Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Polsinelli Podcast - HIPAA Changes Overview
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
Although it is unclear when autonomous vehicles will be hitting the roads, what is clear is that this technology is coming. Automakers to suppliers to lawmakers to insurers will want to carefully consider the following issues...more
Congress passed the Carl Levin and Howard P. "Buck" McKeon National Defense Authorization Act for Fiscal Year 2015 (NDAA or Act) on Dec. 12, 2014. The NDAA for 2015 creates a new cyber breach reporting requirement affecting...more
It is possible to collect location data relating to employees through smartphone Apps if used in order to optimize the usage of resources and improve their management, coordination and timing provided that this practice...more
Last year, Amazon raised eyebrows in a now-famous announcement that it was considering launching a same-day delivery service for certain products through the air, using quadcopter drones. At the time, many in the tech and...more
The maritime industry may beone of the oldest in the world, but in-depth reports issued by the United States Accountability Office (“GAO”) and the European Network and Information Security Agency (“ENISA”) confirm that our...more
The Department of Transportation’s National Highway Traffic Safety Administration (“NHTSA”) announced in 2014 that it would begin steps toward implementing vehicle-to-vehicle (“V2V”) technology with an aim toward decreasing...more
Last week, Senator Jay Rockefeller (D-W.Va.) sent a letter to the top ten revenue generating passenger airlines in the United States, opening an inquiry into their practices related to charging additional fees for optional...more
The Obama Administration informed various sources that President Obama plans to issue an executive order to develop privacy guidelines for using commercial unmanned aerial systems (UAS) - also referred to as drones....more
On October 23, 2013, the National Institute of Standards and Technology (NIST) released a long-anticipated draft of its Cybersecurity Framework. The Framework, as NIST explains, is “not a risk management process itself,” but...more
On October 22, the National Institute of Standards and Technology (NIST) issued its Preliminary Cybersecurity Framework (the Preliminary Framework). The Preliminary Framework represents the first full draft of the...more
In accordance with the President's Executive Order on Cybersecurity issued on October 22, 2013, the National Institute of Standards and Technology ("NIST") released the draft of its Cybersecurity Framework, intended to help...more
Commercial drones for news gathering may be grounded from takeoff, at least for a while, by fiscal dogfights and privacy concerns playing out this month in the U.S. Congress....more
Cyber-attacks by both private actors and nation states against US critical infrastructure and individual communications users are on the rise. In Washington, DC, policy makers are increasing their focus on cyber threats on...more
Consider this: A service organization we’ll call CloudCo collects and compiles personal information from its corporate customer. The individual whose personal information is being collected has a relationship directly with...more
Senate Amendment Could End "Digital Strip Searches"
Senator Udall (D-NM) has introduced a Senate Amendment 51 that would require the Transportation Security Administration to install "Automatic Target Recognition" software...more
EPIC is making available to the public today the report EPIC prepared in January 2010, following the release of documents from the DHS in an open government lawsuit. The analysis, based on the internal records obtained from...more
EPIC Files FOIA Suit to Force Disclosure of Body Scanner Radiation Risks
EPIC has filed a Freedom of Information Act lawsuit against the Department of Homeland Security, seeking records concerning radiation emissions and...more
Find a Privacy Author »
Back to Top