Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
In This Issue:
- What’s in a Like?
- R.I.P.: The Facebook “Like” Gate
- Facebook Dislikes Fake Likes
- Privacy in the Cloud: A Legal Framework for Moving Personal Data to the Cloud
Search Am., Inc. v. TransUnion Intelligence, LLC -
In an recent covered business method (CBM) patent review proceeding, the U.S. Patent and Trademark Office Patent Trial and Appeal Board (PTAB) denied the parties’...more
BRAND REPUTATION -
Global: How to protect brand reputation and sales from the risks associated with a product recall - The power of regulatory authorities to order product recalls is growing, meaning that it is more...more
For many companies, entering into confidentiality or non-disclosure agreements is common practice when sharing confidential or proprietary information with third parties. However, as the recent case nClosures, Inc. v. Block...more
They say the internet never forgets. From time to time, someone wants to challenge that dictum.
In our earlier posts, we discussed the so-called “right to be forgotten” in connection with a Canadian trade-secret...more
For a second time this year, the Washington Court of Appeals has rejected claims that pricing and other information contained in contracts between private companies and government agencies are trade secrets not subject to...more
A SURVEY OF PRIVACY, COPYRIGHT, AND TRADEMARK ISSUES -
Today, even Elvis has a Facebook page, Instagram2 and Google+ accounts, a Twitter handle, a Pinterest board, and a mobile app. The Internet and the mobile...more
Traditionally, media companies (as well as non-media companies) almost exclusively utilized their own content. However, because of the exponential growth in the public’s desire and ability to interconnect through social media...more
China: Guidelines for developing sports into a RMB 5 trillion-per-annum sector released -
China's Cabinet, the State Council, has issued new guidelines which, amongst other things, aims to grow output of China’s...more
Parties regularly opt to keep terms, conditions and licensing agreements confidential when settling patent infringement disputes. Often, patentees do not want the license terms to serve as precedent in other assertions of the...more
Many business owners, particularly those with a limited marketing budget or no marketing plan, view access to social media as free marketing. What could be better? Ask paid employees to get out the “buzz” as an assignment....more
In This Issue:
- Understanding the EU Consumer Rights Directive: An overview of the new Directive on Consumer Rights and its implementation in Belgium, France, Italy and the UK
- Free Zones in the UAE: What do...more
THE ALLURE OF THE POTENTIAL COST SAVINGS OF BRING YOUR OWN DEVICE PROGRAMS IS TOO GREAT FOR MANY AUSTRALIAN ORGANISATIONS TO RESIST.
Not only do the financials of Bring Your Own Device (BYOD) programs look good (the...more
You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more
Welcome to the most recent Asia Pacific edition of Intellectual Property and Technology News, our biannual publication designed to report on worldwide developments in IP and technology law, offering perspectives, analysis and...more
Over the last week, several high profile celebrities (e.g., Jennifer Lawrence and Kate Upton) have reportedly become the latest victims of internet privacy rights violations. In those cases, hackers supposedly obtained...more
Advanced manufacturing companies increasingly implement “Intellectual Property Plus,” an expanded view of IP assets and risks. Through this lens, companies incorporate customer expectations and preferences in new product...more
If your selfie has fallen into the wrong hands, the following statutory acts and/or common law theories may provide some relief....more
In the era of Big Data, no ambitious business can afford to live without a strategy for the acquisition, protection and exploitation of the data upon which it depends. The laws enabling data to be protected and exploited are...more
It is common to see celebrities, which have captivated the public for decades, photographed using a company product or wearing a branded garment. Using such photos for promoting a company’s brand can be problematic especially...more
Since our last edition, there has been a number of developments in the Life Sciences sector across the Asia Pacific region and we are pleased to be able to update you on these recent trends.
It is evident that the...more
In this issue:
- Apps and Data Privacy
– New Guidelines from the German DPAs New Developments in Cybersecurity Regulation
- Refer-a-Friend Functionality on the Internet – Federal Court underpins its...more
Those doing business with the State of Maine need to know their way around public records laws. What is the risk that sensitive business information included within a bid response to a request for proposal (RFP) may become...more
Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more
In This Issue:
- Progress Toward Comprehensive Patent Reform Stalls
- As Attention Turns to a Border Supplemental, a Twelve Bill Omnibus Seems Certain
- Highways, Taxes, and Partisanship: The Next...more
Find a Privacy Author »
Back to Top