Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Jason Maloni on Data Security
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Ted Hester on Congressional Investigations
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
Bennett Jones launches Canadian Anti-Spam Information Site
TORONTO, January 22, 2014 – In response to the long-awaited regulations pertaining to the Canadian government's anti-spam legislation, Bill C-28, Bennett Jones LLP...more
March 14 (Bloomberg Law) -- Bloomberg Law's Lee Pacchia runs through the legal news for the week. New Jersey-based Archer & Greiner PC is the latest law firm to announce layoffs of attorneys and staff. Also, counsel for...more
Social Media Policies: You're Probably Doing It Wrong. Test these 9 steps.
Special thanks to Palm Beach Bar Bulletin for publishing in their Feb 2013 issue....more
Why People are Careless about Internet Privacy -
If you are like me, you have probably wondered why people choose to share so much about themselves and their families on Facebook. Why do people treat the social media...more
"CYA - Cover Your Apps" is a presentation for the Assoc. of Corporate Counsel (S. Florida) regarding mobile apps and app development best practices for corporate counsel. Covers app development contracts and pitfalls,...more
Like many people with a standard Midwest religious upbringing I struggle to do the right thing and, sometimes, to know just what that is under the circumstances. But, as St. Paul discussed in Romans 7 “being good is not...more
In the matter of disputes between the member and clients arising from transactions executed between the parties, the law of limitation provides a time limit of three years to file the claims as per procedure. However, the...more
Clients Value Their Privacy
I do not provide references because my clients value their privacy and time, as do I. After practicing law for 25 years, I am thoroughly imbued with the concept of confidentiality, and I take...more
Privacy is one of the public’s biggest concerns when discussing eDiscovery and its place within the realm of social media. For one thing, many people feel that it still exists…it does not. More and more courts are...more
I don’t know about you, but if I see one more article telling me how important it is for me to grow my practice through social media, I may toss a grenade. If I see one more article entitled “Seven Important Steps to Take...more
This is a sample client disclosure concerning the use of email and texting as a means of communicating between attorney and client; it's potential impact on the attorney - client privilege and a response to ABA Formal Ethics...more
A step by step guide for lawyers who market on Facebook to ensure that all of their personal and business privacy settings are up to date. Published in the Oct 2011 edition of the Palm Beach Bar Association Bar Bulletin....more
This article explores the new alternative internet-based currency, Bitcoin, and whether -- as an alternative fee arrangement or even as a marketing effort -- your firm might consider accepting bitcoin. Published in the Sept...more
This is the Court Decision finding in favor of the defendants' Motion for Summary Judgment in the Habush Habush & Rottier vs. Cannon & Dunphy "Invasion of Privacy" lawsuit.
The case involves internet-based marketing...more
Have you considered who will be making health care decisions for you if you cannot make them yourself? Under the Health Care Surrogate Act, 755 ILCS 40/1, the State of Illinois has established a plan for your decision-making...more
When I discuss my privacy concerns with people, frequently the response I get is "If you're not doing anything wrong, why do you care?"
I'll tell ya why I care. Just because something's private doesn't mean it's bad or...more
The gold standard in online marketing, the email subscription list. What you need to provide for people to hand over that precious contact information and help you to expand your network and promote lead generation....more
The benefits and challenges associated with practicing law using web 2.0 technology are well-known and continue to be debated in many circles worldwide. As international regulatory agencies grapple with security and privacy...more
Sample Social Media Policy...more
Greg George, Managing Partner of top security firm GTI Advisors Threat Management Practice Group has created a comprehensive due diligence report u2014 among his many recommendations, he suggests that businesses consult a law...more
This manuscript was submitted as material for a Presidential CLE program at the 2010 ABA Annual Meeting. The panel discussion, hosted by the ABA Commission on Ethics 20/20, covered cloud computing and virtual law practice,...more
MGD Enterprises, a consulting company I follow on Facebook presents a business question or piece of advice daily. Today's comment was "Fact for Friday...Is access to social media critical to employee satisfaction? A global...more
The Social Networking Site Rolls Out its Newest Version of Privacy Tools
Since two Facebook privacy applications were released a few weeks ago, the social networking site has once again revamped its privacy...more
This article explores the ethical concerns created by the explosion of social networking as it relates to law firm marketing, confidentiality and privilege. ...more
Several days ago, I wrote a post that linked to a NY Times article detailing how to disable Facebook’s new “like” buttons and “Open Graph API” applications on your pages.
With open web advocates both in the legal...more
Find a Privacy Author »
Back to Top