Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
The federal government must publish new procedures 90 days after the 2014 Intelligence Authorization Act is signed. These procedures will become effective upon publication.
Intelligence community contractors will be...more
On February 12, 2013, President Obama signed an Executive Order (the Order) intended to enhance the cybersecurity of the country's critical infrastructure. According to the Order, "[t]he cyber threat to critical...more
The White House issued a long-awaited Executive Order (EO) “Improving Critical Infrastructure Cybersecurity” which directs the U.S. Department of Homeland Security (DHS) and other agencies to quickly advance efforts to...more
On February 12, 2013, President Barack Obama issued the long awaited cybersecurity Executive Order, which will establish national cybersecurity standards for critical infrastructure. This cybersecurity Executive Order was...more
Given the failure to enact comprehensive cybersecurity legislation last year, Congress included several targeted statutory provisions setting federal defense policy on a range of cybersecurity issues in the National Defense...more
A summary of Pennsylvania's Right to Know Law....more
Find a Privacy Author »
Back to Top