Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
Emerging Strategies for Protecting Global IP Rights
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
On July 30, 2014, Sen. Edward J. Markey, D-Mass., made good on his earlier promise to beef up the Family Educational Rights and Privacy Act of 1974 (FERPA) to provide heightened protections for student educational records...more
The Senate Intelligence Committee on June 8th voted 12-3 to approve a cybersecurity bill authored by Senate Intelligence Committee Chairman Dianne Feinstein (D-CA) and Vice Chairman Saxby Chambliss (R-GA). S. 2588, the...more
On July 28, 2014, the House of Representatives passed three bills aimed at enhancing the cybersecurity efforts of the Department of Homeland Security (DHS) in certain critical infrastructure sectors, including the energy...more
Legislative Branch Activity -
House Cybersecurity Legislation -
This week, the House will consider four pieces of cybersecurity legislation on the floor including the National Cybersecurity and Critical...more
The U.S. House of Representatives took a major positive step towards increasing the nation’s cyber security posture today when, on a voice vote, it passed H.R. 3696, the “National Cybersecurity and Critical Infrastructure...more
The last Tuesday in July — the summer of 2014 is rapidly slipping away! Here are some privacy and security bits and bytes for this last week of July...more
On July 24, 2014, the House Committee on Oversight and Government Reform held a hearing entitled, "The Federal Trade Commission and Its Section 5 Authority: Prosecutor, Judge and Jury." The purpose of the hearing was to...more
The Obama Administration informed various sources that President Obama plans to issue an executive order to develop privacy guidelines for using commercial unmanned aerial systems (UAS) - also referred to as drones....more
Admiral Mike Rogers, the new leader of the National Security Agency and Cyber Command at the Defense Department, certainly has taken a different approach from his predecessor, General Keith Alexander. Right out of the gate,...more
Legislative Branch Activity -
Cybersecurity Legislation -
Last week, the Senate Permanent Select Committee on Intelligence held a closed session to mark up the Cybersecurity Information Sharing Act (CISA) which...more
July 15, 2014 (Mimesis Law) -- Scott Greenfield, criminal defense attorney and blogger at Simple Justice, talks with Lee Pacchia about some of the problems he sees in passing laws criminalizing revenge porn. In light of the...more
The federal government must publish new procedures 90 days after the 2014 Intelligence Authorization Act is signed. These procedures will become effective upon publication.
Intelligence community contractors will be...more
On July 8, 2014, in closed session, the U.S. Senate Committee on Intelligence voted 12-3 to report the Cyber Information Sharing Act (CISA). The bill would grant legal immunity for companies to share cyber threat data with...more
Last month, we noted that Sen. Dianne Feinstein (D-CA) released a discussion draft of the Cybersecurity Information Sharing Act. On Tuesday, the Senate Intelligence Committee voted 12-3 to approve the Act....more
Today, the House Education Subcommittee on Early Childhood, Elementary, and Secondary Education and the Homeland Security’s Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies held a joint...more
On June 17, 2014, Senate Intelligence Committee Chairman Dianne Feinstein (D-CA) and Vice Chairman Saxby Chambliss (R-GA) released a draft bill entitled, The Cybersecurity Information Sharing Act of 2014. Given the increasing...more
The Senate Judiciary Subcommittee on Privacy, Technology and the Law has announced it will hold a hearing on June 4, 2014, regarding the Location Privacy Protection Act of 2014....more
On February 12, 2013, President Barack Obama issued Executive Order 13636 (EO 13636) entitled “Improving Critical Infrastructure Cybersecurity.”EO 13636 noted the importance of cybersecurity for the nation’s security and...more
News from the Health Law Gurus™ is a weekly summary of notable health law news from around the country with helpful links to related content. ...more
The "Security" Part -
When reading the Majority and Minority Staff Report from the Permanent Subcommittee on Investigations ("The Subcommittee") regarding the "Hidden Hazards to Consumer Security and Data Privacy" was...more
While the public debate on privacy has largely focused on how government, particularly the intelligence community, collects, stores, and uses data, President Obama earlier this year announced a comprehensive review of the...more
Congress has been trying for several years to pass cybersecurity legislation, and the number of bills hitting the hopper has increased steadily over recent months. Nearly half a dozen bills have been introduced since January...more
Yesterday, May 1, was a big day for privacy in the news. The White House issued 2 reports on the privacy implications of Big Data, and the Florida legislature overhauled the state’s security breach notification law,...more
Following a series of previous judgments, the Court of Justice of the European Union (CJEU) confirmed in the case of the Commission v Hungary (case C-288/12) the independence of national data protection authorities in the...more
Following a string of high-profile data breaches and new data suggesting that approximately 21.3 million customer accounts have been exposed by data breach incidents over the past two years, the California legislature has...more
Find a Science, Computers & Technology Author »
Back to Top