Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Jason Maloni on Data Security
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Ted Hester on Congressional Investigations
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
This is a sample client disclosure concerning the use of email and texting as a means of communicating between attorney and client; it's potential impact on the attorney - client privilege and a response to ABA Formal Ethics...more
According to the third district appellate court in Holmes v. Petrovich, 2011 DJDAR 671, your office privacy is a lonely public roadway. And where the limits are clearly posted, you had better obey—no matter what kind of...more
This document contains links to an article concerning an investigation by CBS Evening News into privacy concerns associated with digital office copiers....more
This article explores the ethical concerns created by the explosion of social networking as it relates to law firm marketing, confidentiality and privilege. ...more
This article examines two cases which require companies to have clear Internet and E-mail use and monitoring policies to avoid violating the Stored Communications Act and/or an employee’s right to privacy. ...more
Find a Privacy Author »
Back to Top