By: Amy M. Gordon, Ann Killilea, Michael G. Morgan, Susan M. Nash, and Angela M. Stockbridge , McDermott Will & Emery LLP. The U.S. Department of Health and Human Services (HHS) recently issued guidance under the Health Insurance Portability and Accountability...
Q&A with Po Yi , Partner at Venable LLP. Please provide some general background on the types of transactional work you do currently. I counsel and work with clients on the front end of their marketing activities. My practice focuses on business transactions...
By: Matthew Bernstein , Perkins Coie LLP. THE MAJORITY OF PATENT CASES ARE BROUGHT BY non-practicing entities (NPEs), also called patent trolls or patent assertion entities (PAEs). These parties litigate or license their patents but have no real products or services...
By: David Bender Special Counsel, Data Privacy, GTC Law Group. Since 2000, the Safe Harbor program has provided a relatively painless way for U.S. companies to import into the United States the personal information of European Union (EU) residents in compliance...
By: Eric M. Dobrusin, Kristen L. Pursley, and Daniel P. Aleksynas , The Dobrusin Law Firm. A broad range of attorneys represent technology companies in some capacity, and therefore, potentially handle and store sensitive information related to patents or trade...
By: Angela Bozzuti Product Manager, Lexis Practice Advisor. THE CHILDREN’S ONLINE PRIVACY PROTECTION ACT AND Rule ( COPPA ) is a federal law that places parents and legal guardians in control over the collection, use, and disclosure of their children’s...
By: Mark W. Brennan , Hogan Lovells US LLP. AS THE USE OF MOBILE DEVICES SUCH AS SMARTPHONES and tablets has become increasingly prevalent, mobile applications (mobile apps or apps) have also proliferated. Consumers use mobile apps to access social networks,...
By: Geoffrey H. Wold As cyber criminals become more sophisticated in their efforts to target cyber victims, organizations must also grow their capabilities to successfully combat and defeat them. The evolving nature of Internet crime presents a unique set of...
By: James B. Astrachan and Christoper J. Lyon , Astrachan Gunst Thomas, P.C. IN JUNE 2001, THE LATE JUSTICE ANTONIN SCALIA REMARKED , “It would be foolish to contend that the degree of privacy secured to citizens by the Fourth Amendment has been entirely...
By: David A. Zetoony, Bryan Cave LLP and Courtney K. Stout, Davis Wright Tremaine LLP. MOST RETAILERS DO NOT REALIZE THAT BY ACCEPTING credit cards they expose themselves to the risk of a data security breach and significant costs and legal liabilities. This...
By: Elizabeth C. Rogers , Greenberg Traurig, LLP. A data breach occurs when sensitive, protected, and/or confidential information is stolen, accessed, or used without authorization. The information may include an individual’s personally identifiable information...
By Mark W. Brennan , Hogan Lovells US LLP The Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act), 15 U.S.C. §§ 7701–7713 , imposes a number of detailed requirements on persons and entities that initiate...
By: Elizabeth C. Rogers , Greenberg Traurig, LLP. While there is no universal legal requirement that every company have a published privacy policy, consumers have become increasingly sensitized to...
By: Ethan Horwitz , Carlton Fields. TODAY, BOTH PATENT OWNERS AND ACCUSED INFRINGERS have multiple choices of venues in which to litigate the validity of a patent. There is the historic option of a patent infringement case in the federal courts. Increasingly...
By: Po Yi , Venable LLP. When your client plans to create new content or use existing third-party content in a new work, it must conduct a review to ensure that it is permitted to use the material. This review is known as rights clearance. UNAUTHORIZED USE...