Photo of John Tomaszewski

California, home to more than 40 million people and the 5th largest economy in the world, has passed the California Consumer Privacy Act (CCPA), its omnibus consumer privacy law. The law creates sweeping new requirements concerning the collection, maintenance, and tracking of information for both employees or customers who are residents of California. Many aspects of the implementation and enforcement are still being finalized by the California Attorney General. However, companies with employees or customers in California need to take stock of the information they are processing that could qualify as “personal information” for California residents, and they need to begin establishing mechanisms for compliance before the end of 2019.
Continue Reading The California Consumer Privacy Act of 2018: What Businesses Need to Know Now

On March 1–2, 2018, five Seyfarth attorneys will be attending the American Intellectual Property Law Association’s annual Trade Secret Law Summit in San Diego, California, one of the preeminent events for trade secret practitioners in the nation. Erik Weibust is on the planning committee for the Summit and will be moderating a panel entitled “The Ethics of Law Firm Cybersecurity,”
Continue Reading Seyfarth Takes The 2018 AIPLA Trade Secret Law Summit By Storm

shutterstock_183065225We are pleased to announce the webinar “Employee Social Networking: Protecting Your Trade Secrets in Social Media” is now available as a podcast and webinar recording.

In Seyfarth’s fourth installment of its 2015 Trade Secrets Webinar series, Seyfarth attorneys addressed the relationship between trade secrets, social media, and privacy.

As a conclusion to this well-received webinar, we compiled a
Continue Reading Webinar Recap! Employee Social Networking: Protecting Your Trade Secrets in Social Media

WebinarOn Thursday, May 28, 2015 at 12:00 p.m. Central, in the fourth installment of our 2015 Trade Secret Webinars, Seyfarth attorneys John Tomaszewski, Eric Barton and Joshua Salinas will address the relationship between trade secrets, social media, and privacy.

The Seyfarth panel will specifically address the following topics:

  • Defining, understanding, and protecting trade secrets in social media, including a deeper


Continue Reading Employee Social Networking: Protecting Your Trade Secrets in Social Media Webinar

With the FTC’s 2015 report “Internet of Things: Privacy & Security in a Connected World” (“Report”) the idea that more than just computers and phones are able to connect to the Internet. In fact, the Report states that the “IoT explosion is already around us.” This is true, and the Report goes on to describe some
Continue Reading How Far Does the “Internet of Things” Reach?

Cross Posted from Global Privacy Watch

The plethora of security incidents in the news have once again put security front and center of the international agenda. Predictably, this has triggered a number of responses from governments around the world. Some of these responses seem to have been ill-considered. However, one of the more comprehensive responses came out of the
Continue Reading Privacy & Security Are Back on the Agenda in DC

The security breach news cycle continues. There remains a deluge of news stories about point-of-sale terminals being compromised, the ease of magnetic stripes being cloned, and the need for Chip and PIN technology being deployed on credit cards. The legal ramifications of all these events is just starting to become apparent – and it’s complicated. Individual liability is beginning to
Continue Reading Security Breach Liability – Its Complicated

While the Supreme Court has taken some heat in the past for seeming to misunderstand technology and how it impacts the normal person’s life, with Riley v. California the Court demonstrated not only an unexpected fluency with how mobile phone technology has evolved, but also with how it has caused our daily sphere of privacy expectations to evolve. Just like
Continue Reading John Tomaszewski Explains the Supreme Court’s Riley v. California Decision and What It Means for Consumer Privacy Going Forward

Cross Posted from Global Privacy Watch

The White House released a set of reports this month on Big Data and the privacy implications of Big Data. While a number of folks have been discussing the President’s Council of Advisors on Science & Technology (“PCAST”) report, I would offer that the Office of Science and Technology Policy (“OSTP”) report needs to be read in conjunction with the PCAST report. They do two different things. One is a report on the technical state of affairs, and the other is more of a policy direction piece, which is driven by the technologically-oriented findings. Various points-of-view have been put forth as to the relative merits of each report, but there seems to be an important element missing from both reports. Both reports discuss the need for policy decisions to be based on context and on desired outcomes. Unfortunately, neither report really gives a good taxonomy around the informatics ecosystem to allow for a clear path forward on “context” and “desired outcomes”. What I mean by this is best summed up in the comment in the PCAST report which states: “In this report, PCAST usually does not distinguish between “data” and “information”.”. “Data” and “Information” are very different things, and one really can’t have a coherent policy discussion unless the distinction between the two is recognized and managed.
Continue Reading Talking About Big Data: A Framework

Much has been written about Heartbleed and the significant impact it has on the security infrastructure of the internet. Articles and blog postings have taken both the “sky is falling” and “it’s not so bad” points of view. However, there is a more fundamental issue which has raised its ugly head – is the use of open source “commercially reasonable” in a security framework?
Continue Reading Heartache from Heartbleed – The Security of Open Source