Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Polsinelli Podcast - Telephone Consumer Protection Act and Consequences for Corporations
Cullen & Dykman Sees Colleges Calling for Title IX Help v
Legal Minute: Cybersecurity Reporting Requirements for Government Contractors
Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
The new electronic signature process for the authorization to disclose information to the Social Security Administration (Form SSA-827) is scheduled to begin April 21, 2012. The process was developed to comply with the laws...more
Web-based technologies are part of an exciting new frontier aimed at delivering efficient, accessible, and affordable products and services to their clients. The rapid advance of web- or cloud-based technologies has opened up...more
The shift from desktop- and server-based software to what is alternately referred to as “Software-as-a-Service” (SaaS) or “the cloud” is one of the most significant transitions to occur in computing in the last 20 years....more
In this document we aim to demystify the concept of Software-as-a-Service and educate attorneys on how to evaluate the suitability of available solutions for their practice.
Topics addressed include an overall description...more
Find a Privacy Author »
Back to Top