Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
As one who presumably has no nude selfies, you may not be too concerned about a “hack” like the one that continues to afflict celebrities like Jennifer Lawrence and Kate Upton. But that doesn’t mean there aren’t still plenty...more
Hashtags and Ads: Top 10 Legal Considerations for Brands Involved in Digital and Social Media Advertising -
Advertising, marketing and promotions, both via digital and traditional channels, are governed in the United...more
The Parliament Commission on rights and duties on the Internet has recently issued a draft Declaration on the rights and duties related to the Internet.
The Declaration, the starting point of which is the...more
On 9 October 2014, Judge Nobuyuki Seki of the Tokyo District Court granted a provisional injunction against Google Inc. (“Google“) and ordered Google to delete search results of a plaintiff who claimed his privacy rights had...more
Almost five months after federal parliamentary elections took place, the negotiators from the four political parties around the negotiating table (Flemish parties NVA, CD&V and Open VLD and Walloon party MR) reached a...more
It’s mid-October. Like many businesses in Canada, you may be weary of hearing about CASL compliance. Hopefully that weariness is due to all the hard work you did 3 months ago to bring your organization into compliance for the...more
At the end of September, California Governor Edmund G. Brown, Jr. approved six bills designed to enhance and expand California’s privacy laws. These new laws are scheduled to take effect in 2015 and 2016. It will be...more
As we described in July and September, P.F. Chang’s was hit with three putative class actions following its announcement of a point-of-sale data breach. On August 29, P.F. Chang’s moved for dismissal of the first two cases,...more
..Big Brother isn’t just watching. A single mother in upstate New York was surprised to find that she had a Facebook page in her name, complete with photos of her, her son, and her niece. She hadn’t actually set up the page....more
Another year has passed and we again welcome October, National Cybersecurity Awareness Month.
It seems a bit dismissive to have only one month dedicated to cybersecurity awareness given the magnitude and number of...more
On November 1, 2014, Oklahoma will join a number of other jurisdictions that prohibit employers from gaining access to passwords to employee or applicant social media accounts or from viewing non-public information maintained...more
In just two years, social media password protection has gone from a privacy advocate’s dream to an employer’s harsh reality in many states. Maryland became the first state (in 2012) to enact legislation that prevented...more
..Yik yuck. As we’ve discussed on this blog, secrecy is all the rage these days in the online world. Yik Yak – a particularly edgy social media app that seeks to preserve user anonymity – is sweeping the country, or at least...more
In recent months, the Federal Trade Commission (“FTC”) has been steadily ramping up its efforts to monitor, regulate, and provide best practice guidance in the rapidly expanding field of mobile applications. On September 10,...more
This marks the second week of National Cyber Security Awareness Month, and one focused on the Secure Development of IT Products, so it seems only appropriate to discuss security and The Internet of Things and a recent panel...more
The ALRC has recommended (once again), in a recent report regarding the Serious Invasions of Privacy in the Digital Era, that a statutory cause of action for serious invasions of privacy be introduced.
The proposal by...more
A new month, a new Privacy Tuesday.
JPMorgan Chase: Baiting the Hook for Phishers -
Cybercrime researchers say that the 83 million customer records (76 million consumer and 7 million small business) swiped from...more
SPECIAL FOCUS: The Impact of eBay on Lanham Act False Advertising Litigation -
A recent opinion by the United States Court of Appeals for the Third Circuit held that the Supreme Court’s landmark decision in eBay is...more
The typical data breach lawsuit and how to protect your company -
Companies can ill afford to wait until they experience a data breach to implement protective measures -
With more than 1,367 confirmed data...more
The Federal Trade Commission (FTC) recently announced a settlement with online review site, Yelp, Inc., and mobile app developer, TinyCo, Inc., against separate charges that the companies were collecting children’s...more
The very tool (cell phones) that has allowed millions of previously disconnected people to coordinate large civil protests in numerous countries is now being used to quash dissent in Hong Kong. If recent reports are proven...more
On September 30, 2014, California Governor, Jerry Brown, signed Assembly Bill 1710 into law, amending California’s existing personal information privacy laws. A.B. 1710 makes several changes to existing laws including...more
Back in April, Google filed a Petition for Certiorari with the U.S. Supreme Court in the Street View case, seeking review of the Ninth Circuit’s decision holding that unencrypted Wi-Fi signals are protected from interception...more
Will California’s “Kill Switch” Law Kill An Employer’s Ability To Protect Sensitive Company Information?
In this digital age, smartphone technology has become essential and ubiquitous to business operations. But the...more
On September 29, 2014, California Governor Jerry Brown signed SB 1177 into law, effective Jan 1, 2015. The new privacy and advertising regulation goes beyond FERPA, the federal student privacy law, and existing state student...more
Find a Science, Computers & Technology Author »
Back to Top