How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Jason Maloni on Data Security
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Ted Hester on Congressional Investigations
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
Weekly Brief: New Round of Layoffs Hit Law Firms
Safeguards against Data Security Breaches (Part Two)
How to Protect Your Company From Hackers
How to Respond to President Obama's Cybersecurity Executive Order
“Crossover” Complete -
The General Assembly’s May 1 “crossover” deadline requires bills to move from one legislative body to the other or require a two-thirds vote for consideration in the receiving chamber for bills...more
- Over the past four years, the government has broadened the use of wiretaps to include insider trading, and to great success (the recent convictions of Raj Rajaratnam and Rajat Gupta serve as examples of...more
Here, are two recently reported stories highlighting the vagaries of FaceBook and other such social media outlets.
First, enter Dana Thornton. Apparently, she was not fond of her ex-boyfriend and decided to create a...more
One of ICE's central responsibilities is to enforce the nation's civil immigration laws in coordination with U.S. Customs and Border Protection (CBP) and U.S. Citizenship and Immigration Services (USCIS). ICE, however, has...more
E350 September 30, 2010
1. COPY FEES FOR PUBLIC RECORDS REDUCED
2. PARENTS DISCUSSING INHERITANCES WITH HEIRS
3.PROTECTIVE SWEEP AFTER GUNSHOT SOMETIMES PERMITTED ON PRIVATE PROPERTY.
Safety and Security in a Digital Age summarizes the many ways one's privacy is violated and monitored by others. The article discusses relevant case law and statutes that impact such technology and helps attorneys apprise...more
There may be someone that you don’t ever want to enter your property again. Or there may be someone you don’t want to enter your property at all, even once. In Massachusetts, there is a way to make it a criminal act if a...more
Summary of pedophilia jurisprudence followed by a brief and response to the US v. Naughton case and the fantasy defense as it relates to child sex crimes. ...more
Find a Privacy Author »
Back to Top