Clocking in with PilieroMazza: #LNE4GovCons: FAR Clause Bans TikTok on Federal Contractor Devices
[WEBINAR] Public Records Act - Taming the Email Tiger
“Follow me on Instagram, will you?” That may seem like a harmless question to a colleague, but starting soon, New York will ban most employer inquiries regarding an employee’s personal social media account....more
Smartphones, smartwatches, tablets… The use of “smart” devices has enhanced conflict in already contentious custody cases. In a recent case, a Philadelphia County Judge specifically stated in their Order that because the...more
In today’s highly connected, tech-obsessed world, personal electronic devices (“devices”), including tablet computers and mobile phones, are seemingly ubiquitous. Increasingly, employers are capitalizing on this phenomenon by...more
On January 11, 2022, the Israeli Supreme Court, in an expanded panel of nine justices, prescribed a set of rules concerning procedures and judicial discretion on the granting of search warrants of computers and cellular...more
In a closely watched decision, the US Court of Appeals for the First Circuit confirmed the government’s expansive authority to search cell phones, laptops, and other electronic devices at the border. On February 9, 2021, the...more
Can a fingerprint alone provide “testimony” about a person? Earlier this month, a federal court in California said yes. But the court was not engaging in a highly-localized form of palm-reading; rather, the question arose in...more
Did you know that there are likely billions of unprotected IP works in nearly every consumer electronic sitting on your desk or held in your hand? Today, it seems like every electronics device maker is announcing there are...more
But, not all security breaches are caused intentionally. For instance, on public transportation, coffee shops, or libraries, your neighbor can gain access to your personal information simply by looking at your screen....more
U.S. Customs and Border Protection (“CBP”) recently updated its 2009 directive pertaining to border searches of electronic devices. The Supreme Court of the United States has deemed warrantless searches by CBP legal and...more
U.S. citizens who travel internationally, especially corporate executives and high-net-worth individuals, must consider and navigate data security risks when crossing a border—whether into the United States or another...more
In this month's edition of our Privacy & Cybersecurity Update, we discuss Poland's potential exemptions from the new EU data law and the Office of the Comptroller of the Currency's recommendations for U.S. banks faced with...more
You recently may have heard news reports regarding new security threats known as "Meltdown" and "Spectre." Not to be mistaken for the latest Hollywood box-office offering, these new threats allow attackers to exploit a design...more
The federal government is open. But less than three weeks remain under the current reprieve and another shutdown seems possible. Although the Federal Communications Commission tapped on-hand fees to support uninterrupted...more
The Tennessee Business Court, now in Phase II of the Pilot Project continues to deal with interesting and contemporary issues. In Universal Strategy Group v. Halstead, Case No. 16-15-BC, Chancellor Lyle held, after a bench...more
International travelers have been reporting that cell phones, computers, and other communication devices are being seized by Officers of the U.S. Customs and Border Protection (“USCBP”) branch of the U.S. Department of...more
Employers have long understood that what their employees do on company time is directly linked to the company’s own potential liabilities. When employees using mobile electronic devices cause harm, their carelessness isn’t...more
On October 8, 2015, California Governor Jerry Brown signed into law the California Electronic Communications Privacy Act (“CalECPA” or the “Act”), sponsored by Senator Mark Leno (D-San Francisco). The Act requires law...more
On Thursday, October 8, 2015, California Governor Jerry Brown signed into law the Electronic Communications Privacy Act (the “California ECPA”). This legislation, which takes effect on January 1, 2015, has been heralded by...more
Law enforcement requests for electronic information, particularly from technology companies such as Google and Twitter, have skyrocketed in recent years. In response, several states—Maine and Texas in 2013, Utah in 2014 and...more
As consumers increasingly connect to the Internet using multiple devices—such as mobile phones, tablets, computers, TVs and wearable devices—advertising technology companies have rapidly developed capabilities to reach the...more
Trekkies and modest Star Trek fans may recall the plot in an episode known as “The Enemy Within” where a malfunction in a transporter causes Captain Kirk to be split into two - a good Captain Kirk and an evil Captain Kirk....more
While the need to authenticate evidence is not new, the types of evidence that trial lawyers need to authenticate is. Social media evidence is one example. While not the type of evidence most practitioners are accustomed...more
Reversing a Superior Court ruling that had caused quite a splash a few months ago, in City of San Jose v. Superior Court (H039498, March 27, 2014), the Sixth District of the Court of Appeal has held that communications to and...more
In a rare move, on August 3, 2013, the United States Trade Representative of the Executive Office of the President (USTR) issued a letter disapproving the United States International Trade Commission's (ITC's) determination...more