Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
From reliable surveys and less dependable anecdotes in most major markets, including the UK and the US, opinions point to the almost inevitable expansion of BYOD – Bring Your Own Device – as a cost-saving model for employers....more
As one who presumably has no nude selfies, you may not be too concerned about a “hack” like the one that continues to afflict celebrities like Jennifer Lawrence and Kate Upton. But that doesn’t mean there aren’t still plenty...more
In This Issue:
- Employer Access to Employee Social Media: Applicant Screening, ‘Friend’ Requests and Workplace Investigations
- Driving Under the Influence (of Google Glass)
- U.S. Courts’ Evolving Approaches to...more
This week's headlines charged employers with preserving and protecting data in the workplace. This advice is timely given that this week is “Tax Identity Theft Awareness Week,” a time when employers are reminded to safeguard...more
A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more
German companies sometimes are required to collect data for legitimate business purposes, including for compliance, to investigate malfeasance, for adjudication of claims and to protect personal data of customers from misuse....more
The need to stay connected these days applies not only to our social universe, but also to our business universe. The result is a trend known as “bring your own device” or “BYOD.” BYOD is the practice where employees use...more
Smartphones and tablets are everywhere. Largely prompted by Apple, Samsung, and Google’s consumer-centric marketing strategies, people are spending more and more money on the latest and fastest mobile devices, upgrading them...more
Lazette v. Kulmatycki, 2013 WL 2455937 (N.D. Ohio June 5, 2013).
In this employment law case, the federal district court held that the Stored Communications Act (SCA) can apply if an employer reads personal emails from...more
Compiled by @ComplexD from online public domain resources, provided for your review/use is this week’s update of key industry news, views, and events highlighting key electronic discovery related stories, developments, and...more
Social Media Policies: You're Probably Doing It Wrong. Test these 9 steps.
Special thanks to Palm Beach Bar Bulletin for publishing in their Feb 2013 issue....more
Facebook is a seemingly endless source of juicy intel. As such, I always recommend that users lock down their privacy settings if they want to keep “the man” out of their timeline. Public posts are fair game for employers...more
This article discusses the Patreaus affair from the standpoint of practical email privacy tips for lawyers, law firms, their clients, and families. A brief explanation is provided how emails (or even fake email addresses)...more
This article discusses that, in addition to civil liability that employment lawyers tend to be alert for in departing employee scenarios, departing employees can also be criminally liable for theft, misappropriation, or other...more
Pre-litigation practice pointers for locating, obtaining, and protecting the wealth of often-overlooked information that is voluntarily disclosed via social and other electronic media content. Published in the September 2011...more
This article, published in the June 2011 issue of the newsletter of the Maryland Chapter of the Federal Bar Association, discusses the powerful tool that social media has become. Social media is too difficult to ignore and...more
Compiled by Orange Legal Technologies from online public domain resources, provided for your review/use is this week’s update of key industry news, views, and events highlighting key electronic discovery related stories,...more
According to the third district appellate court in Holmes v. Petrovich, 2011 DJDAR 671, your office privacy is a lonely public roadway. And where the limits are clearly posted, you had better obey—no matter what kind of...more
The pen has become even mightier since Facebook and its kin stepped into the courtroom.
Today, courts consider social media posts to be beyond the purview of the right of privacy - and fully admissible in court. Now, with...more
This article examines two cases which require companies to have clear Internet and E-mail use and monitoring policies to avoid violating the Stored Communications Act and/or an employee’s right to privacy. ...more
Article discusses discoverability of information posted on social networking web sites, including Facebook and MySpace, and analyzes how discovery disputes and potential admissibility at trial of this information may be...more
Find a Privacy Author »
Back to Top