proceedings
- Anti-Bribery/Anti-Corruption Legislation
Earlier this month, a federal judge in New Jersey held that a secretly recorded conversation between a former chief executive officer and his general counsel may be used by prosecutors as evidence against the former executive...more
It seems as though every other week brings news of a new social media hack. Last week, Crayola had hackers post inappropriate content on its Facebook page, and the official Twitter feed of U.S. military's Central Command was...more
The Canada Supreme Court ruled earlier this month that civil antitrust plaintiffs may receive wire-tap evidence obtained in the criminal investigation into an alleged price-fixing scheme by several large gas companies. During...more
Employers need to appreciate and address the fact that employees who remove their employers’ confidential information often do not appear to appreciate the risks of being caught or the potentially very serious consequences of...more
You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more
The Secret Service, which investigates financial crimes, issued a security Alert on July 31, 2014, warning of malware named “Backoff” that was being used to steal payment card data from point-of-sale (POS) systems. The Alert...more
Restaurant chain Applebee’s has joined other businesses such as Overstock.com, Hilton, Capitol One, and Bass Pro Shops as defendants in purported class action lawsuits alleging that they illegally recorded calls to or from...more
Whatever you might think of where his career went, Elton John had some great early stuff. I still rank Tumbleweed Connection right up there as one of my favorite albums of all-time. And while it was packed with some great...more
The New York Times reported this week that an organized Russian criminal group stole approximately 1.2 billion user name and password credentials associated with more than 500 million email addresses from hundreds of...more
On August 5, The New York Times reported that Russian hackers have obtained what could be the largest collection of confidential data in history. The security firm that discovered the breach continues to alert affected...more
On Saturday, August 2, the North Carolina General Assembly gave final approval to the Appropriations Act of 2014. The 260-page budget bill—which is now on the Governor’s desk—contains several pages governing the use and...more
On June 17, 2014, the United States Court of Appeals for the Second Circuit issued a significant Fourth Amendment decision in United States v. Ganias. The decision is premised on the well-established notion that, because of...more
The Internet of Things is expected to lead to 50 billion connected devices by 2020 collecting and exchanging personal data about their users, their lives, their preferences and tastes. This will lead not only to relevant data...more
The FBI has seen an increase in sophisticated “spear phishing” scams targeting executives across industry sectors. Spear phishing is when a criminal sends an e-mail that appears to be from a trusted source to a specific...more
In this guide Harneys considers the scope of the Cayman Islands’ Confidential Relationships (Preservation) Law and the sanctions that apply to contraventions of it.
The Cayman Islands government considers the...more
As April comes to a close, it’s time once again for Verizon Enterprise Solutions’ Data Breach Investigations Report to remind us just how important data security is to the corporate world.
Released Wednesday, the report,...more
In the United States alone, it is estimated that the cost of “[c]yber-espionage and other malicious cyber crimes...[i s] between $24 billion and $120 billion annually.” In 2008, the U.S. Department of Defense’s classified...more
The Personal Data Protection Act 2012 (Act) was passed by the Singapore Parliament on 15 October 2012 and came into effect in Singapore on 2 January 2013. One major component of the Act was to put in place general data...more
The FBI’s Warning:
Point-of-sale (POS) systems are under attack. In the wake of breaches at Neiman Marcus, Target and other stores over the 2013 holiday season, the FBI is now warning retailers to expect similar cyber...more
Earlier this month, the Department of Justice announced the indictment of 13 individuals associated with the hacker organization Anonymous for a widespread scheme to disrupt and shut down commercial and government websites....more
Investigative Powers -
Sazant v. College of Physicians and Surgeons of Ontario, 2013 CanLII 22324 (S.C.C.), dismissing leave to appeal of a decision in 2012 ONCA 727 -
In Sazant, a physician faced both criminal...more
Important developments on the companies’ liability for data protection breaches.
As you may know, Italian law (so called “Law 231?) provides indeed a regime of criminal corporate liability and sanctions in the event...more
On July 25, the DOJ announced the indictment of five individuals accused of conspiring in a worldwide hacking and data breach scheme that targeted major corporate networks, stole more than 160 million credit card numbers and...more
One of the things that has long puzzled me is what led to the significant rise in the enforcement of the Foreign Corrupt Practices Act (FCPA) beginning in the 2003-2004 time frame? ...more
Find a Privacy Author »
Back to Top