Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Jason Maloni on Data Security
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Ted Hester on Congressional Investigations
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
Weekly Brief: New Round of Layoffs Hit Law Firms
Safeguards against Data Security Breaches (Part Two)
How to Protect Your Company From Hackers
For years now lawyers and law firms providing professional services to health care providers or health insurance plans should have had in place essential safeguards to meet the responsibilities and requirements as business...more
My bank recently sent me a document with “Techniques for creating strong passwords.” Reading through it my first thought was, “This would be great information for my colleagues.” Court reporters protect private, sensitive...more
Court reporters, like everyone else on the planet, want to keep their identity secure. Here are eight tips. My next blog will be tips on creating strong passwords.
- Keep your personal information safe and...more
Law firms do not hold special immunity from the threat of cybercriminals. In fact, law firms should be extra vigilant, considering the breadth of sensitive client information they often possess regarding corporate...more
In Amneal Pharmaceuticals LLC v, Supernus Pharmaceuticals, Inc., IPR2013-00372, Paper 33 (March 7, 2014), the Board rejected Supernus proposed protective order which sought to create a category of highly confidential...more
In the last few months, numerous cases involving Facebook have resulted in amusing rulings that we would be remiss to ignore. On deck for this blog post we have three good ones...more
March 14 (Bloomberg Law) -- Bloomberg Law's Lee Pacchia runs through the legal news for the week. New Jersey-based Archer & Greiner PC is the latest law firm to announce layoffs of attorneys and staff. Also, counsel for...more
A new ruling that could affect how Phoenix law offices advise their
clients on contract law is currently in the news. In September, an
Arizona appellate court advised that a trial court needed to determine
Why People are Careless about Internet Privacy -
If you are like me, you have probably wondered why people choose to share so much about themselves and their families on Facebook. Why do people treat the social media...more
Moving data to the cloud has been the critical data security challenge confronting organizations in the past few years.
With the cloud transition well underway, the spotlight has turned to securing end-user devices like...more
Highlighted in Forbes’ Law & Technology Blog as one of Eight Great Law & Technology Resources, Orange Legal Technologies’ Unfiltered Orange Weekly eDiscovery News Updates provide readers with a trusted compilation of key...more
"Lawyers in the Cloud" explains the cloud storage system, risks, and how to assess whether to use large private systems or public systems like DropBox. From the July/August 2012 Palm Beach Bar Bulletin....more
Presented by Michael Kaiser of the Kaiser Legal Group at the Seattle Continuing Legal Education seminar (CLE) "Everything You Don't Know About E-Discovery (But Wish You Did)." The CLE was held at the Washington State...more
Clients Value Their Privacy
I do not provide references because my clients value their privacy and time, as do I. After practicing law for 25 years, I am thoroughly imbued with the concept of confidentiality, and I take...more
The new electronic signature process for the authorization to disclose information to the Social Security Administration (Form SSA-827) is scheduled to begin April 21, 2012. The process was developed to comply with the laws...more
Web 2.0, mobile applications and cloud based services have revolutionized how companies communicate and interact with customers, current and prospective, and how businesses process, transmit, secure and store information. ...more
Privacy is one of the public’s biggest concerns when discussing eDiscovery and its place within the realm of social media. For one thing, many people feel that it still exists…it does not. More and more courts are...more
I don’t know about you, but if I see one more article telling me how important it is for me to grow my practice through social media, I may toss a grenade. If I see one more article entitled “Seven Important Steps to Take...more
This is a sample client disclosure concerning the use of email and texting as a means of communicating between attorney and client; it's potential impact on the attorney - client privilege and a response to ABA Formal Ethics...more
Find a Privacy Author »
Back to Top