Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Jason Maloni on Data Security
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Ted Hester on Congressional Investigations
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
When dealing with US requests for data subject to ediscovery rules in Asia, corporate counsel at multinational corporations must be on top of their game. Managing ediscovery in the United States alone presents a significant...more
On July 31, the district court judge issued a ruling in the case involving the US Government’s warrant issued to Microsoft to compel production of data stored on the servers of its wholly owned Irish subsidiary located in...more
Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more
Chief Judge Loretta A. Preska of the U.S. District Court for the Southern District of New York affirmed Magistrate Judge James C. Francis IV’s opinion and ordered that the U.S. Department of Justice (DOJ) could compel...more
On June 17, 2014, the United States Court of Appeals for the Second Circuit issued a significant Fourth Amendment decision in United States v. Ganias. The decision is premised on the well-established notion that, because of...more
The United States Supreme Court has tackled the issue of cell phone privacy and ruled that data is different from other forms of technology. In late June, the Supreme Court issued an opinion: those of David Riley, a...more
Today, in Commonwealth v. Gelfgatt, No. SJC-11358 (Mass. June 25, 2014), a divided Massachusetts Supreme Judicial Court held that under certain circumstances, a court may compel a criminal defendant to provide the password to...more
A perspective on the recent Fourth Amendment and privacy considerations raised by Judge James C. Francis' recent Memorandum and Order: 'In The Matter Of A Warrant To Search A Certain E-Mail Account Controlled And Maintained...more
For most civil litigants, discovery is an unprecedented invasion of privacy. Private letters, notes to one’s self, off-the-cuff emails, financial details and transactions, photographs, and all other forms of memorializing...more
In civil litigation, eDiscovery disputes hardly ever rise to the level of constitutional importance. But in the criminal arena, the rules are different....more
Employees should be put on notice – there is no special privacy protection for email sent or received using an employer’s devices....more
This article discusses that, in addition to civil liability that employment lawyers tend to be alert for in departing employee scenarios, departing employees can also be criminally liable for theft, misappropriation, or other...more
This decision is the subject of the grant of certiorari by the United States Supreme Court in United States v. Jones, 10-1259.
Maynard and Jones were co-defendants. All legal issues have either been resolved or abandoned...more
Computer forensic techniques may be unfairly applied in order to tip the scales of justice in the direction of prosecution. Particular areas that are known to be problematic for defense experts include: erroneous allegations...more
Find a Privacy Author »
Back to Top