Cullen & Dykman Sees Colleges Calling for Title IX Help v
Legal Minute: Cybersecurity Reporting Requirements for Government Contractors
Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
In a January 2015 webcast, Latham & Watkins partners Jim Barrall, global Co-chair of the firm's Benefits and Compensation Practice, and Steven Stokdyk, global Co-chair of the firm's Public Company Representation Practice,...more
We are pleased to share with you the BakerHostetler 2014 Year-End Review of Class Actions, which offers a summary of some of the key developments in class action litigation during the past year. Class action litigation...more
Connecticut has added mortgage brokers, lenders, and servicing companies to the list of “financial institutions” exempted under the state’s existing law limiting credit checks for purposes of employment. The amendment, which...more
In France, before implementing a whistleblowing process, a company must inform and consult with its employees’ representatives, inform its employees and notify the French Data Protection Agency (CNIL).
There are two...more
As reported in the May 2014 edition of Legal News: Investment Management Update, the SEC has made cybersecurity readiness a high-priority item to review when it conducts examinations of registered broker-dealers and...more
A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more
As a growing number of states pass legislation which will protect individuals’ social media accounts from employer scrutiny, they have encountered a surprising adversary – FINRA and other securities regulators....more
Upon learning that his obituary had been published in the New York Times, Mark Twain famously quipped, “Reports of my death have been greatly exaggerated.” The same can be said about class action lawsuit filings after the...more
An increasing number of states are passing laws that prohibit employers and academic institutions from requesting or requiring employees, job applicants, students, and prospective students to turn over their social media...more
Recognizing that business entities now conduct a majority of their operations with the assistance of electronic programs and databases, and that a significant amount of business and personal information may be stored...more
In Tides v. The Boeing Co., No. 10-35238, 2011 WL 1651245 (9th Cir. May 3, 2011), the United States Court of Appeals for the Ninth Circuit held that the whistleblower provisions of the Sarbanes-Oxley Act of 2002 ("SOX"), 18...more
WASHINGTON JOURNAL OF LAW, TECHNOLOGY & ARTS PUBLISHES AUTUMN ISSUE
SEATTLE—Today the University of Washington School of Law published the Autumn 2010 issue of the new Washington Journal of Law, Technology & Arts, the...more
IN THIS ISSUE:
*Employers Need Not Accommodate Employees Who Use Medical Marijuana
..Unnecessarily Broad Background Checks Halted As An Invasion Of Privacy
..FMLA Now Covers Leave To Care For Members Of...more
Find a Privacy Author »
Back to Top