U NITED STATES DISTRICT COURT M IDDLE DISTRICT OF FLORIDA ORLANDO DIVISION

Size: px
Start display at page:

Download "U NITED STATES DISTRICT COURT M IDDLE DISTRICT OF FLORIDA ORLANDO DIVISION"

Transcription

1 6:08-cv JA-DAB Document 68 Filed 03/19/09 Page 1 of 11 PageID 1761 BRIAN HOFFMAN, individually and on behalf of all others similarly situated, U NITED STATES DISTRICT COURT M IDDLE DISTRICT OF FLORIDA ORLANDO DIVISION Plaintiff, -vs- Case No. 6:08-cv-1741-Orl-28DAB AUTHENTEC, INC., F. SCOTT MOODY, and GARY LARSEN, Defendants. ORDER This cause came on for consideration with evidentiary hearing and oral argument on the following motion filed herein: MOTION: MOTION FOR A PROTECTIVE ORDER PROHIBITING USE OF MISAPPROPRIATED S AND REQUEST FOR A HEARING (Doc. No. 42) FILED: January 16, 2009 THEREON it is ORDERED that the motion is DENIED. Plaintiff, filed this securities action on behalf of a class of purchasers of stock in Defendant AuthenTec, Inc. ' for claims relating to declines in the stock price 2 following an announcement on September 8, 2008 of an expected reduction in estimated revenue. Plaintiff alleges that Defendants made false and misleading statements and failed to disclose material adverse facts about the 'Plaintiff is also suing the CEO F. Scott Moody and CFO Gary Larsen. 2 AuthenTec s stock is traded on NASDAQ.

2 6:08-cv JA-DAB Document 68 Filed 03/19/09 Page 2 of 11 PageID 1762 company s true financial status. Doc. No. 1. Defendants filed a Motion to Dismiss the Complaint arguing that under the strict pleading requirements of the Private Securities Litigation Reform Act of 1995, 15 U.S.C. 78u-4(b), that Plaintiff s claims were not adequately supported or plead with particularity. Doc. No. 11. Following appointment of Mr. Caruso as lead Plaintiff, Plaintiff was granted leave to file an amended complaint, which was filed on January 9, Doc. Nos. 29, 33. In the Amended Complaint, Plaintiff alleged, based on information from three confidential informants a former employee, an independent contractor, and an outside sales representative that there were internal problems at AuthenTec which Defendants had not disclosed to shareholders in violation of the securities laws. A motion to dismiss the Amended Complaint was filed and is set for oral argument. Defendants now seek a protective order prohibiting the Plaintiff from using AuthenTec s internal confidential s or any information obtained from them. Doc. No. 42. In the Amended Complaint3, Plaintiff references and quotes a series of s generated by AuthenTec s technical team in a troubleshooting operation for one of its clients. Defendants argue that Plaintiff should not be allowed to use the internal confidential s he surreptitiously obtained from a confidential source because the s contain AuthenTec s confidential proprietary information and should not have been accessed by the Plaintiff, his counsel, or third-parties. Doc. No. 42. AuthenTec contends that it has invested significant time and resources to develop a confidential systematic procedure to resolve software bugs in its products, and the procedure is highly confidential and is part of what makes AuthenTec a unique company in the industry because customers can rely on AuthenTec s 3 The publicly-available version of the Amended Complaint was filed with the information from the s redacted. Doc. Nos. 32, 37,

3 6:08-cv JA-DAB Document 68 Filed 03/19/09 Page 3 of 11 PageID 1763 ability to efficiently address any software issues that they may encounter with AuthenTec sensors. Doc. No. 42. Plaintiff responds that the s at issue are not subject to trade secret protection just because the content may be embarrassing or disadvantageous if made public. Doc. No. 48. Plaintiff filed the specific information from the s in response to Defendants argument that the original complaint had vague references to... s, without describing their content. Plaintiff argues that Eleventh Circuit case law regarding specificity pleading requirements under the PSLRA acknowledges that citation to corporate is commonplace and often the most direct means of proving scienter. Doc. No. 48 (citing Mizarro v. Home Depot, Inc., 544F.3d 1230, 1247 (11th Cir. 2008)). Because the Court finds no misconduct attributable to Plaintiff and that the information described in the motion is not otherwise entitled to protection, Defendants Motion for Protective Order is DENIED. I. Background Facts Related to Non-disclosure Issues AuthenTec sells fingerprint authentication sensors and solutions to the PC, wireless device, and access control markets. It acts as a small scanner that reads a fingerprint and determines whether you are who you say you are. AuthenTec primarily sells its products to the PC market and the cell phone market. Because the fingerprint authentication sensor market is an emerging market, there are only two to three significant competitors. AuthenTec contends that it places a high value on the confidentiality of its information and maintains strict security measures to prevent unauthorized access. AuthenTec requires employees and -3-

4 6:08-cv JA-DAB Document 68 Filed 03/19/09 Page 4 of 11 PageID 1764 internal sub-contractors to sign a Non-disclosure Agreement 4 before they can access AuthenTec s facilities, confidential information, or computer networks. AuthenTec s computer network is also password restricted. AuthenTec employees are told not to disclose their passwords, and passwords are changed periodically to further enhance the security of the network. Despite AuthenTec s efforts to protect its confidential information, the Plaintiff (or counsel) obtained a series of s generated by AuthenTec s software team in a troubleshooting operation. The s discuss AuthenTec s procedures to address software problems, discuss the development status of some of AuthenTec s proprietary products, and identify specific product tests conducted by AuthenTec; the s specify the number of software bugs encountered, the type of bugs, where they occurred, and how they are addressed. Of the ten s at issue, seven were sent to the AuthenTec software engineering team, two were sent to Vince Alvarez, and one was sent from Vince Alvarez to Jim Waldron, an AuthenTec employee. Doc. No. 42 at 6 (chart). The s are dated from November 12, 2007 to February 14, Doc. No. 42 at 6 (chart). II. Standard for Protective Order Defendants argue that the Court should, as a sanction, preclude Plaintiff from using any of the disputed s in support of the Amended Complaint. Defendants contend Plaintiff should not be allowed to taint the integrity of this judicial proceeding with internal confidential s 4 AuthenTec non-disclosure agreements generally provide: I recognize that by virtue of my said employment I may acquire confidential information (in written, or machine readable, or other form) regarding the above matters and other affairs and business of [AuthenTec] and of others, including trade secrets, proprietary data, and computer programs, of which I hold in trust and confidence during and following my employment. At no time will I divulge such confidential information to anyone not entitled thereto nor use same for any purpose other than for the benefit of [AuthenTec] without prior written consent of an authorized executive officer or employee of [AuthenTec]. See Attachment 1 to Dec. of Arlene Mostowsky at

5 6:08-cv JA-DAB Document 68 Filed 03/19/09 Page 5 of 11 PageID 1765 surreptitiously obtained. Doc. No. 42 at 8. The appropriate sanction against Plaintiff, Defendants argue, is to bar introduction of the improperly obtained evidence. Doc. No. 42 at 8. A court may impose sanctions for litigation misconduct under its inherent power. Eagle Hosp. Physicians, LLC v. SRG Consulting, Inc., F.3d, 2009 WL (11th Cir. March 12, 2009) (affirming sanction of dismissal for defendant s litigation misconduct, i.e., his refusal to explain his interception of confidential s between plaintiffs and attorneys) (citing Chambers v. NASCO, Inc., 501 U.S. 32, (1991)). The court s inherent power derives from the court s need to manage [its] own affairs so as to achieve the orderly and expeditious disposition of cases. Chambers, 501 U.S. at 43 (quotation marks and citation omitted). This power, however, must be exercised with restraint and discretion. Roadway Express, Inc. v. Piper, 447 U.S. 752, 764 (1980). The key to unlocking a court s inherent power is a finding of bad faith. Barnes v. Dalton, 158 F.3d 1212, 1214 (11th Cir. 1998). III. Analysis At the March 2, 2009 evidentiary hearing, Larry Ciaccia, President of AuthenTec, testified about the security measures that AuthenTec employs to protect its data. AuthenTec uses its own fingerprint sensor technology to get in and out of the building. The company also uses industry standard network security protection of s, where each user has a unique user name, and a password is required to get into the system; those passwords are changed on a regular basis. If a user is not within company confines, there are special procedures to access the server where all the information resides; the company is able to monitor who accesses the server and when and keep an eye on traffic in general. In addition, full-time employees and contractors are required to sign a non-disclosure agreement. When asked about detailed technical information from an AuthenTec -5-

6 6:08-cv JA-DAB Document 68 Filed 03/19/09 Page 6 of 11 PageID 1766 engineer (Mark Heilpern) made publicly available on the internet, Mr. Ciaccia admitted that, despite the existence of non-disclosure agreements with customers, AuthenTec does want our engineers to participate in open communities and with other engineers in order to exchange information. Pl. Ex. 1. In a case pending in the Northern District of California, AuthenTec v. Atrua (see Pl. Ex. 3), documents allege that when an employee of a prospective customer left an AuthenTec application engineer alone in the room at the customer s facility, the engineer copied as much as he could of Atrua s proprietary technology and then distributed that proprietary technology within Authentec's organization, including its CEO; Mr. Ciaccia is aware of an containing the information. Mr. Ciaccia is also aware of allegations that on June 23, 2005, a customer with whom both Authentec and Atrua were negotiating mistakenly left two CDs provided by Atrua and containing proprietary information in a box containing Authentec s equipment. Upon discovering the CDs, an Authentec employee, Glenn Hicks, copied them and then returned Atrua s copies to the customer without informing him of the copying. Mr. Hicks was subsequently reprimanded. Wayne Sanford, Manager of Information Technology, testified that Authentec does not provide any external access to computer systems except through the means of connecting via VPN, which would require an end user to have specific software to gain access external to AuthenTec s network; the user would still be required to enter his user ID and password. If a user is actually in the facility itself, the user is required to enter the user ID and password to gain access to the AuthenTec network. There are also multiple layers depending on which application the user is accessing. AuthenTec has a global policy that is implemented through active directory, which is a Microsoft standard database that stores user IDs and passwords. All of the user IDs inside of the -6-

7 6:08-cv JA-DAB Document 68 Filed 03/19/09 Page 7 of 11 PageID 1767 company require the user to maintain the user ID and password within 90 days, and after 90 days change the password again; if the user has used the password before, he or she would not be able to do so for 20 more times; the user has five times to enter the password before being locked out and the administrator notified. For all new contractors and full-time employees at AuthenTec, the hiring manager requests access to the network for the new person, the request is entered into the help desk system and reviewed, and the end user s needed access is verified with the manager, before a user ID and password is issued. Most of the systems have a secondary level of security which would require specific user ID and passwords for that application as well. Following analysis of the s, Mr. Sanford was able to determined that the s in dispute were accessed by Vince Alvarez, a former employee, and David Dyer, a contract employee who worked primarily from Texas. The s had not been obtained via an outside hacker. Mr. Sanford initially opined that one of the individuals took their database, exported it to a local database and exited the property with it, which would be a violation of the confidentiality agreement. Though on cross-examination, he admitted that it was possible that Dyer had a local copy of his mailbox (and all of his s) on his laptop, and when Dyer stopped working for AuthenTec, he still had s on his laptop that had not been destroyed or returned to AuthenTec. Mr. Sanford further admitted that he was not aware of any procedures that Authentec took to assure that all copies of s were returned to AuthenTec (or destroyed with written notice) when an employee or contractor left. He testified that the exit process he was familiar with focused instead on return of only the equipment itself, and not the s; particularly s stored on a laptop owned by an off-site contractor that the contractor does not return to AuthenTec. Even with AuthenTec-owned computers, -7-

8 6:08-cv JA-DAB Document 68 Filed 03/19/09 Page 8 of 11 PageID 1768 there is nothing technically to prevent somebody who comes into possession of the laptop from making a copy of the entire hard drive onto an external hard drive or a thumb drive. With particular reference to the system as deployed by AuthenTec, use of an OST file allows users to have off line files in case the user loses connectivity to the database. By saving his own OST file, the user would still be able to view all s to which he was privy. OST files are routinely updated automatically up to the minute to copy all of their OST files to users laptops. Thus, even after the user ID and password are canceled so as to prevent further access to the database, the user could still have access to all prior s saved by the OST on the user s local hard drive. There are many tools publicly available that allow users to read an OST file to extract information, even if the user no longer has access to the Microsoft Outlook program on the server. This is the mechanism by which AuthenTec s information got outside its effective control. An investigator for Plaintiff s counsel, Ashlee Ilewicz, testified that she spoke with David Dyer for 42 minutes at a phone number in Texas on January 6, Pl. Ex. 8. Dyer told her that he used his own computer in his work for AuthenTec. In an to the investigator, Dyer attached s, stating: The attached.txt files contain all the s I had saved on my laptop before I ended my active work with Authentec. Sorry for the format, but this was the only way I could extract them so that you would have ready access to the messages. This includes everything in my inbox (I don t normally separate s out unless there s a specific project)... Please do not redistribute this beyond your law firm or use for any other purpose than we discussed. Pl. Ex. 9. At no point did Dyer tell the investigator that he was subject to a non-disclosure agreement. Ms. Ilewicz also testified that she spoke with a former AuthenTec software manager, Vince Alvarez, three times based on phone records (Pl. Ex. 5 and 7) once for 19 minutes, once for 25 minutes, and once to leave a message. Mr. Alvarez testified that he was on medication at the time, -8-

9 6:08-cv JA-DAB Document 68 Filed 03/19/09 Page 9 of 11 PageID 1769 mistakenly thought initially he was speaking with a friend, and he does not remember who or how long he spoke with the person who called; when the caller mentioned AuthenTec, he directed the caller to talk to counsel at AuthenTec. IV. Findings Based on the record before the Court, Mr. Dyer provided to Plaintiff s counsel the disputed s used in support of the allegations of the Amended Complaint. AuthenTec s security systems were thorough and secure, Mr. Dyer could not have copied the s by hacking. On the other hand, AuthenTec intentionally allowed numerous users to have remote access, including unrestricted copying and file transfer ability. Contractors and employees were encouraged to use the OST file to be more efficient, but no precautions were taken to provide any assurance that file access would end when work necessity was no longer applicable. Indeed, when these individuals stopped working for AuthenTec, there was no exit interview specifically targeted toward getting back the OST s. AuthenTec apparently passively relied on the non-disclosure agreements, as if they were selfexecuting. Mr. Dyer had routinely saved the s on his laptop while engaged in active work with Authentec; AuthenTec employed no controls to limit access to the OST s after a certain time period. Mr. Dyer extracted them from OST to a TXT version so the investigator would have ready access to the messages. Mr. Dyer did not inform the investigator he had a non-disclosure agreement. While Plaintiff s representatives likely assumed that AuthenTec had non-disclosure agreements with its employees and contractors, there is no showing that they had actual knowledge of any such agreements or their terms. There is also some likelihood that Mr. Dyer s transmission of a reformatted copy of his files may have violated his contract. However, the record does not -9-

10 6:08-cv JA-DAB Document 68 Filed 03/19/09 Page 10 of 11 PageID 1770 show bad faith on the part of the Plaintiff in gathering information in order to proceed with the litigation. This conclusion is bolstered by AuthenTec s evident lack of concern with respect to the use of information by authorized personnel. Substantively, Authentec did not treat as confidential ' their software development problems. The company allowed and encouraged engineers to discuss the problems publicly with other engineers openly over the Internet. Moreover, much of the information that AuthenTec now seeks to protect involving client relationship and development issues while potentially embarrassing, does not, standing alone, deserve continuing trade secret protection, in large part because most of it involves events that took place nearly one year ago which is a long time in AuthenTec s industry. The information at issue here is of the sort routinely subject to discovery. Whatever remaining issues there may be regarding the manner of Plaintiff s method of gaining access to it do not rise to the level of excluding it from consideration in the case. AuthenTec s approach would effectively immunize from scrutiny alleged misconduct from any firm that compels employees to sign nondisclosure agreements. Our system of justice could not function under such strictures. For the reasons stated above, Defendants Motion for Protective Order is DENIED. Further, because AuthenTec has not established any basis for the filing of pleadings under seal or with redactions, the Clerk is DIRECTED to unseal the docket entries previously made under seal. This directive shall be stayed pending the oral argument on the motion to dismiss (currently set for March 20, 2009). 'As noted above, AuthenTec was less than punctilious in respecting the confidential information of its competitors. -10-

11 6:08-cv JA-DAB Document 68 Filed 03/19/09 Page 11 of 11 PageID 1771 DONE and ORDERED in Orlando, Florida on March 19, Copies furnished to: Counsel of Record David A. Baker DAVID A. BAKER UNITED STATES MAGISTRATE JUDGE -11-

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN TELECOM, INC. ( BCN" or "Company") has established practices and procedures adequate to ensure compliance

More information

MEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL

MEMORANDUM AND ORDER ON PLAINTIFFS' MOTION TO COMPEL National Economic Research Associates, Inc. v. EvansMass.Super.,2006. Superior Court of Massachusetts. NATIONAL ECONOMIC RESEARCH ASSOCIATES, INC. and Marsh & McLennan Companies, Inc., Plaintiffs v. David

More information

CONFLICT OF INTEREST SYSTEMS

CONFLICT OF INTEREST SYSTEMS CONFLICT OF INTEREST SYSTEMS Conflicts of interest can lead to serious malpractice and ethical problems. To detect conflicts, a good conflicts checking system is essential. No lawyer can remember every

More information

Federal Rules of Civil Procedure IT Obligations For

Federal Rules of Civil Procedure IT Obligations For Federal Rules of Civil Procedure IT Obligations For Email Message Logic is a business unit of Data Storage Corporation. 212-564-4922 www.messagelogic.net or www.datastoragecorp.com 2013 Data Storage Corporation,

More information

PPR TOKENS SALE PRIVACY POLICY. Last updated:

PPR TOKENS SALE PRIVACY POLICY. Last updated: PPR TOKENS SALE PRIVACY POLICY Last updated: 05.03.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant

More information

CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648

CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648 CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648 This is a summary of a decision issued following the October 2017 hearings of the Disciplinary and Ethics Commission

More information

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery To aid and advance the ability for a litigation to successfully employ computer-based discovery, Rule 16(c) of the Federal Rules

More information

Case 6:12-cv RWS Document 570 Filed 02/01/18 Page 1 of 8 PageID #: 43250

Case 6:12-cv RWS Document 570 Filed 02/01/18 Page 1 of 8 PageID #: 43250 Case 6:12-cv-00855-RWS Document 570 Filed 02/01/18 Page 1 of 8 PageID #: 43250 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS TYLER DIVISION VIRNETX INC., and LEIDOS, INC., v. Plaintiffs,

More information

COMPLAINT FINANC1AL INDUSTRY REGULATORY AUTHORITY OFFICE OF HEARING OFFICERS. Disciplinary Proceeding SUMMARY

COMPLAINT FINANC1AL INDUSTRY REGULATORY AUTHORITY OFFICE OF HEARING OFFICERS. Disciplinary Proceeding SUMMARY FINANC1AL INDUSTRY REGULATORY AUTHORITY OFFICE OF HEARING OFFICERS Disciplinary Proceeding Department of Enforcement, No. 2010023220507 Complainant, Hearing Officer V. Ascendiant Capital Markets, LLC,

More information

University Policies and Procedures ELECTRONIC MAIL POLICY

University Policies and Procedures ELECTRONIC MAIL POLICY University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must

More information

NASD REGULATION, INC. OFFICE OF HEARING OFFICERS

NASD REGULATION, INC. OFFICE OF HEARING OFFICERS NASD REGULATION, INC. OFFICE OF HEARING OFFICERS : DEPARTMENT OF ENFORCEMENT, : : Complainant, : Disciplinary Proceeding : No. C02000037 v. : : Hearing Officer - DMF PAUL JOHN HOEPER : (CRD #2318477),

More information

Privacy Shield Policy

Privacy Shield Policy Privacy Shield Policy Catalyst Repository Systems, Inc. (Catalyst) has adopted this Privacy Shield Policy ("Policy") to establish and maintain an adequate level of Personal Data privacy protection. This

More information

Compass Consulting Group Terms of Use & Privacy Policy. Last Updated: 10/1/2018

Compass Consulting Group Terms of Use & Privacy Policy. Last Updated: 10/1/2018 Compass Consulting Group Terms of Use & Privacy Policy Last Updated: 10/1/2018 1. Introduction. At Compass Consulting Group LLC ( Compass, we, us, or our ), we recognize that your privacy is important.

More information

1 Privacy Statement INDEX

1 Privacy Statement INDEX INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related

More information

BoostMyShop.com Privacy Policy

BoostMyShop.com Privacy Policy BoostMyShop.com Privacy Policy BoostMyShop.corp ( Boostmyshop.com or the Site ) makes its extensions, services, and all Site content available to you subject to this Privacy Policy and its Terms of Service.

More information

Case 1:15-cv JMS-MJD Document 185 Filed 02/17/16 Page 1 of 7 PageID #: 2095

Case 1:15-cv JMS-MJD Document 185 Filed 02/17/16 Page 1 of 7 PageID #: 2095 Case 1:15-cv-00659-JMS-MJD Document 185 Filed 02/17/16 Page 1 of 7 PageID #: 2095 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF INDIANA INDIANAPOLIS DIVISION ) UNITED STATES SECURITIES ) AND EXCHANGE

More information

Privacy Policy. Effective: March 16, 2018.

Privacy Policy. Effective: March 16, 2018. Privacy Policy Effective: March 16, 2018. This Privacy Policy ( Privacy Policy ) applies only to the websites and online products and services controlled by Midwest Real Estate Data LLC ( MRED, we, us

More information

Proposed Spoliation Rules Would Impact Apple-Samsung Trial

Proposed Spoliation Rules Would Impact Apple-Samsung Trial Published in: Law Technology News July 31, 2012 Proposed Spoliation Rules Would Impact Apple-Samsung Trial By Henry Kelston The jury trial in the multibillion dollar patent war between Apple and Samsung

More information

A full list of SaltWire Network Inc. publications is available by visiting saltwire.com.

A full list of SaltWire Network Inc. publications is available by visiting saltwire.com. Introduction Effective January 1, 2004, private sector organizations must follow a code for the protection of personal information in accordance with the Personal Information Protection and Electronic

More information

Customer Proprietary Network Information

Customer Proprietary Network Information Customer proprietary network information (CPNI) means information that relates to the quantity, technical configuration, type, destination, location, and amount of use of our service by you and information

More information

Case 2:07-cv MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA

Case 2:07-cv MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA Case 2:07-cv-04756-MMB Document 123 Filed 11/26/2008 Page 1 of 7 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA RHOADS INDUSTRIES, INC. : CIVIL ACTION : v. : : NO. 07-4756

More information

UWTSD Group Data Protection Policy

UWTSD Group Data Protection Policy UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful

More information

Case5:12-cv LHK Document302 Filed11/15/12 Page1 of 12

Case5:12-cv LHK Document302 Filed11/15/12 Page1 of 12 Case:-cv-000-LHK Document0 Filed// Page of 0 APPLE INC., a California Corporation, v. UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA Plaintiff, SAMSUNG ELECTRONICS CO., LTD., a Korean corporation;

More information

Ferrous Metal Transfer Privacy Policy

Ferrous Metal Transfer Privacy Policy Updated: March 13, 2018 Ferrous Metal Transfer Privacy Policy Ferrous Metal Transfer s Commitment to Privacy Ferrous Metal Transfer Co. ( FMT, we, our, and us ) respects your concerns about privacy, and

More information

VIACOM INC. PRIVACY SHIELD PRIVACY POLICY

VIACOM INC. PRIVACY SHIELD PRIVACY POLICY VIACOM INC. PRIVACY SHIELD PRIVACY POLICY Last Modified and Effective as of October 23, 2017 Viacom respects individuals privacy, and strives to collect, use and disclose personal information in a manner

More information

Case3:08-cv WHA Document237 Filed11/30/09 Page1 of 6

Case3:08-cv WHA Document237 Filed11/30/09 Page1 of 6 Case:0-cv-0-WHA Document Filed/0/0 Page of 0 0 K.A.D. CAMARA (TX Bar No. 0/ MA Bar No. 0 Admitted Pro Hac Vice) camara@camarasibley.com KENT RADFORD (TX Bar No. 00 Admitted Pro Hac Vice) radford@camarasibley.com

More information

2. What is Personal Information and Non-Personally Identifiable Information?

2. What is Personal Information and Non-Personally Identifiable Information? Privacy Notice Snipp Interactive, Inc. Last Updated: February 11, 2016 Contents: 1. Introduction 2. What is Personal Information? 3. Information we collect about you 4. Use of Your Information 5. Location

More information

CISG- online Magistrate Judge Young B. Kim

CISG- online Magistrate Judge Young B. Kim CISG- online 2930 Jurisdiction USA Tribunal U.S. District Court for the Northern District of Illinois Date of the decision 23 August 2017 Case no./docket no. 15- cv- 2207 Case name Nucap Industries, Inc.

More information

Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019

Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019 General Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019 Office Properties Income Trust ( OPI ) is committed to your right to privacy and to keeping your personal information

More information

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017 This Privacy Policy (this Privacy Policy ) applies to Edenred Commuter Benefits Solutions, LLC, (the Company ) online interface (i.e., website or mobile application) and any Edenred Commuter Benefit Solutions,

More information

Legal notice and Privacy policy

Legal notice and Privacy policy Legal notice and Privacy policy We appreciate your interest in us. Below you will find information of legal relevance when visiting this website. In addition, you will find our Privacy Policy, which explains

More information

U.S. v. Weaver, 636 F.Supp.2d 769 (C.D. Ill., 2009)

U.S. v. Weaver, 636 F.Supp.2d 769 (C.D. Ill., 2009) 636 F.Supp.2d 769 UNITED STATES of America, Plaintiff, v. Justin D. WEAVER, Defendant. No. 09-30036. United States District Court, C.D. Illinois, Springfield Division. July 15, 2009. Elham M. Peirson,

More information

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA TECHNOLOGY PROPERTIES LIMITED LLC and MCM PORTFOLIO LLC, v. Plaintiffs, CANON INC. et al., Defendants. / No. C -0 CW ORDER GRANTING

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

RippleMatch Privacy Policy

RippleMatch Privacy Policy RippleMatch Privacy Policy This Privacy Policy describes the policies and procedures of RippleMatch Inc. ( we, our or us ) on the collection, use and disclosure of your information on https://www.ripplematch.com/

More information

Shaw Privacy Policy. 1- Our commitment to you

Shaw Privacy Policy. 1- Our commitment to you Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: Can serve as annual HIPAA training for physician practice

More information

SAMPLE LITIGATION HOLD NOTICES

SAMPLE LITIGATION HOLD NOTICES Business & Litigation Support ediscovery: COLORADO RULES, CASE LAW & SAMPLE LITIGATION HOLD NOTICES HTTPS://SHOLLEREDWARDS.COM/LITIGATION-AND-SUPPORT/ 1.855.649.5884 CONTENTS Litigation Trigger... 3 Scope

More information

If you have any questions or concerns about this Privacy Policy, please Contact Us.

If you have any questions or concerns about this Privacy Policy, please Contact Us. Illuminate Education Your Privacy Rights Are Important To Us The privacy of students and their parents and guardians is important to Illuminate Education, Inc. ( Illuminate ) and the teachers, administrators,

More information

YADTEL - Privacy Information INFORMATION WE COLLECT

YADTEL - Privacy Information INFORMATION WE COLLECT YADTEL - Privacy Information As a customer of Yadtel, you are entitled to know what we do with personal information about you that we receive. We consider our treatment of such information to be a part

More information

We will ask you for certain kinds of personal information ( Personal Information ) to provide the services you request. This information includes:

We will ask you for certain kinds of personal information ( Personal Information ) to provide the services you request. This information includes: PRIVACY POLICY This Website is operated by Mergent, Inc., a member of the London Stock Exchange plc group of companies ( we/our/us/mergent ). Website means the website located at www.mergent.com, any subsequent

More information

SUPERIOR COURT OF THE STATE OF CALIFORNIA COUNTY OF LOS ANGELES WEST DISTRICT ) ) ) ) ) ) ) ) ) ) ) ) ) ) )

SUPERIOR COURT OF THE STATE OF CALIFORNIA COUNTY OF LOS ANGELES WEST DISTRICT ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) MARINA J BOYD, ANITA FAYE BOYD ALEXIS BOYD-HOLLING 0 NATIONAL BOULEVARD, APT 0 LOS ANGELES, CALIFORNIA 00 (0 - SUPERIOR COURT OF THE STATE OF CALIFORNIA COUNTY OF LOS ANGELES WEST DISTRICT 0 0 MARINA J

More information

Eagles Charitable Foundation Privacy Policy

Eagles Charitable Foundation Privacy Policy Eagles Charitable Foundation Privacy Policy Effective Date: 1/18/2018 The Eagles Charitable Foundation, Inc. ( Eagles Charitable Foundation, we, our, us ) respects your privacy and values your trust and

More information

Case 3:08-cv G Document 74 Filed 04/20/2009 Page 1 of 9 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF TEXAS DALLAS DIVISION

Case 3:08-cv G Document 74 Filed 04/20/2009 Page 1 of 9 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF TEXAS DALLAS DIVISION Case 3:08-cv-00340-G Document 74 Filed 04/20/2009 Page 1 of 9 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF TEXAS DALLAS DIVISION T-MOBILE USA, INC., a Delaware Corporation, VS. Plaintiff, WIRELESS

More information

General Legal Requirements under the Act and Relevant Subsidiary Legislations. Personal data shall only be processed for purpose of the followings:

General Legal Requirements under the Act and Relevant Subsidiary Legislations. Personal data shall only be processed for purpose of the followings: General Legal Requirements regarding the Personal Data Protection ( PDP ) Principles under the PDP Act 2010 ( Act ) and the relevant Subsidiary Legislations PDP Principles General Principle Data users

More information

Page 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax

Page 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax 1. PURPOSE The Loss Prevention Foundation, ( the foundation, LPF, the examiner ) makes high-stakes retail loss prevention certification Exams publicly available for the purpose of earning certification

More information

PayThankYou LLC Privacy Policy

PayThankYou LLC Privacy Policy PayThankYou LLC Privacy Policy Last Revised: August 7, 2017. The most current version of this Privacy Policy may be viewed at any time on the PayThankYou website. Summary This Privacy Policy covers the

More information

Emsi Privacy Shield Policy

Emsi Privacy Shield Policy Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (

More information

Case5:10-cv JF Document41 Filed08/23/11 Page1 of 7

Case5:10-cv JF Document41 Filed08/23/11 Page1 of 7 Case:0-cv-0-JF Document Filed0// Page of **E-Filed //0** 0 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA SAN JOSE DIVISION HOLOMAXX TECHNOLOGIES CORPORATION, a Pennsylvania

More information

Order F19-04 OFFICE OF THE PREMIER. Celia Francis Adjudicator. January 29, 2019

Order F19-04 OFFICE OF THE PREMIER. Celia Francis Adjudicator. January 29, 2019 CanLII Cite: 2019 BCIPC 05 Quicklaw Cite: [2019] B.C.I.P.C.D. No. 05 Order F19-04 OFFICE OF THE PREMIER Celia Francis Adjudicator January 29, 2019 Summary: A journalist requested copies of an employee

More information

BUZCOIN TOKENS SALE PRIVACY POLICY. Last updated:

BUZCOIN TOKENS SALE PRIVACY POLICY. Last updated: BUZCOIN TOKENS SALE PRIVACY POLICY Last updated: 20.10.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant

More information

Managing Your Record Retention Policy Safely

Managing Your Record Retention Policy Safely Managing Your Record Retention Policy Safely Client and counsel have a duty to preserve materials with potential evidentiary value. The preceding discussion told us about the duties of lawyers and clients

More information

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2

Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy... 1 EU-U.S. Privacy Shield Policy... 2 Privacy Policy knows that your privacy is important to you. Below is our privacy policy for collecting, using, securing, protecting and sharing your

More information

FILED: NEW YORK COUNTY CLERK 04/04/2014 INDEX NO /2014 NYSCEF DOC. NO. 16 RECEIVED NYSCEF: 04/04/2014

FILED: NEW YORK COUNTY CLERK 04/04/2014 INDEX NO /2014 NYSCEF DOC. NO. 16 RECEIVED NYSCEF: 04/04/2014 FILED: NEW YORK COUNTY CLERK 04/04/2014 INDEX NO. 650139/2014 NYSCEF DOC. NO. 16 RECEIVED NYSCEF: 04/04/2014 SUPREME COURT OF THE STATE OF NEW YORK NEW YORK COUNTY TOBIAS FRERE-JONES, Plaintiff, -against-

More information

Data locations. For our hosted(saas) solution the servers are located in Dallas(USA), London(UK), Sydney(Australia) and Frankfurt(Germany).

Data locations. For our hosted(saas) solution the servers are located in Dallas(USA), London(UK), Sydney(Australia) and Frankfurt(Germany). Privacy Policy This privacy policy explains how EyeQuestion Software (Logic8 BV) handles your personal information and data. This policy applies to all the products, services and websites offered by EyeQuestion

More information

Privacy Policy FUNDRISE, LLC

Privacy Policy FUNDRISE, LLC Privacy Policy FUNDRISE, LLC FUNDRISE, LLC ( FUNDRISE ) is committed to maintaining your privacy. This privacy policy and agreement (our Privacy Policy ) specifies the personal information that we ask

More information

Information Security Management Criteria for Our Business Partners

Information Security Management Criteria for Our Business Partners Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents

More information

Nortel I Securities Litigation Settlement c/o The Garden City Group, Inc. Claims Administrator P.O. Box 9000 #6446

Nortel I Securities Litigation Settlement c/o The Garden City Group, Inc. Claims Administrator P.O. Box 9000 #6446 Must be Postmarked No Later Than November 20, 2006 Nortel I Securities Litigation Settlement c/o The Garden City Group, Inc. NNY Claims Administrator P.O. Box 9000 #6446 *P-NNYF-POC/1* Merrick, NY 11566-9000

More information

1.3 Please follow the links below for further information. Where relevant, we have made a distinction between different categories of data subjects:

1.3 Please follow the links below for further information. Where relevant, we have made a distinction between different categories of data subjects: PRIVACY STATEMENT Last date of revision: 18-05-2018 1. WHO DOES THIS GDPR PRIVACY STATEMENT APPLY TO? 1.1 Claeys & Engels cvba ( We or Claeys & Engels ) is a specialist law firm offering a full range of

More information

TechTarget, Inc. Privacy Policy

TechTarget, Inc. Privacy Policy This Privacy Policy (the Policy ) is designed to inform users of TechTarget, Inc., and its affiliates (collectively TechTarget ) network of websites about how TechTarget gathers and uses information provided

More information

VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES

VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES PLEASE READ THIS PRIVACY POLICY CAREFULLY BEFORE USING THIS SITE. Last Updated: January 01, 2015 Direct Vet Marketing, Inc. (hereinafter,

More information

Effective Date: November 26, A. Overview

Effective Date: November 26, A. Overview WEI Technology LLC ( WEI, we or us ) takes your privacy seriously. Please read this Privacy Policy, which describes the types of information we collect through www.lendingpad.com (the Website ), and how

More information

UNCONTROLLED IF PRINTED

UNCONTROLLED IF PRINTED 161Thorn Hill Road Warrendale, PA 15086-7527 1. Scope 2. Definitions PROGRAM DOCUMENT PD 1000 Issue Date: 19-Apr-2015 Revision Date: 26-May-2015 INDUSTRY MANAGED ACCREDITATION PROGRAM DOCUMENT Table of

More information

POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6

POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 North Gem School District No. 149 establishes the following guidelines to provide administrative direction pertaining to the retention

More information

Case 1:17-cv FAM Document 1 Entered on FLSD Docket 10/11/2017 Page 1 of 21

Case 1:17-cv FAM Document 1 Entered on FLSD Docket 10/11/2017 Page 1 of 21 Case :-cv--fam Document Entered on FLSD Docket 0//0 Page of 0 0 Coleman Watson, Esq. Watson LLP S. Orange Avenue, Suite 0 Orlando, FL 0 coleman@watsonllp.com CODING TECHNOLGIES, LLC, vs. Plaintiff, MERCEDES-BENZ

More information

Case 5:10-cv DF Document 17 Filed 02/21/11 Page 1 of 33 UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXARKANA TEXARKANA DIVISION

Case 5:10-cv DF Document 17 Filed 02/21/11 Page 1 of 33 UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXARKANA TEXARKANA DIVISION Case 5:10-cv-00194-DF Document 17 Filed 02/21/11 Page 1 of 33 UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXARKANA TEXARKANA DIVISION KEITH DUNBAR, Individually, and as Representative on

More information

IN THE COMMONWEALTH COURT OF PENNSYLVANIA

IN THE COMMONWEALTH COURT OF PENNSYLVANIA IN THE COMMONWEALTH COURT OF PENNSYLVANIA Department of Labor and Industry, : Petitioner : : v. : No. 107 C.D. 2015 : Submitted: August 14, 2015 John Earley, : Respondent : BEFORE: HONORABLE DAN PELLEGRINI,

More information

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. Word Count: 2,268 Physician practices have lived with the reality of HIPAA for over twenty years. In that time, it has likely

More information

Privacy Policy Effective Date: October 4, 2017

Privacy Policy Effective Date: October 4, 2017 Privacy Policy Effective Date: October 4, 2017 Purpose of the Privacy Policy. Bristol Myers Squibb and Pfizer have entered into a codevelopment and co promotion agreement for Eliquis (apixaban). Bristol

More information

Case 5:17-cv EJD Document 105 Filed 11/07/17 Page 1 of 7

Case 5:17-cv EJD Document 105 Filed 11/07/17 Page 1 of 7 Case :-cv-0-ejd Document 0 Filed /0/ Page of 0 0 ENIGMA SOFTWARE GROUP USA LLC, v. Plaintiff, MALWAREBYTES INC., Defendant. UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA SAN JOSE DIVISION

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

March 16, By NYCSEF

March 16, By NYCSEF 212-373-3089 212-492-0089 twells@paulweiss.com March 16, 2017 By NYCSEF The Honorable Barry R. Ostrager Supreme Court of the State of New York Commercial Division 60 Centre Street, Room 629 New York, NY

More information

PRIVACY POLICY Let us summarize this for you...

PRIVACY POLICY Let us summarize this for you... PRIVACY POLICY Let us summarize this for you... We promise to never sell your personal information. This site collects usage information to provide a better web experience for our users. If you purchase

More information

You may contact The Translation Network by at You may also call The Translation Network at

You may contact The Translation Network by  at You may also call The Translation Network at The Translation Network Privacy Policy This is a privacy policy for The Translation Network Group Inc. The Translation Network has created this privacy statement in order to demonstrate its firm commitment

More information

Overwhelmed by ? Best Practices for Ethics, Discovery and Trial Evidence

Overwhelmed by  ? Best Practices for Ethics, Discovery and Trial Evidence Overwhelmed by Email? Best Practices for Ethics, Discovery and Trial Evidence THE ETHICS OF EMAIL Lynda C. Shely The Shely Firm, PC Scottsdale, Arizona 1. Definitions and Basic Ethics Standards Emails

More information

INSPECTOR GENERAL U.S. DEPARTMENT OF THE INTERIOR

INSPECTOR GENERAL U.S. DEPARTMENT OF THE INTERIOR All deletions have been made under 5 U.S.C. 552(b)(6) and (b)(7)(c) unless otherwise noted OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF THE INTERIOR REPORT OF INVESTIGATION Case Title NPS-GCNP SCADA

More information

E-Discovery Protection: Insurance Coverage & Electronic Records

E-Discovery Protection: Insurance Coverage & Electronic Records Transcript Details This is a transcript of an educational program accessible on the ReachMD network. Details about the program and additional media formats for the program are accessible by visiting: https://reachmd.com/programs/clinicians-roundtable/e-discovery-protection-insurance-coverageelectronic-records/3536/

More information

HOW THE SECURE PATIENT PORTAL WORKS

HOW THE SECURE PATIENT PORTAL WORKS West Wichita Family Physicians, P.A. (WWFP) offers a secure patient portal as a service to patients who wish to view specific parts of their health information and communicate with our staff and physicians.

More information

Case 2:03-cv DN Document 1179 Filed 02/16/18 Page 1 of 6 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF UTAH, CENTRAL DIVISION

Case 2:03-cv DN Document 1179 Filed 02/16/18 Page 1 of 6 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF UTAH, CENTRAL DIVISION Case 2:03-cv-00294-DN Document 1179 Filed 02/16/18 Page 1 of 6 Brent O. Hatch (5715) Mark F. James (5295) HATCH, JAMES & DODGE, PC 10 West Broadway, Suite 400 Salt Lake City, Utah 84101 Telephone: (801)

More information

Privacy Notice

Privacy Notice www.soaringsoftware.com Privacy Notice This Privacy Policy covers the privacy practices of Soaring Software Solutions, Inc., an Ohio company, along with the Sites on which this Privacy Policy is posted

More information

Privacy Policy Effective May 25 th 2018

Privacy Policy Effective May 25 th 2018 Privacy Policy Effective May 25 th 2018 1. General Information 1.1 This policy ( Privacy Policy ) explains what information Safety Management Systems, 2. Scope Inc. and its subsidiaries ( SMS ), it s brand

More information

WEBSITE TERMS OF USE

WEBSITE TERMS OF USE WEBSITE TERMS OF USE Effective Date: April 14, 2018 Welcome to the Center for Behavioral Sciences, Inc. ( CBS ) website! CBS, Inc. maintains this website ( Website ) for your personal information, education

More information

712 August 3, 2017 No. 40 IN THE SUPREME COURT OF THE STATE OF OREGON

712 August 3, 2017 No. 40 IN THE SUPREME COURT OF THE STATE OF OREGON 712 August 3, 2017 No. 40 IN THE SUPREME COURT OF THE STATE OF OREGON In re Complaint as to the Conduct of JAMES R. KIRCHOFF OSB No. 081879, Accused. (OSB No. 1505, SC S064308) En Banc On review of the

More information

Screening Procedures for Access to ISO Register of Transmission Facilities and Entitlements

Screening Procedures for Access to ISO Register of Transmission Facilities and Entitlements Screening Procedures for Access to ISO Register of Transmission Facilities and Entitlements In accordance with the Federal Energy Regulatory Commission (FERC) order issued on January 24, 2003 (as modified

More information

Autofill and Other Disasters: The Ethics of Inadvertent Disclosures

Autofill and Other Disasters: The Ethics of Inadvertent  Disclosures Autofill and Other Disasters: The Ethics of Inadvertent Email Disclosures Deborah C. Meiners, Esq. DeWitt Ross & Stevens, S.C. (608) 252 9266 dcm@dewittross.com SCR 20:1.6 Confidentiality for Lawyers (a)

More information

ALAMEDA COUNTY GRAND JURY FINAL REPORT

ALAMEDA COUNTY GRAND JURY FINAL REPORT 2014-2015 ALAMEDA COUNTY GRAND JURY FINAL REPORT ALAMEDA COUNTY BOARD OF SUPERVISORS District One District Two District Three District Four District Five Scott Haggerty, President Richard Valle Wilma Chan,

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO How to Like E-Discovery, Security and Social Media Dr. Gavin W. Manes, CEO Gavin W. Manes, Ph.D. CEO, Avansic Doctorate in Computer Science from TU Scientific approach to e- discovery Published over fifty

More information

COLLECTION & HOW THE INFORMATION WILL BE USED

COLLECTION & HOW THE INFORMATION WILL BE USED Privacy Policy INTRODUCTION As our esteemed client, your privacy is essential to us. Here, at www.indushealthplus.com, we believe that privacy is a top priority. We know that you care how information about

More information

CTI BioPharma Privacy Notice

CTI BioPharma Privacy Notice CTI BioPharma Privacy Notice Effective: 29 November 2018 Introduction and Scope CTI BioPharma Corp. ( CTI, our, us ) takes the protection of your personal data very seriously. This Privacy Notice (this

More information

2018 HOT TOPICS LEGAL TRENDS IMPACTING PUBLIC TRANSIT

2018 HOT TOPICS LEGAL TRENDS IMPACTING PUBLIC TRANSIT 2018 HOT TOPICS LEGAL TRENDS IMPACTING PUBLIC TRANSIT THE RIGHT TO KNOW LAW IS NOT DISCOVERY For a record to be an agency record, it must be in the possession of the agency. What if a record is in the

More information

Understanding Privilege in an Electronic World BY JEFFREY E. DUBIN AND SAM A. BENSON, JAVITCH, BLOCK & RATHBONE, LLC

Understanding Privilege in an Electronic World BY JEFFREY E. DUBIN AND SAM A. BENSON, JAVITCH, BLOCK & RATHBONE, LLC Understanding Privilege in an Electronic World BY JEFFREY E. DUBIN AND SAM A. BENSON, JAVITCH, BLOCK & RATHBONE, LLC Have you ever sent an email that you wish you could recall? Have you ever sent an email

More information

Case3:12-cv VC Document32 Filed02/11/15 Page1 of 5 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA SAN FRANCISCO DIVISION

Case3:12-cv VC Document32 Filed02/11/15 Page1 of 5 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA SAN FRANCISCO DIVISION Case:-cv-0-VC Document Filed0// Page of LLC, PHOENIX DIGITAL SOLUTIONS LLC, and PATRIOT SCIENTIFIC UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA BARNES & NOBLE, INC., SAN FRANCISCO DIVISION

More information

No. 02 C Jan. 13, MEMORANDUM OPINION AND ORDER

No. 02 C Jan. 13, MEMORANDUM OPINION AND ORDER 404 F.Supp.2d 1030 United States District Court, N.D. Illinois, Eastern Division. AGFA MONOTYPE CORP., and International Typeface Corp., Plaintiffs, v. ADOBE SYSTEMS, INC., Defendant. LEINENWEBER, District

More information

UNITED STATES SECURITIES AND EXCHANGE COMMISSION FORM 8-K

UNITED STATES SECURITIES AND EXCHANGE COMMISSION FORM 8-K UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 8-K CURRENT REPORT Pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934 Date of Report (Date of earliest event

More information

OPTIMAL BLUE, LLC PRIVACY POLICY

OPTIMAL BLUE, LLC PRIVACY POLICY OPTIMAL BLUE, LLC PRIVACY POLICY ` Page 1 of 12 Title TABLE OF CONTENTS OUR COMMITMENT TO YOUR PRIVACY... 1 WHAT WE DO AND HOW WE RECEIVE INFORMATION... 2 WEBSITE INFORMATION PRACTICES... 2 GENERAL INFORMATION

More information

Privacy Policy Manhattan Neighborhood Network Policies 2017

Privacy Policy Manhattan Neighborhood Network Policies 2017 Privacy Policy Manhattan Neighborhood Network Policies 2017 Table of Contents Manhattan Neighborhood Network Policies 3 MNN s Privacy Policy 3 Information Collection, Use and Sharing 4 Your Access to and

More information

Next Generation 911; Text-to-911; Next Generation 911 Applications. SUMMARY: In this document, the Federal Communications Commission (Commission)

Next Generation 911; Text-to-911; Next Generation 911 Applications. SUMMARY: In this document, the Federal Communications Commission (Commission) This document is scheduled to be published in the Federal Register on 10/29/2013 and available online at http://federalregister.gov/a/2013-25274, and on FDsys.gov 6712-01 FEDERAL COMMUNICATIONS COMMISSION

More information

PRIVACY POLICY. Valid as of

PRIVACY POLICY. Valid as of PRIVACY POLICY Valid as of 25.05.2018 At Admiral Markets, we fully understand how important it is to protect our clients personal information. This document sets out our Privacy Policy commitment in respect

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information