Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Polsinelli Podcast - Telephone Consumer Protection Act and Consequences for Corporations
Cullen & Dykman Sees Colleges Calling for Title IX Help v
Legal Minute: Cybersecurity Reporting Requirements for Government Contractors
Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
Unexplained absences, secretive phone calls, late nights at the office – all telltale signs that your spouse may be up to no good. With advances in technology it has become easier and easier for suspicious spouses to snoop on...more
“Crossover” Complete -
The General Assembly’s May 1 “crossover” deadline requires bills to move from one legislative body to the other or require a two-thirds vote for consideration in the receiving chamber for bills...more
- Over the past four years, the government has broadened the use of wiretaps to include insider trading, and to great success (the recent convictions of Raj Rajaratnam and Rajat Gupta serve as examples of...more
Here, are two recently reported stories highlighting the vagaries of FaceBook and other such social media outlets.
First, enter Dana Thornton. Apparently, she was not fond of her ex-boyfriend and decided to create a...more
One of ICE's central responsibilities is to enforce the nation's civil immigration laws in coordination with U.S. Customs and Border Protection (CBP) and U.S. Citizenship and Immigration Services (USCIS). ICE, however, has...more
E350 September 30, 2010
1. COPY FEES FOR PUBLIC RECORDS REDUCED
2. PARENTS DISCUSSING INHERITANCES WITH HEIRS
3.PROTECTIVE SWEEP AFTER GUNSHOT SOMETIMES PERMITTED ON PRIVATE PROPERTY.
Safety and Security in a Digital Age summarizes the many ways one's privacy is violated and monitored by others. The article discusses relevant case law and statutes that impact such technology and helps attorneys apprise...more
There may be someone that you don’t ever want to enter your property again. Or there may be someone you don’t want to enter your property at all, even once. In Massachusetts, there is a way to make it a criminal act if a...more
Summary of pedophilia jurisprudence followed by a brief and response to the US v. Naughton case and the fantasy defense as it relates to child sex crimes. ...more
Find a Privacy Author »
Back to Top