Search

James Koenig Phones & Addresses

  • Pompano Beach, FL
  • 1323 Valley Rd, Villanova, PA 19085 (610) 520-2205
  • Weston, FL
  • Manayunk, PA
  • Penn Valley, PA
  • Bryn Mawr, PA
  • New York, NY
  • Hollywood, FL
  • Miami, FL
  • Montgomery, PA

Work

Company: Jamesharlan koenig Address: 2166 Broadway Apt 15D, New York, NY 10024 Phones: (212) 362-2262 Position: Administrator Industries: Business Consulting Services

Education

School / High School: U of Miami

Ranks

Licence: New York - Currently registered Date: 1991

Professional Records

Lawyers & Attorneys

James Koenig Photo 1

James Harlan Koenig, Villanova PA - Lawyer

View page
Address:
1323 Valley Rd, Villanova, PA 19085
(610) 246-4426 (Office)
Licenses:
New York - Currently registered 1991
Education:
U of Miami
James Koenig Photo 2

James Koenig - Lawyer

View page
Office:
Fenwick & West LLP
Specialties:
Privacy Law
Information Technology
ISLN:
905798132
Admitted:
1991
University:
Massachusetts Institute of Technology, B.S.
Law School:
University of Miami, J.D.
James Koenig Photo 3

James Koenig, Villanova PA - Lawyer

View page
Office:
1323 Valley Road, Villanova, PA
ISLN:
905798132
Admitted:
1991
University:
Massachusetts Institute of Technology, B.S.
Law School:
University of Miami, J.D.
James Koenig Photo 4

James Koenig - Lawyer

View page
Address:
3900 Key Center
Phone:
(216) 566-5503 (Phone), (216) 566-5800 (Fax)
Work:
Thompson Hine
Specialties:
International Law
Tax Law
International
Tax
Law School:
Case Western Reserve University School of Law
Education:
Case Western Reserve University School of Law, JD
Case Western Reserve University
John Carroll University
Links:
Website

Resumes

Resumes

James Koenig Photo 5

Partner And Global Co-Chair, Privacy And Cybersecurity Practice

View page
Location:
102 Brainard Ave, Port Monmouth, NJ 07758
Industry:
Management Consulting
Work:
Fenwick & West
Partner and Global Co-Chair, Privacy and Cybersecurity Practice

Paul Hastings Sep 1, 2015 - Dec 11, 2016
Of Counsel, Privacy, Cybersecurity and Data Analytics Practice

Booz Allen Hamilton Sep 1, 2013 - Jun 1, 2015
Global Leader, Commercial Privacy Practice; Leader, Cybersecurity For Health

Pwc 2003 - Sep 2013
National Practice Leader, Privacy Practice

Eprivacy Group Jan 1, 2000 - Jan 1, 2003
Evp, Chief Development and Legal Officer
Education:
University of Miami School of Law 1987 - 1990
Doctor of Jurisprudence, Doctorates, Banking, Corporate Finance, Law, Finance
Massachusetts Institute of Technology 1983 - 1987
Bachelors, Bachelor of Science, Finance
Skills:
Privacy Law
Data Privacy
Strategy
Security
Management Consulting
Leadership
Management
Risk Management
Program Management
Enterprise Risk Management
Due Diligence
Computer Security
Fcpa
Corporate Governance
Financial Services
Compliance
Data Security
Corporate Law
Privacy Policies
Enterprise Software
It Audit
Healthcare
Private Equity
Consulting
Privacy
Social Media
Behavioral Targeting
Marketing Strategy
E Commerce
Information Management
New Business Development
Hitrust
Internet Security
Identity Theft
Financial Sector
Location Based Services
Languages:
English
Certifications:
Certified Information Privacy Professional (Cipp)
Iapp - International Association of Privacy Professionals
James Koenig Photo 6

James Koenig

View page
Work:
Desert Star Systems Nov 2012 - Dec 2013
Firmware Programmer and Junior Electrical Engineer
Skills:
Creative Problem Solving
Microsoft Office
Microsoft Excel
Microsoft Word
Mathematics
Linux
Java
Github
Msp430
Python
Arduino
Ruby
C
Interests:
Hiking
Computer Science
Math
Music
Languages:
English
Italian
Spanish
James Koenig Photo 7

James Koenig

View page
James Koenig Photo 8

James Koenig

View page
James Koenig Photo 9

James Koenig

View page
James Koenig Photo 10

James Koenig

View page
James Koenig Photo 11

James Koenig

View page
Location:
United States
James Koenig Photo 12

James Koenig

View page
Location:
United States

Business Records

Name / Title
Company / Classification
Phones & Addresses
James Koenig
JK Contracting Ltd.
General Contractors
233 Mt. Douglas Circle SE, Calgary, AB T2Z 3P1
(403) 281-0719
James Harlan Koenig
Administrator
Jamesharlan Koenig
Business Consulting Services
2166 Broadway Apt 15D, New York, NY 10024
James H Koenig
CFO, Chairman
FALCON PAYMASTERS, INC
Accountant
5933 S Hwy 94, Saint Charles, MO 63304
5933 S Hwy 94 SUITE 204, Saint Charles, MO 63304
1221 Brickell Ave 9Gufl, Miami, FL 33131
1429 King Ave, Columbus, OH 43212
(614) 488-0683
James P. Koenig
C&J DOLLSHOP & HOSPITAL, INC
James Koenig
JK Contracting Ltd
General Contractors
(403) 281-0719
James Koenig
Director
Project Angel Eyes - Alaska
James Koenig
FUTURE INTEGRATED TECHNOLOGIES, INC
James Koenig
President
Istrategy, Inc
Business Services at Non-Commercial Site
911 Hagys Frd Rd, Penn Valley, PA 19072

Publications

Isbn (Books And Publications)

Central and Peripheral Significance of Neuropeptide Y and Its Related Peptides

View page
Author

James I. Koenig

ISBN #

0897666534

And the Meter Is Running

View page
Author

James Koenig

ISBN #

1928704743

Central and Peripheral Significance of Neuropeptide Y and Its Related Peptides

View page
Author

James Irvin Koenig

ISBN #

0897666542

Us Patents

System And Method For Controlling Distribution Of Network Communications

View page
US Patent:
7415504, Aug 19, 2008
Filed:
Feb 26, 2002
Appl. No.:
10/084038
Inventors:
Vincent J. Schiavone - Berwyn PA, US
James H. Koenig - Philadelphia PA, US
David I. Brussin - Berwyn PA, US
Assignee:
Symantec Corporation - Cupertino CA
International Classification:
G06F 15/16
US Classification:
709207, 370392, 370400
Abstract:
A method for controlling distribution of network communications (messages). An incoming message either carries priority information, or is assigned priority information based on a shared characteristic with other messages. The priority information is used to determine how and/or when to deliver the message, e. g. by delaying the message for a fixed time. Preferences for receipt of messages by priority level may be communicated to upstream hosts along a network path. Accordingly, an intermediary host may reject and/or delay messages that the intended recipient does not wish to receive. This pushes the burden of low-priority messages back to the sender, thereby reducing or eliminating burdens on network/system resources of the recipient and/or intermediaries between the recipient and the sender. Accordingly, it can “squelch” spam messages at or close to their source. Trusted senders complying with prescribed practices may include priority information allowing for delivery of their messages with higher priority.

System And Method For Controlling Distribution Of Network Communications

View page
US Patent:
7543036, Jun 2, 2009
Filed:
Sep 28, 2007
Appl. No.:
11/863578
Inventors:
Vincent J. Schiavone - Berwyn CA, US
James H. Koenig - Philadelphia PA, US
David I. Brussin - Berwyn PA, US
Assignee:
Symantec Corporation - Cupertino CA
International Classification:
G06F 15/16
US Classification:
709207, 709227, 709228, 709229, 709249, 709204, 715733, 715759, 370260, 370265, 370393, 370431, 7042701
Abstract:
A method for controlling distribution of network communications (messages). An incoming message either carries priority information, or is assigned priority information based on a shared characteristic with other messages. The priority information is used to determine how and/or when to deliver the message, e. g. by delaying the message for a fixed time. Preferences for receipt of messages by priority level may be communication to upstream hosts along a network path. Accordingly, an intermediary host may reject and/or delay messages that the intended recipient does not wish to receive. This pushes the burden of low-priority messages back to the sender, thereby reducing or eliminating burdens on network/system resources of the recipient and/or intermediaries between the recipient and the sender. Accordingly, it can “squelch” spam messages at or close to their source. Trusted senders complying with prescribed practices may include priority information allowing for delivery of their messages with higher priority.

System And Method For Controlling Distribution Of Network Communications

View page
US Patent:
7571214, Aug 4, 2009
Filed:
Sep 28, 2007
Appl. No.:
11/863567
Inventors:
Vincent J. Schiavone - Berwyn PA, US
James H. Koenig - Philadelphia PA, US
David I. Brussin - Berwyn PA, US
Assignee:
Symantec Corporation - Cupertino CA
International Classification:
G06F 15/16
US Classification:
709207, 709219, 709224, 709227, 709203, 709232, 370230, 370231, 370232, 370233, 370237, 379309
Abstract:
A method for controlling distribution of network communications (messages). An incoming message either carries priority information, or is assigned priority information based on a shared characteristic with other messages. The priority information is used to determine how and/or when to deliver the message, e. g. by delaying the message for a fixed time. Preferences for receipt of messages by priority level may be communication to upstream hosts along a network path. Accordingly, an intermediary host may reject and/or delay messages that the intended recipient does not wish to receive. This pushes the burden of low-priority messages back to the sender, thereby reducing or eliminating burdens on network/system resources of the recipient and/or intermediaries between the recipient and the sender. Accordingly, it can “squelch” spam messages at or close to their source. Trusted senders complying with prescribed practices may include priority information allowing for delivery of their messages with higher priority.

System And Method For Controlling Distribution Of Network Communications

View page
US Patent:
7634545, Dec 15, 2009
Filed:
Sep 28, 2007
Appl. No.:
11/863544
Inventors:
Vincent J. Schiavone - Berwyn CA, US
James H. Koenig - Philadelphia PA, US
David I. Brussin - Berwyn PA, US
Assignee:
Symantec Corporation - Cupertino CA
International Classification:
G06F 15/16
G06F 15/173
US Classification:
709206, 709207, 709238, 709224, 709227, 709228, 709229, 709219, 370232, 370233, 370237, 370231, 379 39
Abstract:
A method for controlling distribution of network communications (messages). An incoming message either carries priority information, or is assigned priority information based on a shared characteristic with other messages. The priority information is used to determine how and/or when to deliver the message, e. g. by delaying the message for a fixed time. Preferences for receipt of messages by priority level may be communication to upstream hosts along a network path. Accordingly, an intermediary host may reject and/or delay messages that the intended recipient does not wish to receive. This pushes the burden of low-priority messages back to the sender, thereby reducing or eliminating burdens on network/system resources of the recipient and/or intermediaries between the recipient and the sender. Accordingly, it can “squelch” spam messages at or close to their source. Trusted senders complying with prescribed practices may include priority information allowing for delivery of their messages with higher priority.

Reply Based Electronic Mail Transactions

View page
US Patent:
20020120581, Aug 29, 2002
Filed:
Feb 26, 2001
Appl. No.:
09/792912
Inventors:
Vincent Schiavone - Berwyn PA, US
James Koenig - Philadelphia PA, US
International Classification:
G06F017/60
US Classification:
705/064000
Abstract:
A rule-based electronic mail transaction system and method for conducting predefined transactions via electronic mail messaging. An electronic mail message prescribes a reply action for confirming agreement to conduct the transaction. If the recipient performs the action, a rule for conducting the transaction is identified. The rule defines data required for the transaction. Required data is gathered from a recipient data store responsive to a confirming action on the part of the recipient. The required data is used to complete the transaction. Optionally, information may be retrieved from the sender's side to complete the transaction. Diverse transactions may be conducted in this manner, including sale and non-sale transactions, such as promotional and viral marketing, charitable donations, online bill payment, electoral voting, customer service communications, customer relationship management communications, product returns, and membership and enrollment transactions.

System And Method For Rule-Based Processing Of Electronic Mail Messages

View page
US Patent:
20020120600, Aug 29, 2002
Filed:
Feb 26, 2001
Appl. No.:
09/793263
Inventors:
Vincent Schiavone - Berwyn PA, US
James Koenig - Philadelphia PA, US
Simson Garfinkel - Cambridge MA, US
International Classification:
G06F007/00
US Classification:
707/001000
Abstract:
A method for negotiating an electronic mail transaction. An electronic mail message's mail type specifier is identified. A data store stores data specific to the intended recipient. The data store is referenced and the electronic mail message is processed as a function of the mail type specifier and data retrieved from the data store. The mail may be processed at the recipient's mail client device and the information maintained confidential. The processing may be based upon reference to a rule applicable to that particular message. The rule includes a conditional instruction conditioned upon a result of a logic or other function of recipient profile data. Alternatively, the processing may provide for modification of the content of the message as a function of such recipient profile data. Recipient preferences from multiple recipients may be aggregated and propagated to senders and/or intermediaries to allow for pre-transmission processing of electronic mail messages.

System And Method For Conducting Predefined Transactions Via An Electronic Mail Messaging Infrastructure

View page
US Patent:
20020120692, Aug 29, 2002
Filed:
Feb 26, 2001
Appl. No.:
09/793233
Inventors:
Vincent Schiavone - Berwyn PA, US
James Koenig - Philadelphia PA, US
Cedarampattu Mohan - Yardley PA, US
International Classification:
G06F015/16
US Classification:
709/206000
Abstract:
An electronic mail transaction system for rule-based processing of e-mail messages to conduct predefined transactions via an electronic mail messaging infrastructure. Rules are defined for conducting various transactions. Senders and/or receivers specify a rule selected from among a common set of accepted rules. Preferably, each rule provides for automated retrieval of at least some required data elements from a data store. The data store may be stored privately, which protects the privacy of users of the system. Senders and receivers can then conduct transactions according to the predefined rules, which standardizes and facilitates the transactions. Establishment, management and/or approval of rules by a trusted third party intermediary protects and engenders trust in users of the system and facilitates order and efficiency. The system permits users to conduct transactions without a continuous network connection, i.e., in “burst” mode or asynchronously, which conserves network resources, heightens convenience and reduces costs to users.

Method And Apparatus For Dynamic Prioritization Of Electronic Mail Messages

View page
US Patent:
20020120702, Aug 29, 2002
Filed:
Feb 26, 2001
Appl. No.:
09/792936
Inventors:
Vincent Schiavone - Berwyn PA, US
James Koenig - Philadelphia PA, US
International Classification:
G06F015/16
US Classification:
709/207000
Abstract:
A method for prioritization of a recipient's electronic mail messages. Messages are displayed in descending order of an associated priority bid. Messages include an initial priority bid and/or a maximum priority bid, e.g., a cash value. An incoming message's initial bid is compared to current bids of previous messages and the bid is increased if it is lower than any previous message's current bid so that it will appear first in descending sorted order, e.g. in the recipient's electronic mail inbox, and thus have priority. Prioritization may continue to permit a previous message to increase its bid until it has the highest priority bid among the messages or until the incoming message has a priority bid higher than the maximum bid of all previous messages or until the incoming mail message reaches its maximum bid. Messages may be displayed in categorized sections and prioritization performed on fewer than all sections.
James Harlan Koenig from Pompano Beach, FL, age ~60 Get Report