Most Popular Privacy Law Blawgs Expanded View List View

Blogs 1 - 45 of 52
Sort by Popularity | Sort by Name | Sorted by Last Post Date

Inforrm's Blog

Inforrm's Blog

Discusses issues of media law and responsibility with a special focus on libel and privacy law and the balance between the two.

http://inforrm.wordpress.com
Rank this Week: 132

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Jul 30

    EFF Asks Virginia’s Supreme Court to Take Anonymous Speech Seriously

    EFF Asks Virginia’s Supreme Court to Take Anonymous Speech Seriously
    People have many reasons to be anonymous online, from the political to the personal. One of the most contentious uses of anonymity is in consumer reviews—some reviewers feel they need the protection of anonymity to post the truth, while…
  • Jul 30

    Record Label Lawsuit Could Jeopardize Online Content Communitie

    Record Label Lawsuit Could Jeopardize Online Content Communitie
    EFF Asks Appeals Court to Protect Free Speech and Innovation in Capitol v. VimeoSan Francisco - The Electronic Frontier Foundation (EFF) and a coalition of advocacy groups have asked a federal appeals court to block record labels' attempt to…
  • Jul 29

    A National Consensus: Cell Phone Location Records Are Private

    A National Consensus: Cell Phone Location Records Are Private
    The Fourth Amendment protects us from “unreasonable” government searches of our persons, houses, papers and effects. How courts should determine what is and isn’t reasonable in our increasingly digital world…
Rank this Week: 4291

Inside Privacy

Inside Privacy

Covers global privacy and data security. By Covington & Burling LLP.

http://www.insideprivacy.com
  • Jul 30

    New Version of USA Freedom Act Introduced

    New Version of USA Freedom Act Introduced
    By David Fagan, Richard Hertling, and Kate Goodloe Senate Judiciary Chairman Patrick J. Leahy introduced a new version of the Uniting and Strengthening America by Fulfilling Rights and Ensuring Effective Discipline Over Monitoring Act of 2014…
  • Jul 30

    House of Representatives Passes Three Cybersecurity Bill

    House of Representatives Passes Three Cybersecurity Bill
    By David Fagan, Richard Hertling, and Sumon Dantiki On July 28, 2014, the U.S. House of Representatives (“House”) passed three cybersecurity bills, the National Cybersecurity and Critical Infrastructure Protection Act of 2014…
  • Jul 28

    The Case for Not Overregulating Drone

    The Case for Not Overregulating Drone
    On the International Association of Privacy Professionals’ Privacy Perspectives blog, Covington privacy associate Jeff Kosseff shares his thoughts about the potential newsgathering uses of drones, and the dangers of overregulating them.
Rank this Week: 747

Privacy & Information Security…

Privacy & Information Security Law Blog

Provides global privacy and information security law updates and analysis. By Hunton & Williams.

https://www.huntonprivacyblog.com/
  • Jul 30

    UK House of Lords Sub-Committee Criticizes the “Right to Be Forgotten”

    UK House of Lords Sub-Committee Criticizes the “Right to Be Forgotten”
    A Sub-Committee of the UK House of Lords published a report that strongly criticizes recent case law regarding the so-called "right to be forgotten" and calls for that right to be omitted from the forthcoming EU General Data Protection…
  • Jul 24

    Data Security Council of India Announces Vodafone India Limited as DSCI Privacy Certified Organization

    Data Security Council of India Announces Vodafone India Limited as DSCI Privacy Certified Organization
    On July 22, 2014, the Data Security Council of India announced that Vodafone India Limited has been deemed a "DSCI Privacy Certified" organization. This is the first such certification for a telecommunications company in India.
  • Jul 23

    Hunton Global Privacy Update – July 2014

    Hunton Global Privacy Update – July 2014
    On July 15, 2014, the Hunton and Williams Global Privacy and Cybersecurity practice group hosted the latest webcast in its Hunton Global Privacy Update series. This blog post provides a link to a recording of the session, and to previous…
Rank this Week: 258

Global Regulatory Enforcement Law…

Global Regulatory Enforcement Law Blog

Covers antitrust, privacy, international trade, and white color criminal defense. By Reed Smith.

http://www.globalregulatoryenforcementlawblog.com
Rank this Week: 272

Chronicle of Data Protection

Chronicle of Data Protection

Covers consumer privacy, data security, HIPAA, financial privacy and EU privacy. By Hogan Lovells.

http://www.hldataprotection.com
  • Jul 30

    EU Data Protection Supervisor’s Workshop Examines Role of Privacy in Merger Reviews and Competition Investigation

    EU Data Protection Supervisor’s Workshop Examines Role of Privacy in Merger Reviews and Competition Investigation
    In a recent client alert, Hogan Lovells partners from the firm’s London and Washington, D.C. offices highlighted key takeaways for businesses following the European Data Protection Supervisor's Workshop on Privacy, Consumers,…
  • Jul 25

    Cookie Consent—What’s Changed?

    Cookie Consent—What’s Changed?
    Almost five years ago, EU legislators shocked the Internet world by changing the legal requirement for the use of cookies and similar device identification techniques from “notice and opt-out” to “notice and consent.”…
  • Jul 24

    2014 Intelligence Authorization Act Requires Contractors to Report Cybersecurity Breache

    2014 Intelligence Authorization Act Requires Contractors to Report Cybersecurity Breache
    On Monday, 7 July, the president signed into law the Intelligence Authorization Act for Fiscal Year 2014, which requires intelligence contractors with security clearances to promptly report network and information system penetrations and…
Rank this Week: 1060

Privacy and Security Law Blog

Privacy and Security Law Blog

Covers biometrics, HIPAA, identity theft, PATRIOT Act, phishing and more. By Davis Wright Tremaine.

http://www.privsecblog.com/
  • Jul 30

    FACTA Class Action

    FACTA Class Action
    In the July 2014 issues of The Review of Banking & Financial Services, DWT payments team members Burt Braverman and Micah Ratner wrote about the truncation requirement of FACTA, which has spawned a wave of class action litigation…
  • Jul 25

    U.S. District Court Dismisses Privacy Class Actions against Viacom, Google

    U.S. District Court Dismisses Privacy Class Actions against Viacom, Google
    Google and Viacom’s Nick.com, Nickjr.com, and Neopets.com off the hook – for now On July 2, 2014, New Jersey Federal District Judge Stanley R. Chesler dismissed six consolidated MDL class actions challenging Viacom’s and…
  • Jul 23

    FTC Updates COPPA FAQs Again – Revisions to Part H Gives App Developers and Parents Welcomed Clarification on Parental Consent

    FTC Updates COPPA FAQs Again – Revisions to Part H Gives App Developers and Parents Welcomed Clarification on Parental Consent
    Continuing our Blog’s updates on the Federal Trade Commission’s Frequently Asked Questions (FAQs) to the updated Children’s Online Privacy Protection Act (COPPA) Rule, we highlight that the FTC revised three portions of…
Rank this Week: 1120

Socially Aware Blog

Socially Aware Blog

Covers the law and business of social media. By Morrison Foerster.

http://www.sociallyawareblog.com/
  • Jul 30

    Status Update

    Status Update
    Going viral: Silencing its critics, Twitter posted strong second quarter results, adding 16 million new monthly active users and boosting its user base by 24 percent from this time last year. #Disappointing: In other Twitter news, the company…
  • Jul 28

    Status Update

    Status Update
    Your tax dollars at work: Wikipedia placed a 10-day ban on changes to the collaborative encyclopedia from a certain IP address inside the U.S. Capitol after discovering that bizarre and embarrassing edits were being made from that address…
  • Jul 25

    Status Update

    Status Update
    Facebook reported strong results for ad revenue in the second quarter of 2014. Mobile advertising was particularly strong, up 30 percent from last year. Mobile ads now account for 62 percent of Facebook’s advertising revenue. A federal…
Rank this Week: 1409

Data Privacy Monitor

Data Privacy Monitor

Covers data privacy, security and social media subjects. By Baker Hostetler.

http://www.dataprivacymonitor.com/
  • Jul 30

    Nominations Open for ABA Journal’s Top 100 Legal Blogs – Data Privacy Monitor

    Nominations Open for ABA Journal’s Top 100 Legal Blogs – Data Privacy Monitor
    The American Bar Association Journal announced that it is compiling its annual list of the 100 best legal blogs and invites readers to submit a nomination: Use the form below to tell us about a blog—not your own—that you read…
  • Jul 24

    Partner Alan Friel Named Influential Lawyer by LA Business Journal

    Partner Alan Friel Named Influential Lawyer by LA Business Journal
    Partner Alan Friel was named among the “Most Influential Lawyers: Digital Media and E-Commerce Law” in the Los Angeles Business Journal’s July 21, 2014, issue. The list recognizes 30 Los Angeles attorneys who have…
  • Jul 23

    What’s Old is New Again—Insecure Remote Acce

    What’s Old is New Again—Insecure Remote Acce
    When a merchant is suspected of being the victim of an account data compromise event, they are often required by the card brands to hire a Payment Card Industry Forensic Investigator (PFI). The PFI provides a report on the investigation to…
Rank this Week: 1152

Copyright, Intellectual Property,…

Copyright, Intellectual Property, Computer, Internet, e-Commerce Law

Covers IP/IT law, with a strong focus on copyright and internet law. By Barry Sookman.

http://www.barrysookman.com
  • Jul 30

    Computer and Internet Law Updates for 2014-07-29

    Computer and Internet Law Updates for 2014-07-29
    Artist sues after TV show films Montreal building that he had tagged with graffiti alleging breach of moral rights http://t.co/HnCU13BdfZ -> Copyright Infringement: A Warning to all Authors http://t.co/MY7CyX9Eyv -> Napster Owner…
  • Jul 29

    Computer and Internet Law Updates for 2014-07-28

    Computer and Internet Law Updates for 2014-07-28
    Under Spain's 'Google fee' law, news aggregators must pay publishers http://t.co/QTlGThEUxm -> Plea to end music piracy – Fiji Times Online http://t.co/1VjK56k9Xx -> Dr. Phil Sues Deadspin, Claims Copyright Infringement Over…
  • Jul 28

    Computer and Internet Law Updates for 2014-07-27

    Computer and Internet Law Updates for 2014-07-27
    Google doesn't want you to limit its ability to follow you around the internet http://t.co/9vYzPQjxcK -> RT @eurorights: 'French blogger owes $2,000 in damages for review 'too prominent' on Google'. http://t.co/UHMDvye7hC -> RT…
Rank this Week: 562

HIPAA Blog

HIPAA Blog

Features a discussion of medical privacy. By Jeffrey P. Drummond.

http://hipaablog.blogspot.com/
  • Jul 29

    Medical Identity Theft: Just a quick…

    Medical Identity Theft: Just a quick example of how it can go wrong.  If you're a provider, seriously consider using the FTC "Red Flags Rule" materials to prevent medical identity theft: not only will your patients be safer, so…
  • Jul 29

    Don't Text and Heal:  Texting and HIPAA…

    Don't Text and Heal:  Texting and HIPAA don't go well together; as I've said many times, texting is insecure, impermanent, and ill-suited for record-keeping purposes.  Texting PHI by providers could result in improper medical…
  • Jul 28

    Self Regional (Greenwood, SC) laptop…

    Self Regional (Greenwood, SC) laptop theft: Two knuckelheads broke into a building and stole a laptop.  They've been caught, but said when they realized what they stole, they threw it into a lake.  Divers were not able to find the…
Rank this Week: 596

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 4687

Broadband Law Advisor

Broadband Law Advisor

Provides insight and information on the FCC's National Broadband Plan. By Davis Wright Tremaine LLP.

http://www.broadbandlawadvisor.com/
  • Jul 28

    Areas Eligible for Rural Broadband Experiments Funding Announced

    Areas Eligible for Rural Broadband Experiments Funding Announced
    On July 25, the FCC released the list of eligible areas for its $100 Million Rural Broadband Experiments program, the details of which are summarized in our recent Advisory. The list includes the following key information: the state and…
  • Jul 16

    Washington’s Temporary Universal Service Fund Takes Effect; Petitions for 2015 Support Due August 1

    Washington’s Temporary Universal Service Fund Takes Effect; Petitions for 2015 Support Due August 1
    On July 1, the key provisions of Washington state’s new temporary Universal Service Fund (“USF”) statute became effective.   Together with implementing rules recently enacted by the Washington Utilities and…
  • Jul 16

    Leveraging Next Generation Networks To Change The Healthcare Model

    Leveraging Next Generation Networks To Change The Healthcare Model
    Davis Wright Tremaine is conducting a series of webinars under the heading “Reinventing the Hospital.”  The purpose of the series is to address “disruptive changes in healthcare” that “are transforming the…
Rank this Week: 2425

Information Technology Law Blog

Information Technology Law Blog

Covers social media, e-discovery, privacy, and intellectual property. By Foster Swift Collins & Smith PC.

http://www.michiganitlaw.com/
Rank this Week: 3595

Privacy & Security Matters

Privacy & Security Matters

By Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

http://www.privacyandsecuritymatters.com
  • Jul 28

    Privacy Monday: July 28, 2014

    Privacy Monday: July 28, 2014
    The last Monday in July — the summer of 2014 is rapidly slipping away!   Here are some privacy and security bits and bytes for this last week of July: US Congress Heads Out on August Recess Soon – Much to Do It has been…
  • Jul 24

    Honing in on the new rules for the transfer of personal data outside of the EEA

    Honing in on the new rules for the transfer of personal data outside of the EEA
    Written by Susan Foster, Solicitor England & Wales/Admitted in California  (LONDON) Although no major legislative milestones for the EU Data Protection Regulation have occurred since March 2014 (see status update here), there has…
  • Jul 24

    No news doesn’t mean it’s gone away: Timing Update for the EU Data Protection Regulation

    No news doesn’t mean it’s gone away: Timing Update for the EU Data Protection Regulation
    Written by Susan Foster, Solicitor England & Wales/Admitted in California  (LONDON) With no major legislative milestones since the March 2014 EU Parliamentary vote endorsing the LIBE draft of the new Data Protection Legislation,…
Rank this Week: 1523

Clancco: Art & Law

Clancco: Art & Law

Covers the relationship between art and law with a focus on intellectual property, nonprofit tax-exempt organizations, free speech, and contemporary art. By Sergio Muñoz Sarmiento.

http://clancco.com/wp
  • Jul 28

    Cariou v. Prince: Toward a Theory of Aesthetic-Judicial Judgment

    Cariou v. Prince: Toward a Theory of Aesthetic-Judicial Judgment
    Here’s another new law review article on Cariou v. Prince, and this time it’s from yours truly in collaboration with art historian and curator, Lauren van Haaften-Schick. The article is the product of a paper I presented at Texas…
  • Jul 24

    Exhibition: To Shoot a Kite, at the CUE Art Foundation

    Exhibition: To Shoot a Kite, at the CUE Art Foundation
    “In June 2012, Sesame Street introduced Alex, a new character on its online interactive program Little Children, Big Challenges. In the short educational video, Alex admits his father is in prison after skirting questions from his…
  • Jul 24

    Court Case Claims Australian Art Market Is 30 Percent Forgerie

    Court Case Claims Australian Art Market Is 30 Percent Forgerie
    On the heels of this Guardian article on why fake artworks may just be good enough, now this. A quick note on The Guardian article. The Walter Benjamin reference is a bit superficial. For Benjamin the aura did rest in the singular object, but…
Rank this Week: 252

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
  • Jul 28

    A new Ohio weapon against patent trolls?

    A new Ohio weapon against patent trolls?
    By Dan Miller Ohio may become the next state — after Virginia, Georgia, and thirteen other states — to take on the fight against patent trolls. A bill pending in Ohio’s General Assembly, H.B. 573, would provide additional…
  • Jul 18

    Delegation slows this week but the gTLD program is still going steady

    Delegation slows this week but the gTLD program is still going steady
    By Melissa Barnett Three new gTLDs have been delegated to the root zone since our last post. The newest group of gTLDs to be delegated include: .gent .nrw .scb gTLDs in Sunrise period — update The following gTLDs are now added to the…
  • Jul 11

    ICANN continues to rapidly expand the Internet this summer — newest statistics released

    ICANN continues to rapidly expand the Internet this summer — newest statistics released
    By Melissa Barnett As of July 4, 2014 ICANN announced that out of the 1,930 applicants received in 2012, 1,146 have been invited to contracting. Contracting is the process through which ICANN will contact eligible applicants and engage with…
Rank this Week: 4468

Information Law Group

Information Law Group

Covers advertising law, privacy, information security and intellectual property.

http://www.infolawgroup.com/
  • Jul 27

    The Games Advertisers Play: Heather Nolan to present this week on Gamification

    The Games Advertisers Play: Heather Nolan to present this week on Gamification
    This Wednesday, Heather Nolan will discuss the legal issues related to Gamification. The session is part of the Brand Activation Association’s comprehensive, 6-part webinar series, which has been covering the A-Z must-knows of…
  • Jul 25

    Massachusetts Continues Aggressive Information Security Enforcement Agenda

    Massachusetts Continues Aggressive Information Security Enforcement Agenda
    On July 23, 2014, the Massachusetts Attorney General announced a consent judgment with Women & Infant’s Hospital of Rhode Island (“WIH”) to resolve allegations that it violated federal and state information security laws…
  • Jul 23

    New Connecticut Mini-TCPA Provides for Giant Penalties and Attorneys’ Fee

    New Connecticut Mini-TCPA Provides for Giant Penalties and Attorneys’ Fee
    Companies sending text messages or conducting voice telemarketing in Connecticut beware! Connecticut has substantially amended its telemarketing law (the “mini-TCPA”), which now may regulate even more conduct than the federal TCPA…
Rank this Week: 1028

Business Litigation Info

Business Litigation Info

Covers business litigation, intellectual property, data security, and advertising and media. By Faruki Ireland & Cox P.L.L.

http://www.businesslitigationinfo.com/
  • Jul 25

    July 2014 FI&C Website Newsletter

    July 2014 FI&C Website Newsletter
    What’s new at Faruki Ireland & Cox P.L.L. *  Dan Donnellon and Jade Smarda appeared in the U.S. District Court for the S.D. of Ohio for the trial of a petition to compel international arbitration that it filed on behalf of the…
  • Jul 23

    HIPAA has a bite. What to know about the civil and criminal penalties for non-compliance

    HIPAA has a bite. What to know about the civil and criminal penalties for non-compliance
    I was asked to comment for a story about a recent case in Texas in which criminal charges were filed against an individual for the misuse of Protected Health Information (“PHI”). Criminal charges have been available under the…
  • Jul 8

    Starbucks is Sending Baristas to College…With a Non-Compete Clause.

    Starbucks is Sending Baristas to College…With a Non-Compete Clause.
    University of Starbucks? The recent announcement of college scholarships for Starbucks Baristas is a great “perk,” but is this one of the businesses that can take the non-compete and trade secret claims, so often seen as…
Rank this Week: 1388

Privacy Law Blog

Privacy Law Blog

Covers data privacy, identity theft, invasion of privacy, and national security legal issues. By Proskauer Rose LLP.

http://privacylaw.proskauer.com/
  • Jul 24

    e-IDs: the Future of Secure Digital Identification?

    e-IDs: the Future of Secure Digital Identification?
    Courtney BowmanOver the past decade, the EU has made significant technological and legal strides toward the widespread adoption of electronic identification cards.  An electronic ID card, or e-ID, serves as a form of secure…
  • Jul 9

    One year of Data Protection Enforcement in France: what the CNIL’s Activity Report 2013 Reveals and what to expect in 2014

    One year of Data Protection Enforcement in France: what the CNIL’s Activity Report 2013 Reveals and what to expect in 2014
    Marianne Le MoullecAccording to the French Data Protection Authority’s (“CNIL”) recently issued activity report for 2013 (http://www.cnil.fr/fileadmin/documents/La_CNIL/publications/CNIL_34e_Rapport_annuel_2013.pdf ), the…
  • Jul 1

    France Facilitates Implementation of Whistleblowing System

    France Facilitates Implementation of Whistleblowing System
    Cecile MartinIn France, before implementing a whistleblowing process, a company must inform and consult with its employees’ representatives, inform its employees and notify the French Data Protection Agency (CNIL). There are two…
Rank this Week: 977

Workplace Privacy Counsel

Workplace Privacy Counsel

Covers employment related privacy issues. Published by Philip Gordon of Littler Mendelson's Privacy and Data Protection Practice Group.

http://www.littler.com/blog/workplace-privacy-counsel
  • Jul 24

    Six Recent NLRB Cases Provide Further Insight on Structuring Employers' Social Media Policie

    Six Recent NLRB Cases Provide Further Insight on Structuring Employers' Social Media Policie
    Employers, struggling to regulate employees’ work-related social media postings, recently suffered a string of defeats in National Labor Relations Board (NLRB) cases challenging their social media and related communications…
  • Jul 21

    Illinois Enacts New Law Impacting Inquiries on Criminal Background Check

    Illinois Enacts New Law Impacting Inquiries on Criminal Background Check
    On July 19, 2014, 2014, Illinois Governor Pat Quinn signed into law the Job Opportunities for Qualified Applicants Act, which will go into effect on January 1, 2015.  The new law will restrict the timing of pre-employment inquiries by…
  • Jul 10

    Five Lessons for Employers from California v. Riley

    Five Lessons for Employers from California v. Riley
    In the waning days of its current term, the U.S. Supreme Court ruled unanimously in California v. Riley that police officers generally violate the Fourth Amendment's prohibition against unreasonable searches by conducting a warrantless search…
Rank this Week: 836

New Media & Technology Law Blog

New Media & Technology Law Blog

Covers intellectual property, data security, online marketing and online commerce. By Proskauer.

http://newmedialaw.proskauer.com
  • Jul 23

    Proposed “Bitlicense” Regulations Published to the New York Register

    Proposed “Bitlicense” Regulations Published to the New York Register
    Today’s New York State Register includes a Notice of Proposed Rule Making from the New York State Department of Financial Services (the “NYSDFS”) regarding the regulation of virtual currency (“Regulation of the Conduct…
  • Jun 16

    Sixth Circuit Reinforces CDA Immunity – Reverses Lower Court in Jones v. Dirty World

    Sixth Circuit Reinforces CDA Immunity – Reverses Lower Court in Jones v. Dirty World
    On June 16th, 2014, the Sixth Circuit reversed the lower court’s holding that the gossip site, TheDirty.com, was responsible for its users’ defamatory posts and could not rely on immunity under CDA Section 230.   The…
  • Jun 9

    Mobile Alphabet Soup…What Exactly Is an ATDS under the TCPA?

    Mobile Alphabet Soup…What Exactly Is an ATDS under the TCPA?
    An Important Issue for Text-Message Marketers There has been an uptick in litigation under the federal Telephone Consumer Protection Act (TCPA), 47 U.S.C. § 227 – likely due to the increased use of mobile marketing (not to mention…
Rank this Week: 3112

Privacy and Data Security Law

Privacy and Data Security Law

Covers the creation, collection, use, destruction and security of data. By Dentons.

http://www.privacyanddatasecuritylaw.com/
  • Jul 22

    Update from UK Information Commissioner’s Office (ICO)

    Update from UK Information Commissioner’s Office (ICO)
    Christopher Graham spoke at the recent Privacy Laws & Business Conference in Cambridge, UK.  Here is an update of the main points: The new EU Regulation Will it happen? Well, “if it looks like a duck, swims like a duck and…
  • Jul 4

    Russia moves to ban exports of personal data

    Russia moves to ban exports of personal data
    The Russian Parliament has just passed new rules requiring personal data of Russians to be stored in Russia.  This could mean that the big US IT vendors and other businesses that service Russian consumers will have to invest in local IT…
  • Jul 2

    EU Data Protection Regulation: Update

    EU Data Protection Regulation: Update
    The EU Data Protection Regulation was discussed, yesterday, at the Privacy Laws & Business conference in Cambridge, UK. Here is the latest news: There has been a debate as to whether the new Regulation is actually going to happen. …
Rank this Week: 1858

The D: Drive | E-Discovery,…

The D: Drive | E-Discovery, Privacy and All Things Data

Covers privacy, e-discovery, data security, and cloud computing. By Davis LLP.

http://www.davis.ca/en/blog/d-drive/
  • Jul 22

    Why Your Lawyer Should Be the First Point of Contact after a Data Breach

    Why Your Lawyer Should Be the First Point of Contact after a Data Breach
    Securing corporate information assets against a data breach, and responding to a data breach when it occurs, is not just a technology problem. While information security certainly has a major technological component, it is also a public…
  • Jun 23

    Join the Dialogue: Sedona Canada Holds Working Group Meeting to Update E-Discovery Principle

    Join the Dialogue: Sedona Canada Holds Working Group Meeting to Update E-Discovery Principle
    The Sedona Conference’s Working Group 7 (Sedona Canada) strives to create forward-looking principles and best practice recommendations for lawyers, courts, businesses, and others who regularly confront eDiscovery issues in Canada. The…
  • Jun 3

    Minimizing Risks and Responding to Data Breache

    Minimizing Risks and Responding to Data Breache
    This article originally appeared on Canadian Lawyer InHouse Online and has been reproduced here with permission from the publisher. [More…]
Rank this Week: 4703

Security, Privacy and The Law

Security, Privacy and The Law

Covers information security and privacy issues. By Foley Hoag LLP.

http://www.securityprivacyandthelaw.com
  • Jul 21

    App Developers Should Note Revisions to COPPA FAQ

    App Developers Should Note Revisions to COPPA FAQ
    The FTC’s July 10, 2014 complaint filed against Amazon has left app developers with concerns about how to make apps that target kids and still comply with the law. The complaint, brought under Section 5(a) of the FTC Act, alleged that…
  • Jun 25

    In Riley v. California, Supreme Court Rules Police Must Obtain Warrant before Searching Cell Phone

    In Riley v. California, Supreme Court Rules Police Must Obtain Warrant before Searching Cell Phone
    In a unanimous decision issued today, the Supreme Court ruled that police cannot search the cell phones of arrested individuals without a warrant. In reaching its decision, the Court recognized that there is an immense amount of personal…
  • Jun 25

    In Riley v. California, Supreme Court Rules Police Must Obtain Warrant before Searching Cell Phone

    In Riley v. California, Supreme Court Rules Police Must Obtain Warrant before Searching Cell Phone
    In a unanimous decision issued today, the Supreme Court ruled that police cannot search the cell phones of arrested individuals without a warrant. In reaching its decision, the Court recognized that there is an immense amount of personal…
Rank this Week: 2002

Workplace Privacy, Data Management…

Workplace Privacy, Data Management & Security Report

Covers data security, HIPAA, identity theft and workplace privacy. By Jackson Lewis.

http://www.workplaceprivacyreport.com
Rank this Week: 1296

Advertising Law Blog

Advertising Law Blog

Provides commentary and news on developing legal issues in advertising, promotional marketing, Internet, and privacy law. By Olshan Frome Wolosky LLP.

http://www.olshanlaw.com/blogs-Advertising-Law-Blog
Rank this Week: 1573

Privacy and IP Law Blog

Privacy and IP Law Blog

Addresses recent events in trademark, copyright, computer and privacy law. By Christina Frangiosa.

http://privacyandip.blogspot.com/
  • Jul 14

    ABA IPL Publishes White Paper on Online Piracy and Counterfeiting

    ABA IPL Publishes White Paper on Online Piracy and Counterfeiting
    On July 7, 2014, the ABA Intellectual Property Law (IPL) Section released its comprehensive white paper, outlining the results of its research and analysis of continuing concerns about online pirates and counterfeiters based overseas. …
  • Apr 15

    Recent Presentations and Article

    Recent Presentations and Article
    More articles on IP and privacy issues will be posted here soon, but in the meantime, here are several recent articles that have published in other media:·        Participated in a panel discussion on…
  • Jan 28

    Today is Data Privacy Day!

    Today is Data Privacy Day!
    January 28 is “Data Privacy Day.”  In honor of the day, below are several links relating to efforts to protect the privacy of personal data and some tools for small businesses:Council of Europe’s explanation of the…
Rank this Week: 1184

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
Rank this Week: 4672

Trials and Tribulations

Trials and Tribulations

Covers the Elvey v. TDAmeritrade case concerning information security, spam and identity theft.

http://caringaboutsecurity.wordpress.com
  • Jul 3

    Advice for TD Ameritrade from Tim Devaney and Tom Stein

    Advice for TD Ameritrade from Tim Devaney and Tom Stein
    TD Ameritrade’s PR flacks think this is bad advice on how to handle haters, I guess.Filed under: Settlement Component
  • Jun 13

    Settlement Valuation

    Settlement Valuation
    Judge Walker repeatedly asked the former class counsel to place a value on the benefits the rejected settlement offered to the class. I think it’s doable, and no one has truly done so, so I’m going to give it a shot. The audit…
  • Oct 30

    New SEC guidance on Cybersecurity

    New SEC guidance on Cybersecurity
    The SEC has a pathetic new regulation, its first on cybersecurity.  It’s another cog in a system designed to provide the appearance of Justice without actually meting it out to the very powerful or wealthy.  The SEC refused to act on…
Rank this Week: 3332

Fair Competition Law Blog

Fair Competition Law Blog

Covers trade secrets, noncompetes, privacy and security, the Computer Fraud and Abuse Act, trademarks, copyrights, and business torts. By Russell Beck.

http://faircompetitionlaw.com
Rank this Week: 1478

North Carolina Journal of Law &…

North Carolina Journal of Law & Technology

Features legal scholarship in law and technology topics, including intellectual property law, cyberspace law, environmental law, criminal law, health law, and privacy law.

http://ncjolt.org/
Rank this Week: 1784

Reasonable Expectation

Reasonable Expectation

Focuses on privacy and data security. By M. Scott Koller.

http://www.reasonableexpectation.com
  • Jun 30

    Are Data Breach Investigations Privileged?

    Are Data Breach Investigations Privileged?
    #150654797 / gettyimages.com Are Data Breach Investigations Privileged? Originally Published on the InfoLaw Group Blog: Over the past year, the number of data breaches has skyrocketed and, as a result, companies are facing increased risk of…
  • Mar 20

    FTC Seeks Public Comment on iKeepSafe’s Proposed Safe Harbor Program Under the Children’s Online Privacy Protection Rule

    FTC Seeks Public Comment on iKeepSafe’s Proposed Safe Harbor Program Under the Children’s Online Privacy Protection Rule
    Internet Keep Safe Coalition (iKeep Safe) has submitted a proposed safe harbor program to the Federal Trade Commission under the the agency’s Children’s Online Privacy Protection Rule. Under 16 C.F.R. 312.11, COPPA safe…
  • Feb 28

    Obama’s new cybersecurity plan a good start

    Obama’s new cybersecurity plan a good start
    I recently authored an article for the Daily Journal on the new cybersecurity framework.  You can read about it by visiting the Daily Journal.  
Rank this Week: 2887

Dot Indicia

Dot Indicia

Covers information, privacy and security from a Canadian perspective. By Michael Power.

http://michaelpower.ca
  • Jun 13

    Spencer, PIPEDA & Lawful Authority

    Spencer, PIPEDA & Lawful Authority
    A busy practice combined with a very bad shoulder injury will, regretfully, move blogging down the priority list. As we reach mid-2014 there have been a few interesting privacy law developments this year but, in my view, no real…
  • Feb 27

    Toronto Hydro Surveillance?

    Toronto Hydro Surveillance?
    I can’t help but think there’s a movie in this somewhere. Love, devotion and allegations of betrayal are all present. Mix in smart meters and privacy and it becomes obvious why I’m blogging about this. It’s quite a…
  • Feb 19

    Health Privacy: Is PHIPA the only game in town?

    Health Privacy: Is PHIPA the only game in town?
    There is a new and interesting decision out of Peterborough that raises but doesn’t answer a lot of questions. These questions revolve around the intersection of PHIPA, class action law and tort law. This is not something you see…
Rank this Week: 2466

Data Security Law Journal

Data Security Law Journal

Covers data security, cloud computing, data privacy and anything E. By Al Saikali.

http://www.datasecuritylawjournal.com/
  • May 26

    Why Every Business Should Care About Florida’s Information Protection Act

    Why Every Business Should Care About Florida’s Information Protection Act
    My last post described what the recently passed Florida Information Protection Act (FIPA) will do.  This post analyzes how FIPA differs from Florida’s existing breach notification law and explains why those differences will hurt or…
  • May 15

    Everything You Need To Know About Florida’s New Data Protection Law

    Everything You Need To Know About Florida’s New Data Protection Law
    The Florida Legislature recently passed the Florida Information Protection Act of 2014 (FIPA).  This post describes the FIPA and analyzes the advantages and disadvantages to businesses governed by the new law.  The FIPA must still…
  • Dec 30

    The Target Data Breach Lawsuits: Why Every Company Should Care

    The Target Data Breach Lawsuits: Why Every Company Should Care
    Plaintiffs’ lawyers were falling over themselves last week in a race to the courthouse to sue Target as a result of its recent data breach.  By at least one report, over 40 lawsuits have already been filed against Target, the first…
Rank this Week: 2704

LegalTXTS

LegalTXTS

Covers law and technology, with an emphasis on legal issues regarding digital media, privacy and data security, and information management. By Elijah Yip.

http://www.legaltxts.com/
  • May 19

    Section 230 of the CDA: An Employer’s New Friend?

    Section 230 of the CDA: An Employer’s New Friend?
    Employees can get carried away on social media. US Airways learned this the hard way when its employee responded to a customer complaint on Twitter with an obscene picture of a woman and a toy jet. An apology and deletion of the tweet…
  • May 8

    Oh Snap! Lessons From the Snapchat Settlement With the FTC

    Oh Snap! Lessons From the Snapchat Settlement With the FTC
    The Federal Trade Commission (FTC) just announced that Snapchat agreed to settle charges that it deceived consumers about how its popular mobile message app worked and what personal data it collected from users. (Read the FTC’s press…
  • Apr 21

    NLRB Strikes Down Selective Enforcement of Work Email Policy

    NLRB Strikes Down Selective Enforcement of Work Email Policy
    Birth announcements. Girl Scout cookies fundraisers. Leftovers in the company lounge. We’ve all probably received an email at work on these or similar subjects. It’s uncommon for an employee be disciplined for sending an email of…
Rank this Week: 1679

Beyond Telecom Law Blog

Beyond Telecom Law Blog

Covers telecom policy, services agreements and data security/privacy. By Keller and Heckman LLP.

http://www.beyondtelecomlawblog.com
  • May 19

    Privacy Concerns Escalate as Drones Are About to Take-Off

    Privacy Concerns Escalate as Drones Are About to Take-Off
    The widely-anticipated commercial deployment of drones piques the interest of critical infrastructure industries, the agricultural sector, and technology companies such as Amazon.  Consistent with this commercial interest and its…
  • Apr 25

    Improving In-Building Wireless Reception: Property Owners Are Not the Enemy

    Improving In-Building Wireless Reception: Property Owners Are Not the Enemy
    Wireless carriers’ networks are subject to recurring capacity constraints, particularly in high density, urban environments.  Owners of buildings and developments in urban areas and operators of major venues—stadiums, arenas…
  • Apr 3

    The Industrial Internet: The Emerging M2M Colossu

    The Industrial Internet: The Emerging M2M Colossu
    At the end of March, Intel, IBM, AT&T, GE and Cisco announced the formation of “the Industrial Internet Consortium (IIC), a nonprofit organization dedicated to the Internet of Things, to ‘improve the integration of the…
Rank this Week: 2807

SullivanLawNet

SullivanLawNet

Legal news and analysis, with an emphasis on international and domestic intellectual property developments. By Shawn Sullivan.

http://sullivanlaw.net/
  • May 18

    Increased Fines for Violations of North Carolina Seed Law

    Increased Fines for Violations of North Carolina Seed Law
    In 2013, the North Carolina legislature increased the maximum fine for violations of the state’s seed law from $500 to $10,000 per violation. See N.C. Session Law 2013-345, Senate Bill 455, An act to increase penalties for…
  • Mar 31

    Unintended Consequences of Open Access Publishing Policie

    Unintended Consequences of Open Access Publishing Policie
    Rick Anderson at The Scholarly Kitchen has a thought-provoking article regarding the pressure on authors to publish their academic articles under the most permissive open access licenses available. See Rick Anderson, CC-BY, Copyright, and…
  • Mar 31

    “Twilight” Trademark Infringement Claims Cleared for Trial

    “Twilight” Trademark Infringement Claims Cleared for Trial
    The U.S. District Court for the Southern District of New York ruled that the entertainment company responsible for the “Twilight” film series is entitled to a trial on claims that its trademarks were infringed by a cosmetics…
Rank this Week: 2078

Peter Fleischer: Privacy...?

Peter Fleischer: Privacy...?

Covers privacy law and corporate privacy policy. By Peter Fleischer, Global Privacy Counsel for Google.

http://peterfleischer.blogspot.com/
  • May 14

    Harvard Nostalgia

    Harvard Nostalgia
    The older I get, the more I think back to Harvard with nostalgia.  I was very young at Harvard.  I went to college straight out of the 10th grade, and I graduated at the age of 19.  That officially makes me a high school…
  • Apr 6

    From pool to pool

    From pool to pool
    I love my pools.    In Paris, my pool is in a fancy private club, in the Bois de Boulogne, on the edge of Paris.  It's a gorgeous 50-meter pool, open year-round outdoors, framed by views of the Eiffel Tower. My pool nurtured…
  • Mar 12

    A Science Fiction Novel

    A Science Fiction Novel
    I'd like to crowd-source the plot for a science fiction novel.  Would this make a good story?:In a not-too-distant future, say 20 years from now, humanity lives through the biggest change in its history.  It doesn't happen…
Rank this Week: 2017

Web Tech Law

Web Tech Law

Covers intellectual property, privacy, and social media in South Africa.

http://webtechlaw.com/our-insights
  • Apr 24

    The legalities of going paper-le

    The legalities of going paper-le
    Many people think that going digital is problematic from a legal perspective and, to a large extent, it isn't. It does require that you understand the implications and adjust your workflows to suit the digital paradigm.
  • Apr 24

    Bombs under wheelchairs, model airplanes and other stupid tweet

    Bombs under wheelchairs, model airplanes and other stupid tweet
    The last couple weeks saw two spectacular lapses in judgment in corporate Twitter accounts. The first was the pornographic US Airways tweet in response to a passenger’s complaints about a delayed flight and the second was an FNB…
  • Apr 7

    How to deal with stalkers taking photos of you

    How to deal with stalkers taking photos of you
    I spoke to Kieno Kammies on 567 CapeTalk radio this morning about a troubling trend. As you can hear from the segment, below, the concern is partly about people being photographed in suspicious ways in public. One example is a person…
Rank this Week: 4617

The Privacy Law Site

The Privacy Law Site

Covers privacy laws and regulations.

http://privacy-law.blogspot.com/
  • Mar 25

    White House to Propose End to Bulk Collection

    White House to Propose End to Bulk Collection
    According to the The New York Times, President Obama plans to propose legislation that would end bulk collection of phone records under Sec. 215 of the Patriot Act, keep the records in the hands of the phone companies, and require…
  • Jun 29

    26 Senators Seek Details on Information Collection from NSA

    26 Senators Seek Details on Information Collection from NSA
    26 Senators have sent a letter to DNI James Clapper seeking examples of how bulk collection of phone records information from provided unique intelligence.The AP reports the story here.
  • Jun 29

    COPPA Limits on Collection of Children's Information Applies to Apps as of July 1, 2013

    COPPA Limits on Collection of Children's Information Applies to Apps as of July 1, 2013
    Congress amended COPPA in 2012 to cover online services such as apps. As was previously the case, the law only applies to apps "directed at" children under the age of 13, or have actual knowledge of collection of personal information from…
Rank this Week: 470

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • Mar 10

    Independent Creation Paper Trail To Fend Off Copyright Suit

    Independent Creation Paper Trail To Fend Off Copyright Suit
    Keeping adequate record of your software creation efforts can be very helpful to stave off copyright infringement claimsThe post Independent Creation Paper Trail To Fend Off Copyright Suits appeared first on .
  • Feb 20

    Oracle’s Copyright Victory: An Ephemeral Win

    Oracle’s Copyright Victory: An Ephemeral Win
    Despite Oracle’s efforts to utilize copyright law to asphyxiate Rimini’s business model, Rimini’s support services appear to have bright days aheadThe post Oracle’s Copyright Victory: An Ephemeral Win appeared first…
  • Feb 14

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”
    After former employer declined to invest in Defendant’s new business, Defendant turned cybersquatterThe post Retaliatory Cybersquatter Used Domain Name To “Get Leverage” appeared first on .
Rank this Week: 4606

Tsibouris Privacy + Technology Law…

Tsibouris Privacy + Technology Law Blog

Focuses on privacy, security, data protection, technology, and financial services issues affecting corporations, governments, and individuals. By Tsibouris & Associates.

http://blog.tsibouris.com/
  • Jan 23

    US-EU Safe Harbor: FTC Proposed Consent Orders with 12 companies for false claims.

    US-EU Safe Harbor: FTC Proposed Consent Orders with 12 companies for false claims.
    Yesterday the FTC announced proposed consent orders with twelve companies that falsely claimed compliance with the Safe Harbor framework.  Interestingly it involved a broad range of companies, including collection agencies and NFL…
  • Jun 7

    PRISM and NSA-Verizon Disclosures May Hurt EU Data Protection Regulation Effort

    PRISM and NSA-Verizon Disclosures May Hurt EU Data Protection Regulation Effort
    By Mehmet MunurRecent disclosures relating to PRISMand Verizon-NSAwiretapping may hurt efforts to make the EU General Data Protection Regulation less prescriptive and more business friendly for American companies. These programs will give…
  • Jan 25

    Appeals Court Vacates Obama Recess Appointment

    Appeals Court Vacates Obama Recess Appointment
    By Mehmet MunurThe U.S. Court of Appeals for the D.C. Circuit ruledtoday that President Obama’s appointments to the National Labor Relations Board were unconstitutional and the Board’s actions were unenforceable.  The court…
Rank this Week: 2414

Spam Notes

Spam Notes

Covers Internet law, electronic communications law, privacy, ID theft, data protection, adware, spyware and more. Published by Seattle lawyer Venkat Balasubramani.

http://spamnotes.com
  • Dec 31

    The Marble and the Sculptor

    The Marble and the Sculptor
    A few months* ago, Keith Lee, who blogs at Associate's Mind, was kind enough to send me a review copy of his book titled "The Marble and the Sculptor". The book is a survival guide of sorts for newly minted lawyers, tackling a wide range…
  • Jul 19

    The Problem With the Sharknado Reference

    The Problem With the Sharknado Reference
    Judge Mills throws in a reference to Sharknado in Faulkner v. Woody Allen. (h/t @ericgoldman) The problem with the reference is this: five years from now, no one will know or recall what Sharknado was. Even today, many people reading the…
  • Jan 19

    Just Who Are the Change Agents in Law?

    Just Who Are the Change Agents in Law?
    Scott Greenfield has an interesting post up today with an equally interesting response from Keith Lee. Both posts nudge me in the direction of a "Godin-esque" question that's been percolating in my mind for a long long time now:  the…
Rank this Week: 1610

German IT Law

German IT Law

Provides updates and analysis on German and European IP/IT, technology, media and (open source) software law. By JBB Rechtsanwälte.

http://germanitlaw.com/
  • Oct 9

    Court Decision: Companies Allowed to run Fanpages on Facebook

    Court Decision: Companies Allowed to run Fanpages on Facebook
    The Administrative Court of Schleswig (Verwaltungsgericht Schleswig) held today in three parallel decisions that companies that run their own fanpages on Facebook are not responsible for the social network’s data collection and…
  • Mar 5

    German Data Protection Laws Do Not Apply to Facebook

    German Data Protection Laws Do Not Apply to Facebook
    On February 14th, 2013 the Administrative Court of Schleswig held in two decisions that German data protection laws do not apply to data processing by Facebook (file numbers 8 B 60/12 and 8 B 61/1).The interlocutory judicial procedure had…
  • Jan 28

    Federal Supreme Court: Can a foreign company use a .de-domain?

    Federal Supreme Court: Can a foreign company use a .de-domain?
    In the case laid before the Federal Supreme Court (Bundesgerichtshof; BGH) the court primarily had to decide about the liability of the administrative contact of the domain dlg.de. However, in the obiter dictum, the court also held under…
Rank this Week: 3205