Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
Emerging Strategies for Protecting Global IP Rights
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
There has been an important development in Russian Data Protection Law.
On July 22, 2014 a new law amending the law on data protection and law on information was signed off by the Russian President and thus was...more
Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more
Inter-American Dialogue's Latin America Advisor asked Marcela Cristina Blanco, associate attorney in Diaz Reus’ Bogota, Colombia office: How Well Do Latin American Banks Protect Against Cyber Attacks?...more
The Straits Times reported on 14 August that Singapore’s Personal Data Protection Commission (the “Commission”) is investigating a complaint from a user that Xiaomi has breached the Personal Data Protection Act 2012 (“PDPA”)....more
In the Google Spain “Right to be Forgotten” case, the ECJ held that Google must remove links to a newspaper article containing properly published information about a Spanish individual on the basis that the information is no...more
On July 17th, the Data Retention and Investigatory Powers Act (“DRIP”) came into effect in the United Kingdom reinstating the Government’s powers to require communication providers to retain traffic data (also known as...more
When precisely is a data controller lawfully permitted to process personal data?
If a data controller does not have the consent of a data subject to process his or her data, when does the “legitimate interest”...more
On 31 July, the chief judge of the Southern District of New York delivered the latest in a series of controversial judgments stemming from a test case brought by Microsoft in an extra-territorial warrant issued under the U.S....more
Whatever you might think of where his career went, Elton John had some great early stuff. I still rank Tumbleweed Connection right up there as one of my favorite albums of all-time. And while it was packed with some great...more
The New York Times reported this week that an organized Russian criminal group stole approximately 1.2 billion user name and password credentials associated with more than 500 million email addresses from hundreds of...more
In this issue:
- Apps and Data Privacy
– New Guidelines from the German DPAs New Developments in Cybersecurity Regulation
- Refer-a-Friend Functionality on the Internet – Federal Court underpins its...more
It was widely reported yesterday in The New York Times and elsewhere that a sophisticated Russian crime ring was holding a massive cache of stolen Internet credentials. According to the private security firm Hold Security, a...more
On August 5, The New York Times reported that Russian hackers have obtained what could be the largest collection of confidential data in history. The security firm that discovered the breach continues to alert affected...more
In May earlier this year, the European Union's top court held in favor of an individual who requested that Google remove the search results associated with his name. In this particular case, a Spanish citizen requested that...more
The approval of technical standards introducing an RFID logo and a process for their data protection impact assessment required to comply with the EU Recommendation on RFIDs are expected to boost their usage in several fields...more
Legislative Branch Activity -
House Cybersecurity Legislation -
This week, the House will consider four pieces of cybersecurity legislation on the floor including the National Cybersecurity and Critical...more
Outsourcing and the New Australian Privacy Law:
In a nutshell -
In Australia all APP Entities which collect, use or disclose Personal Information must, under the Privacy Act 1988 (Cth) (“Act”), take reasonable steps...more
Ofcom has issued a call for stakeholder input on the emerging Internet of Things. The Internet of Things describes the inter-connection of multiple “things”, be they devices or sensors, that are able to communicate and share...more
..Facebook reported strong results for ad revenue in the second quarter of 2014. Mobile advertising was particularly strong, up 30 percent from last year. Mobile ads now account for 62 percent of Facebook’s advertising...more
Over the past decade, the EU has made significant technological and legal strides toward the widespread adoption of electronic identification cards. An electronic ID card, or e-ID, serves as a form of secure identification...more
Now more than ever, there is a need for risk solutions in the boardroom. Any organization can be faced with a significant crisis, whether a fraud investigation, a regulatory infringement, allegations of anticompetitive...more
Although no major legislative milestones for the EU Data Protection Regulation have occurred since March 2014 (see status update here), there has been some progress over the late spring and early summer of 2014. One key item...more
With no major legislative milestones since the March 2014 EU Parliamentary vote endorsing the LIBE draft of the new Data Protection Legislation, observers from outside the EU might understandably wonder whether the...more
Will it happen? Well, “if it looks like a duck, swims like a duck and quacks like a duck then its probably a duck”. All the indications are that the Regulation will happen. We have to assume it will. This echoes the...more
Data protection issues for Google in Italy are not over. The Italian Data Protection Authority (DPA) has now challenged their privacy information notice requiring – among others – an express consent from users to their...more
Find a Science, Computers & Technology Author »
Back to Top