Email Marketing: A How-To Guide

Email Marketing: A How-To Guide

Email is ubiquitous in modern life with billions of emails – wanted and unwanted – sent each day. Since its enactment in 2003, the Controlling the Assault of Non-Solicited Pornography and Marketing (“CAN-SPAM”) Act has attempted to curb the number of unwanted emails and impose some rules on a largely unregulated frontier. When followed, CAN-SPAM Act’s restrictions give email recipients some control over their inboxes and also maintain fairness in how emails present themselves. Failure to follow the CAN-SPAM Act can lead to penalties of up to $16,000 per violation. …

email marketing

Mobile App Privacy Policies: A How-To Guide

Mobile App Privacy Policies: A How-To Guide

Many of the most popular mobile apps collect personally identifiable information. Although most app developers are not required to display a privacy policy under federal law, they are contractually required to do so pursuant to the terms and conditions of the websites that market most major mobile device applications (e.g., the Apple Store, or Google Play). In addition, the California Attorney General has taken the position that applications that collect personal information are required to post a privacy policy pursuant to the CalOPPA discussed in the previous section. …

app provacy

Guidelines for Cloud Computing

Guidelines for Cloud Computing

Most companies now use some form of cloud computing whether through software as a service, platform as a service, or infrastructure as a service. Cloud computing’s cost-effective scalability can offer significant advantages to an organization, but it can also raise significant security concerns. Although many cloud providers offer assurances that their systems are secure, many are also unwilling to contractually guarantee the security of data placed in the cloud and are unwilling to fully indemnify a company in the event that the cloud storage is breached. …

bush

Privacy Issues to Consider When Developing a Mobile App (2016)

Many of the most popular mobile apps collect personally identifiable information. Although most app developers are not required to display a privacy policy under federal law, they are contractually required to do so pursuant to the terms and conditions of the websites that market most major mobile device applications (e.g.,the Apple Store or Google Play). In addition, the California Attorney General has taken the position that applications that collect personal information are required to post a privacy policy pursuant to the CalOPPA….

app

How to Comply with the CAN-SPAM Act (2016)

Email is ubiquitous in modern life with billions of emails – wanted and unwanted – sent each day. Since its enactment in 2003, the Controlling the Assault of Non-Solicited Pornography and Marketing (“CAN-SPAM”) Act has attempted to curb the number of unwanted emails and impose some rules on a largely unregulated frontier. When followed, CAN-SPAM Act’s restrictions give email recipients some control over their inboxes and also maintain fairness in how emails present themselves. Failure to follow the CAN-SPAM Act can lead to penalties of up to $16,000 per violation….

complycanspam

BYOD At A Glance (2015)

Many companies permit their employees to use personal mobile devices, such as smartphones and tablets, to access company specific information, such as email.  Bring Your Own Device (“BYOD”) policies can be popular for employees that want to use their hand-picked device and for employers who avoid the cost of providing, and maintaining, company-owned devices. Nonetheless, the use of company data on noncompany devices implicates both security and privacy considerations . . . BYOD_Data Privacy_1

 

Mobile App Privacy Policies At A Glance (2015)

Many of the most popular mobile apps collect personally identifiable information.  Although most app developers are not required to display a privacy polucy under federal law, they are contractually required to do so pursuant to the terms and conditions of the platform for which the app will be marketed. . . Mobile App Privacy Policies

CAN-SPAM An In-House Guide (2015)

Email is ubiquitous in modern life with billions of emails – wanted and unwanted – sent each day.  Since its enactment, the CAN-SPAM Act has attempted to curb the number of unwanted emails and impose some rules on a largely unregulated frontier. When followed, CAN-SPAM’s restrictions give . . . CAN-SPAM

 

Contracting with Cloud Computing Vendors At A Glance (2015)

Most companies use some form of cloud computing.  While cloud computing’s scalabiltiy offers cost efficiences, it also raises security concerns and service providers cannot guarantee 100% security of the underlying data . . .

CloudComputing

The Case For Preemption Under A National Data Breach Notification Standard

Data breaches can rob retailers and other businesses of consumer confidence and impose a variety of mitigation costs, such as consumer notification. Congress is currently considering whether to enact a federal standard that would (a) establish a comprehensive federal obligation to protect consumers following data breaches; (b) preempt state data-breach statutes; and (c) preempt state common-law claims alleging deficient data- breach notification based on negligence or other theories of liability. . . WLFPreemption1