Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
While Congress continues its aggressive push on cybersecurity legislation, regulatory oversight and legal efforts continue across the spectrum of industries effectively filling the gap in addressing now every day concerns...more
Each day this week, we are going to explore some of the issues in the rapidly growing area of cyberliability. We will examine the recent increase in focus on privacy issues, why directors should be concerned, the top...more
What's the one thing every company's data security program must include? That's the question we put recently to experts in the field, knowing that, especially after Heartbleed, the diversity of responses would create an...more
Kamala Harris, California's Attorney General, issued a set of recommendations for preventing and responding to cyber attacks and security breaches. The recommendations, called Cybersecurity in the Golden State, are directed...more
The recent string of well-publicized data breaches has demonstrated that cyber criminals are targeting companies of all sizes and in all industries. Even companies with the most sophisticated security systems admit that the...more
On January 15, 2013, Sterling Suffolk Racecourse, LLC (“Applicant” or “SSR”) filed an application for a Category 1 gaming license with the Massachusetts Gaming Commission (“Commission”). The proposed...more
With the rise of BaaS (or Backend as a service) platforms, it is easier than ever to create a mobile app on the fly. But Fenwick privacy co-chair Tyler Newby advises that companies should be aware of some important privacy...more
Satoshi Nakamoto Abstract re Bitcoin White Paper:
A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution....more
Legislative Counsel’s Digest:
Under existing law, the Nevada Gaming Commission and the State Gaming Control Board are required to perform various acts relating to the regulation and control of gaming. (NRS 463.140)...more
The New Jersey DGE regulations on fantasy sports games (N.J.A.C. 13:69 P ) can be found at: http://www.nj.gov/oag/ge/temporaryorders.html
An act to add Chapter 5.2 (commencing with Section 19990) to Division 8 of the Business and Professions Code, relating to gambling.
Legislative Counsel’s Digest:
Senate Bill No. 678, as introduced, Correa, February 22,...more
Hawaii SB768: Bill for an Act relating to Internet Gaming.
"BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF HAWAII:
The legislature finds that internet wagering on games of chance and...more
The message–that’s what I’m talking about–who’s gonna get the message sent to them first?
Data breaches, hacking, and privacy are one of the biggest news stories since 2011 and there is no sign that will be changing...more
In the video, Robert Brownstone, co-chair of Fenwick’s Electronic Information Management Group, describes how the world of data security impacts every organization regardless of size. He identifies three main areas of...more
New Jersey Internet Gaming Draft Bill -- Sponsored by Assemblymen BURZICHELLI, PRIETO, and RAMOS, JR.
"AN ACT authorizing Internet gaming at Atlantic City casinos under certain circumstances and amending and supplementing...more
A review and analysis of the proposed EU Data Protection Reform: the General Data Protection Regulation and the Police and Criminal Justice Data Protection Directive. ...more
The class action arises out of Best Buy's alleged practice of swiping Drivers' Licenses of customers without prior authorization, resulting in possible unauthorized disclosure of restricted personal information to Best Buy or...more
The U.S. Department of Commerce (DOC) issued its proposed framework as to consumer privacy regulation in December 2010. An updated proposal is anticipated in early 2012. The paper includes five recommendations:
In December 2010, the Federal Trade Commission issued its preliminary proposed Framework for Consumer Data Privacy Protection for Businesses and Policy makers, entitled "Protecting Consumer Privacy in an Era of Rapid Change."...more
Every organization in business today is holding personal information about individuals. Whether they are consumers, customers, clients, patients, employees, or business partners, you collect a mass of personal information...more
“We are required to notify you of a security breach in which your name, address, social security number, date of birth and medical history may have been released.”
How would you like to send this notice to your 450,000...more
June 16, 2010
University of Washington School of Law Launches New Technology and Arts Journal
SEATTLE—Today the University of Washington School of Law published the inaugural...more
Japan’s Law Concerning the Protection of Personal Information (the “Law”) came into effect for private sector
businesses in April 2005. The Law provides only a broad outline for the Japanese privacy regime, the details...more
Addressing the growing concerns about identity theft and data breach, the Illinois Governor on June 16, 2005, signed into law the Illinois Personal Information Protection Act (“PIPA”). This law applies to privately and...more
Find a Science, Computers & Technology Author »
Back to Top