Legal Minute: Cybersecurity Reporting Requirements for Government Contractors
Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Tips for Mobile App Privacy Compliance
The Federal Trade Commission (FTC) issued a report in March 2012 setting forth best practices for businesses to protect the privacy of American consumers and give them greater control over the collection and use of their...more
Recruiters are increasingly turning to social media to screen and recruit candidates. Jobvite’s 2012 Social Recruiting Survey found that 92% of respondents plan to use social media for recruiting. Often, recruiters are...more
The District Court decided that the proper measure of damages was the "reasonable royalty" that the infringing party would have paid for American Sales' customer list had it paid for authorization to use the list. American...more
I don’t know about you, but if I see one more article telling me how important it is for me to grow my practice through social media, I may toss a grenade. If I see one more article entitled “Seven Important Steps to Take...more
Find a Privacy Author »
Back to Top