After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
The CNIL announced last week that it was conducting its Cookies Sweep on September 18-19. The CNIL reviewed 100 French websites and checked the following...more
As technology developers continue to push the envelope on services and applications affecting the daily lives of consumers, the intersection of technology and privacy is becoming increasingly fraught with legal implications...more
On 15 September 2014, Qatar’s Emir approved Law No. 14 of 2014, The Cybercrime Prevention Law (“Cybercrime Law”). Although it has not yet been published in Qatar’s Official Gazette, the text of the law was published in the...more
Merchants—rightfully so—are worried about securing their payment card environments so that their name does not appear in a headline discussing how millions of cards were stolen from them. Faced with the challenge of...more
Signaling a predicted renewal of enforcement of the federal children’s privacy law following broad expansion last year of who and what is covered by the rules, the FTC has filed and settled two recent law suits against mobile...more
Recent Trends in HIPAA Liability -
Since the passage of the 2013 HIPAA Omnibus Rule, there has been a substantial increase in HIPAA enforcement actions brought by the Department of Health and Human Services, including...more
Federal Law No. 242-FZ "On Amendments to Certain Legislative Acts of the Russian Federation for Clarification of the Procedure of Personal Data Processing in Information and Telecommunication Networks" (the "Federal Law No....more
Impending sweep day to verify compliance with guidelines on cookies -
During the week of September 15–19, 2014, France’s privacy regulator, the Commission Nationale de l’Informatique et des Libertés (CNIL), is...more
The Federal Trade Commission (FTC) has approved iKeepSafe as a self-regulatory "safe harbor" program under the Children's Online Privacy Protection Act (COPPA). The FTC's COPPA Rule requires, among other things, that online...more
A recent court decision found that the Federal Trade Commission (FTC) has authority to enforce the requirements for security of Protected Health Information, or PHI, as defined under the Health Information Portability and...more
In August 2014, the Federal Trade Commission (“FTC”) approved final orders resolving its actions against Fandango, LLC (“Fandango”) and Credit Karma, Inc. (“Credit Karma”) for allegedly misrepresenting the security of their...more
Companies commonly utilize Facebook as part of their online social media advertising strategy. Companies should revisit this strategy in light of a recent finding in the Northern California U.S. District Court (In re Hulu...more
On September 3, 2014, following the news of a possible breach at Home Depot (which was confirmed on September 8), the National Association of Federal Credit Unions (NAFCU) called on Congress to enact new legislation to hold...more
As a reminder of the transnational nature of online data collection-and the ever-expanding web of regulatory bodies stepping in to monitor how information is collected and used-Brazilian regulators announced that they had...more
I recently posted about some companies making the decision to not announce when a data security breach has occurred, or at least they would think twice before announcing. According a couple crisis communication experts, that...more
That is, on receiving the personal information from a third party, you must contact each individual whose personal information you have now “collected” and notify them of the mandatory matters specified in the APPs, if such...more
As you all remember, last May the European Court of Justice ruled that Google must allow the de-indexing of web pages containing personal data, further to a lawful enforcement by the relevant data subjects of their right to...more
The HIPAA Omnibus Rule, enacted last year, made a number of changes to the HIPAA privacy, security and breach notification rules. Some of these changes affected business associate provisions of the HIPAA privacy and security...more
Last week the FCC’s Enforcement Bureau announced that Verizon agreed to pay a record US$7.4 million to settle an investigation related to the company’s treatment of consumer personal information. Specifically, the Commission...more
The European data protection authorities will be conducting a “cookie sweep” later this month, carrying out random spot checks on websites to assess for compliance with EU “cookie” laws. Businesses should therefore be...more
Changes Impacting Businesses that Process Personal Data in Russia -
On July 21, 2014, a new law Federal Law ? 242-FZ was adopted in Russia (Database Law) introducing amendments to the existing Federal Law “On personal...more
Back in July, President Vladimir Putin signed a law (Federal Law No. 242-FZ) that compels “data operators” to store Russian citizens’ personal data only inside Russia. Previously, Russian law allowed the storage of data...more
While Congress continues its aggressive push on cybersecurity legislation, regulatory oversight and legal efforts continue across the spectrum of industries effectively filling the gap in addressing now every day concerns...more
While not a day goes by without a new cybersecurity attack, the recent news of the Russian criminal gang who is alleged to have stolen over 1 billion user names and passwords as well as 500 million email addresses reinforces...more
When one thinks of the use of technology in school, often the first image that comes to mind is of students sending ill-advised Snapchats and making in-app purchases that line the pockets of the Kardashian family, rather than...more
Find a Science, Computers & Technology Author »
Back to Top