Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
Federal Law No. 242-FZ "On Amendments to Certain Legislative Acts of the Russian Federation for Clarification of the Procedure of Personal Data Processing in Information and Telecommunication Networks" (the "Federal Law No....more
The Federal Trade Commission (FTC) has approved iKeepSafe as a self-regulatory "safe harbor" program under the Children's Online Privacy Protection Act (COPPA). The FTC's COPPA Rule requires, among other things, that online...more
Companies commonly utilize Facebook as part of their online social media advertising strategy. Companies should revisit this strategy in light of a recent finding in the Northern California U.S. District Court (In re Hulu...more
As the world recovers from the excitement leading up to Tuesday’s Apple Live Event announcement of the new iPhone 6 and Apple Watch, mobile app developers are chomping at the bit to create software that leverages the new...more
eHealth and fitness/wellness applications are being investigated and potentially sanctioned by the Italian data protection authority that found half of them not compliant with applicable privacy laws....more
As a reminder of the transnational nature of online data collection-and the ever-expanding web of regulatory bodies stepping in to monitor how information is collected and used-Brazilian regulators announced that they had...more
Members of the Global Privacy Enforcement Network (GPEN) have released the results of its May 2014 privacy sweep. A common theme is the need for greater transparency regarding data collection and use prior to the downloading...more
As you all remember, last May the European Court of Justice ruled that Google must allow the de-indexing of web pages containing personal data, further to a lawful enforcement by the relevant data subjects of their right to...more
How would you feel if businesses or individuals had access to your medical records? There is no question that advertisers, businesses, and even overly-clingy significant others would love to have access to your private...more
A Stored Communications Act (SCA) search warrant case arising out of a New York federal narcotics trafficking investigation is being closely watched by EU data protection authorities, privacy advocates, multinational...more
DLA Piper has published an updated summary of the way in which the law relating to cookies has been implemented across the EU.
This guide is particularly relevant as a cookies sweep day is planned to take place in the...more
Last week the FCC’s Enforcement Bureau announced that Verizon agreed to pay a record US$7.4 million to settle an investigation related to the company’s treatment of consumer personal information. Specifically, the Commission...more
The European data protection authorities will be conducting a “cookie sweep” later this month, carrying out random spot checks on websites to assess for compliance with EU “cookie” laws. Businesses should therefore be...more
When one thinks of the use of technology in school, often the first image that comes to mind is of students sending ill-advised Snapchats and making in-app purchases that line the pockets of the Kardashian family, rather than...more
With little ability to undo the damage caused by an embarrassing data breach, nearly insurmountable obstacles preclude a civil/criminal prosecution, and a cloud service agreement rendering a contract action against the...more
..We can work it out. Actress Katherine Heigl and the Duane Reade chain of drugstores have settled a $6 million federal suit filed by Heigl this past April in the U.S. District Court for the Southern District of New York. ...more
In August, the Federal Trade Commission (“FTC”) released a staff report concerning mobile shopping applications (“apps”). FTC staff reviewed some of the most popular apps consumers utilize to comparison shop, collect and...more
If your selfie has fallen into the wrong hands, the following statutory acts and/or common law theories may provide some relief....more
Any mobile payment this summer?
As you probably know, this is an ever growing market. According to a study of the Politecnico of Milan, the new “Mobile and App Economy” was worth 25.4 billion euro in 2013 and can reach...more
On August 19, the FTC approved final orders resolving allegations that two companies: (i) misrepresented the level of security of their mobile applications; and (ii) failed to secure the transmission of millions of consumers’...more
According to recent media reports, Google is allegedly designing a Google account for children under 13 which would permit children in this age group to officially create their own Gmail account and to access a kid-friendly...more
A Houston area woman has sued Facebook asking for $123 million because Facebook was slow to take down a fake a profile created by her ex-boyfriend with pornographic images.
The plaintiff sued Facebook and the...more
Social media commentators can be feral. This is largely due to a psychological phenomenon known as the online disinhibition effect. The relative anonymity of social media communications, for some, opens the door for cruel and...more
There is another retail data breach to talk about in this Privacy Tuesday post – privacy & security bits and bytes to start your week....more
Find a Science, Computers & Technology Author »
Back to Top