Health + Tech - How Digital Health Tools Help Create Greater Consumer Focus in Healthcare
Cyber Threats
Using The Cloud For Custom Salesforce Solutions
Chris Ford on Compliance and Cloud Computing
Moving Energy Forward: Future Voices Of The Industry
Sitting with the C-Suite: Servient – What’s Next
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
IP | Trend: Data in the Cloud is the Next Big Storm?
At Intersection of Cloud Storage/Transfer & Instant Messaging, Instacom’s a Unique Tool
“The Cloud” No Longer a Hot Topic Because It’s Common Knowledge at This Point
In a decision that may have ripple effects in other pending Telephone Consumer Protection Act actions, on June 2, 2018, the US District Court for the Middle District of Florida issued a stay in Scoma Chiropractic, P.A. v....more
AI technologies present a variety of commercial opportunities and the potential to change our daily lives. At the same time, there are many legal, policy, commercial and strategic challenges that need to be considered across...more
The Internet of Things (“IoT”) connects markets and supply chains around the world. Industry, governments and consumers around the world are embracing IoT technologies to improve research and public policy, to accelerate...more
In this edition of our Privacy & Cybersecurity Update, we take a look at the FCC's new rules for broadband privacy, the FTC's new playbook for data breach response and notification, the NHTSA's voluntary guidance for...more
Senior Counsel Peter Swire to Debate European Privacy Activist Max Schrems. The debate, set to take place on January 26 in Brussels, will highlight key differences between certain European and U.S. attitudes towards U.S....more
On October 13, 2015, the Wireless Telecommunications Bureau (Bureau) of the Federal Communications Commission (FCC or the Commission) issued a Public Notice seeking comment on a Petition for Expedited Declaratory Ruling...more
Earlier this month, privacy and security professionals from around the globe gathered for “Privacy. Security. Risk. 2015”—the second joint conference between the International Association of Privacy Professionals and the...more
Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more