Legal Minute: Cybersecurity Reporting Requirements for Government Contractors
Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Tips for Mobile App Privacy Compliance
As we near the turn of the year into 2015, organizations should keep an eye on laws taking effect on the West Coast. This year, the crop of new privacy statutes includes a few without precedent anywhere in the country. The...more
Yik Yak arrests. For several months now we at Socially Aware have been writing about how college students have been using the purportedly anonymous messaging app Yik Yak to communicate deeply offensive remarks and threats of...more
In the recent, landmark case of Riley v. California, the United States Supreme Court held that the police may not search digital data on the cell phone of an arrestee without a warrant, reasoning that smart phones not only...more
The long-standing test for searching students at school requires that the search must be based on a “reasonable suspicion” that the student violated a school rule or law. A recent criminal decision from the United States...more
“Crossover” Complete -
The General Assembly’s May 1 “crossover” deadline requires bills to move from one legislative body to the other or require a two-thirds vote for consideration in the receiving chamber for bills...more
Employers, schools, and other entities have long relied on the Illinois Eavesdropping Act to prohibit individuals from recording conversations, meetings, classes, and other activities without the consent of all participants....more
Recently, the Appellate Division of the New Jersey Superior Court upheld a criminal indictment against a former employee of the North Bergen Board of Education (the Board), which stemmed from the alleged theft of public...more
On December 13, 2012, the Michigan Legislature passed House Bill 5523, known as the Internet Privacy Protection Act (IPPA), which if signed by Governor Rick Snyder, will become effective immediately....more
On December 13, 2012, the Michigan Legislature passed House Bill HB 5523, known as the Internet Privacy Protection Act (IPPA), which, if signed by Governor Rick Snyder, will become effective immediately....more
Brief Summary of North Carolina Laws...more
Find a Privacy Author »
Back to Top