Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
Last week the FCC’s Enforcement Bureau announced that Verizon agreed to pay a record US$7.4 million to settle an investigation related to the company’s treatment of consumer personal information. Specifically, the Commission...more
Within several months of Securities and Exchange Commission Chair Mary Jo White’s announcement in late 2013 of a commitment to improving the SEC’s trial readiness, the Commission suffered a number of losses in federal...more
It is ironic to learn the Office of Inspector General (OIG) believes the Office of the National Coordinator for Health Information Technology (ONC) essentially has an insufficient compliance program to maintain the privacy...more
The federal government must publish new procedures 90 days after the 2014 Intelligence Authorization Act is signed. These procedures will become effective upon publication.
Intelligence community contractors will be...more
On June 25, the American National Standards Institute (ANSI) issued a call for organizations with an interest in security to participate in an advisory committee to a new International Organization for Standardization (ISO) ...more
The Department of Health and Human Services (HHS) Office for Civil Rights (OCR) is not the only government arm that enforces data breaches. The Federal Trade Commission (FTC) has broad authority to regulate the security of...more
Companies that handle personal data may need to litigate an FTC enforcement action to its conclusion before a court will review the Commission's jurisdiction to commence the enforcement action in the first place....more
Last week, the U.S. Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (OCIE) released a Risk Alert announcing its Cybersecurity Initiative....more
Following a series of previous judgments, the Court of Justice of the European Union (CJEU) confirmed in the case of the Commission v Hungary (case C-288/12) the independence of national data protection authorities in the...more
The FTC’s Claim -
A New Jersey federal judge has confirmed the Federal Trade Commission’s (“FTC”) authority to regulate data security and bring claims against companies suffering data breaches due to inadequate...more
In our first blog in this series, we provided a summary of the District Court of New Jersey’s recent decision in FTC v. Wyndham Worldwide Corp., in which Judge Salas confirmed the FTC’s authority to bring enforcement actions...more
Earlier this week, the Canadian government introduced Bill C-13, Protecting Canadians from Online Crime Act. The proposed legislation covers a lot of ground, including the introduction of a suite of new investigation powers...more
Attorney and Solicitor Susan Foster, Member of Mintz Levin's Corporate & Securities Practice, discusses the proposed changes to the EU’s data protection and privacy rules. ...more
Cities, Counties, Special Districts and School Districts Must Now Notify Those Impacted by Security Breaches -
Gov. Jerry Brown recently signed Assembly Bill 1149 (AB 1149) and Senate Bill 46 (SB 46) into law,...more
The Office for Civil Rights (OCR) of the Department of Health and Human Services recently announced the release of its guidance, “Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule: A Guide for Law...more
Companies across the Country should be following the Federal Trade Commission’s (“FTC”) civil suit brought against Wyndham Worldwide Corporation and Wyndham Hotels and Resorts, LLC (“Wyndham”) entitled Federal Trade...more
The Federal Trade Commission recently filed another complaint against a company for alleged data security lapses. As readers of this blog know, the FTC has initiated numerous lawsuits against companies in various industries...more
Below is a top ten pocket guide for the top ten laws any operation (social, e-commerce, IP/UGC driven, etc.) needs to be familiar with now and for the foreseeable future. Having this at the ready won’t necessarily make you...more
Over the past decade the Federal Trade Commission has brought cybersecurity enforcement actions against various private companies, imposing tens of millions of dollars in monetary penalties and requiring companies to maintain...more
Hotelier Wyndham Worldwide Corp’s motion to dismiss an FTC lawsuit alleging lax data security practices is likely to have significant implications for the agency’s ability to police cybersecurity practices at American...more
A Santa Clara County Superior Court judge recently ruled that emails and text messages concerning city business but stored on a public official’s personal device are subject to the Public Records Act (PRA). The PRA request at...more
Full text copy of Supreme Court's dismissal of lawsuit challenging federal wiretapping program.
On Tuesday, February 26, 2013, a divided Court dismissed a challenge to the FISA Amendments Act, which permits federal...more
On 7 February, the European Commission (EC) published an EU Cyber Security Strategy encompassing a proposed Directive on Network and Information Security (NIS Directive). The aim of the Strategy and NIS Directive is to...more
The Final Rule offers significant changes to patient rights and patient protections. (There is much more to the rule, but other aspects are not addressed in this post. Here you may find a link to the HIPAA Omnibus Rule, a...more
The final regulations from Department of Health and Human Services Office of Civil Rights (OCR) containing modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules (Omnibus Rule) have finally...more
Find a Science, Computers & Technology Author »
Back to Top