Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Jason Maloni on Data Security
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Ted Hester on Congressional Investigations
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
Weekly Brief: New Round of Layoffs Hit Law Firms
Safeguards against Data Security Breaches (Part Two)
How to Protect Your Company From Hackers
On July 31, the district court judge issued a ruling in the case involving the US Government’s warrant issued to Microsoft to compel production of data stored on the servers of its wholly owned Irish subsidiary located in...more
Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more
Inter-American Dialogue's Latin America Advisor asked Marcela Cristina Blanco, associate attorney in Diaz Reus’ Bogota, Colombia office: How Well Do Latin American Banks Protect Against Cyber Attacks?...more
On July 17th, the Data Retention and Investigatory Powers Act (“DRIP”) came into effect in the United Kingdom reinstating the Government’s powers to require communication providers to retain traffic data (also known as...more
On 31 July, the chief judge of the Southern District of New York delivered the latest in a series of controversial judgments stemming from a test case brought by Microsoft in an extra-territorial warrant issued under the U.S....more
Whatever you might think of where his career went, Elton John had some great early stuff. I still rank Tumbleweed Connection right up there as one of my favorite albums of all-time. And while it was packed with some great...more
The New York Times reported this week that an organized Russian criminal group stole approximately 1.2 billion user name and password credentials associated with more than 500 million email addresses from hundreds of...more
It was widely reported yesterday in The New York Times and elsewhere that a sophisticated Russian crime ring was holding a massive cache of stolen Internet credentials. According to the private security firm Hold Security, a...more
On August 5, The New York Times reported that Russian hackers have obtained what could be the largest collection of confidential data in history. The security firm that discovered the breach continues to alert affected...more
Chief Judge Loretta A. Preska of the U.S. District Court for the Southern District of New York affirmed Magistrate Judge James C. Francis IV’s opinion and ordered that the U.S. Department of Justice (DOJ) could compel...more
According to the French Data Protection Authority’s (“CNIL”) recently issued activity report for 2013, the CNIL was especially busy in 2013. The main topics addressed by the CNIL in 2013 were the creation of a national...more
The offshore jurisdictions are catching up fast with legal issues relating to cybercrime, cyberliability, and the use and discovery of electronic documents.
In the wake of the embarrassing leak in April 2013 of about...more
The Personal Data Protection Act 2012 (Act) was passed by the Singapore Parliament on 15 October 2012 and came into effect in Singapore on 2 January 2013. One major component of the Act was to put in place general data...more
A farmer in Ghana admits that for years he concealed the corruption of a local public officer who works in his region of Ghana. The farmer is aware of the 2006 Ghana Whistleblower Act and knows that every Ghanaian has a civic...more
The revelation of the U.S. mass data collection program PRISM has triggered a worldwide discussion about the government’s access to the private communications of Internet users....more
When is the last time your company reviewed its data protection policies? If your company employs any international employees, it may have obligations under foreign laws to have specific safeguards in place....more
Trade secret theft and cybersecurity are hot topics in Congress these days, spawning legislative initiatives left and right....more
One of the things that has long puzzled me is what led to the significant rise in the enforcement of the Foreign Corrupt Practices Act (FCPA) beginning in the 2003-2004 time frame? ...more
Multinational businesses are subject to a patchwork of laws of the various jurisdictions in which they operate. Complying with the myriad rules and regulations can be challenging. Compliance obligations vary from one country...more
There’s been a lot of news lately about the Chinese military allegedly launching cyber attacks to steal U.S. trade secrets. This has gotten people riled up, including the President of the United States, who issued a 5-point...more
This advisory is one of a series prepared by Pillsbury's China Practice on questions frequently asked by our clients doing business in China. In June 2012, we published an advisory on personal data protection in China in...more
The Financial Crimes Enforcement Network (FinCEN) has issued formal guidance to clarify the anti-money laundering obligations of administrators and exchangers of convertible virtual currency.
“Virtual” currency, unlike...more
The Obama Administration’s recent “Strategy on Mitigating the Theft of U.S. Trade Secrets” makes clear the importance for businesses to be aware of and understand the international threats to their intellectual property, the...more
We often talk to companies who believe they are an unlikely target for hackers because they do not have financial account information, Social Security numbers, or medical information. However, personal information is not the...more
Everyone is talking about cybersecurity. Articles appear almost daily regarding significant cybersecurity events. And over the past two years, the drumbeat for action on the issue of cybersecurity and the protection of the...more
Find a Privacy Author »
Back to Top