Most Popular Privacy Law Blawgs Expanded View List View

Blogs 1 - 45 of 54
Sort by Popularity | Sort by Name | Sorted by Last Post Date

Threat Level

Threat Level

Covers privacy, crime and security online. From Wired News.

http://www.wired.com/threatlevel
  • Aug 31

    Hack Brief: Malware Hits 225,000 (Jailbroken, Mostly Chinese) iPhone

    Hack Brief: Malware Hits 225,000 (Jailbroken, Mostly Chinese) iPhone
    The KeyRaider attack represents "the largest known Apple account theft caused by malware." The post Hack Brief: Malware Hits 225,000 (Jailbroken, Mostly Chinese) iPhones appeared first on WIRED.
  • Aug 28

    Uber Hires the Hackers Who Wirelessly Hijacked a Jeep

    Uber Hires the Hackers Who Wirelessly Hijacked a Jeep
    The two researchers will apparently be working on securing Uber's self-driving car of the future. The post Uber Hires the Hackers Who Wirelessly Hijacked a Jeep appeared first on WIRED.
  • Aug 28

    Why It’s Hard to Sue the NSA: You Have to Prove It Spied on You

    Why It’s Hard to Sue the NSA: You Have to Prove It Spied on You
    A lawsuit against the NSA for its domestic surveillance program hits a familiar snag. The post Why It’s Hard to Sue the NSA: You Have to Prove It Spied on You appeared first on WIRED.
Rank this Week: 42

Privacy and Security Law Blog

Privacy and Security Law Blog

Covers biometrics, HIPAA, identity theft, PATRIOT Act, phishing and more. By Davis Wright Tremaine.

http://www.privsecblog.com/
  • Aug 31

    DoD New Cyber Security Reporting Rules for Contractor

    DoD New Cyber Security Reporting Rules for Contractor
    In a move that highlights the changing winds of federal cybersecurity policy, the Department of Defense (“DoD”) has issued an interim Rule (“Rule”) that imposes new security and reporting requirements on federal…
  • Aug 26

    UPDATE: Third Circuit Affirms FTC’s Data Security Authority in Wyndham

    UPDATE: Third Circuit Affirms FTC’s Data Security Authority in Wyndham
    The U.S. Court of Appeals for the Third Circuit released its much-anticipated ruling in Federal Trade Commission v. Wyndham Worldwide Corp. on August 24, 2015, unanimously upholding the FTC’s authority to regulate companies’ data…
  • Aug 24

    How Will Your Company Handle a Security Breach?

    How Will Your Company Handle a Security Breach?
    Are you ready in the event that your company’s records or data are lost, stolen or accessed without authorization? Do you know the notification obligations that are applicable to a data breach or when your company’s data falls…
Rank this Week: 1063

Business Litigation Info

Business Litigation Info

Covers business litigation, intellectual property, data security, and advertising and media. By Faruki Ireland & Cox P.L.L.

http://www.businesslitigationinfo.com/
  • Aug 31

    MICHIGAN STATE ORDERED TO DISCLOSE SUSPECT’S INFORMATION REDACTED FROM UNIVERSITY POLICE INCIDENT REPORTS

    MICHIGAN STATE ORDERED TO DISCLOSE SUSPECT’S INFORMATION REDACTED FROM UNIVERSITY POLICE INCIDENT REPORTS
    Earlier this month, a Michigan Court of Appeals affirmed a trial court’s order that Michigan State disclose the names of suspects redacted from university police incident reports.   ESPN, Inc. v. Michigan State University, No.…
  • Aug 28

    Scot Ganow Discusses the Ashley Madison Breach on 700 WLW

    Scot Ganow Discusses the Ashley Madison Breach on 700 WLW
    I have always written and spoken about the individual value for privacy and when it is violated, how that violation can be very personal and akin to trauma. The recent breach at Ashley Madison and the potential harm it may unleash on the…
  • Aug 27

    Is Footage of City Council Meetings Protected by Copyright Laws?

    Is Footage of City Council Meetings Protected by Copyright Laws?
    Not according to one federal judge in California. In City of Inglewood v. Joseph Teixeira, et. al., No. 2:15-cv-01815 (C.D. Ca. Aug. 20, 2015), United Stated District Judge Michael W. Fitzgerald found that California state law bars the city…
Rank this Week: 1442

Socially Aware Blog

Socially Aware Blog

Covers the law and business of social media. By Morrison Foerster.

http://www.sociallyawareblog.com/
Rank this Week: 1431

Chronicle of Data Protection

Chronicle of Data Protection

Covers consumer privacy, data security, HIPAA, financial privacy and EU privacy. By Hogan Lovells.

http://www.hldataprotection.com
  • Aug 31

    Life is Short. Take Cybersecurity Seriously

    Life is Short. Take Cybersecurity Seriously
    This article is not about morality but about an urgently-needed change in behaviour. For real and for good. The much talked-about saga involving the theft and subsequent publication of customer data from extramarital affairs website Ashley…
  • Aug 28

    California Legislature Advances UAS Legislation

    California Legislature Advances UAS Legislation
    For the past several years, California’s Legislature has actively sought to regulate unmanned aerial systems, including, but not only, through privacy-related legislation.. In the 2014 session, one bill passed and was signed by Governor…
  • Aug 27

    Analysis of FTC v. Wyndham: Third Circuit Affirms FTC Authority to Regulate Data Security

    Analysis of FTC v. Wyndham: Third Circuit Affirms FTC Authority to Regulate Data Security
    On Monday, August 24, 2015, the U.S. Court of Appeals for the Third Circuit issued its opinion in FTC v. Wyndham Worldwide Corp upholding the authority of the Federal Trade Commissionto oversee cybersecurity practices. The Wyndham case first…
Rank this Week: 1072

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Aug 31

    Calling All Cosplayers: Project Secret Identity Returns to Dragon Con

    Calling All Cosplayers: Project Secret Identity Returns to Dragon Con
    Project Secret Identity is back.  EFF is returning to Dragon Con, the science fiction and fantasy convention in Atlanta, Georgia, for a Labor Day weekend of cosplay activism. This year’s privacy campaign will be even more…
  • Aug 28

    Appeals Court Falls for Government’s Shell Game in NSA Spying Case

    Appeals Court Falls for Government’s Shell Game in NSA Spying Case
    The U.S. Court of Appeals for the D.C. Circuit’s opinion today in Klayman v. Obama is highly disappointing and, worse, based on a mistaken concern about the underlying facts. The court said that since the plaintiffs' phone…
  • Aug 28

    Russia's Wikipedia Ban Buckles Under HTTPS Encryption

    Russia's Wikipedia Ban Buckles Under HTTPS Encryption
    Dueling forces of encryption and government censorship came to a head in Russia this week in the form of an order to block Wikipedia. One Wikipedia article in particular (about charas hashish) was deemed to run afoul of the country's…
Rank this Week: 4024

Copyright, Intellectual Property,…

Copyright, Intellectual Property, Computer, Internet, e-Commerce Law

Covers IP/IT law, with a strong focus on copyright and internet law. By Barry Sookman.

http://www.barrysookman.com
  • Aug 31

    Computer and Internet Updates for 2015-08-30

    Computer and Internet Updates for 2015-08-30
    Ashley Madison's members by the numbers – Technology & Science http://t.co/RNNSWJg9WM -> Air Canada blames computer glitch for bargain clawback – British Columbia http://t.co/CYTZi6gULi -> Canada's Anti-Spam Legislation…
  • Aug 30

    Computer and Internet Weekly Updates for 2015-08-29

    Computer and Internet Weekly Updates for 2015-08-29
    Computer and Internet Weekly Updates for 2015-08-22 http://t.co/hkfW47Zzbj -> Computer and Internet Weekly Updates for 2015-08-22: Computer and Internet Updates for 2015-08-15 htt… http://t.co/ENMChVQIao -> NC Man Admits To Music…
  • Aug 28

    Computer and Internet Updates for 2015-08-27

    Computer and Internet Updates for 2015-08-27
    How new global tax rules could erode your financial privacy http://t.co/5GjybuGOI2 -> So you just want politicians to leave you alone? Good luck with that. https://t.co/9H12qkTpFo -> Copyright preemption notwithstanding no copyright…
Rank this Week: 598

Clancco: Art & Law

Clancco: Art & Law

Covers the relationship between art and law with a focus on intellectual property, nonprofit tax-exempt organizations, free speech, and contemporary art. By Sergio Muñoz Sarmiento.

http://clancco.com/wp
  • Aug 30

    “a glaring example of the commoditization of the art world.”

    “a glaring example of the commoditization of the art world.”
      This is what happens when an artist doesn’t perform to the tunes of an art dealer. Los Angeles dealer and artist agent Stefan Simchowitz and Dublin dealer Jonathan Ellis King have filed suit against the Ghanaian artist Ibrahim…
  • Aug 26

    Now Accepting Applications for the 2016 Art & Law Program

    Now Accepting Applications for the 2016 Art & Law Program
    Applications for the 2016 Art & Law Program are now being accepted.  Deadline for applications:  October 19, 2015 Going on its 7th year, The Program seeks qualified, open-minded and self-motivated individuals with an…
  • Aug 26

    Germany Stops Collector From Selling Artwork

    Germany Stops Collector From Selling Artwork
    German public broadcaster Westdeutscher Rundfunk (WDR), which controversially put some of its art collection up for sale to pay off debts, has been banned from exporting two paintings by Ernst Ludwig Kirchner and Max Beckmann. More here.
Rank this Week: 249

Inforrm's Blog

Inforrm's Blog

Discusses issues of media law and responsibility with a special focus on libel and privacy law and the balance between the two.

http://inforrm.wordpress.com
Rank this Week: 133

Information Technology Law Blog

Information Technology Law Blog

Covers social media, e-discovery, privacy, and intellectual property. By Foster Swift Collins & Smith PC.

http://www.michiganitlaw.com/
  • Aug 30

    Get It In Writing: Contract

    Get It In Writing: Contract
    Let's say you are going to get into business or enter into an agreement with someone you trust. Do you need to get it in writing? It is always a good idea to have a written agreement. Writing provides clarity. Even the process of working…
  • Aug 20

    Patent Basic

    Patent Basic
    So you just had a Eureka moment and your epiphany is going to make you millions as soon as it hits shelves. Learn more about patent basics in this short video including: Time limits for filing a patent; Different kinds of patents;…
  • Aug 13

    What's in a Name: Selecting a Name for Your Busine

    What's in a Name: Selecting a Name for Your Busine
    Why is a business name so important? A name is everything, it is your business's identity. When you select your business name, from a legal perspective, you need to come up with a unique name, a name that does not infringe on others rights.…
Rank this Week: 3537

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 4794

sobre privacidad y protección de…

sobre privacidad y protección de datos

Spanish language blog about privacy and data protection. By Daniel A. Lopez Carballo.

http://www.dlcarballo.com/
  • Aug 28

    Análisis del caso Ashley Madison y su impacto en la privacidad

    Análisis del caso Ashley Madison y su impacto en la privacidad
    Millones de datos personales e información privada de usuarios de la página de contactos Ashley Madison veían la luz tras el ataque sufrido por parte de un grupo de hackers denominado Impact Team. Este hecho de…
  • Jun 29

    Redes sociales, tecnología y la necesaria redefinición del dato personal

    Redes sociales, tecnología y la necesaria redefinición del dato personal
    Recientemente diferentes medios publicaban la noticia de que la red social “Facebook” había comenzado a probar un sistema capaz de reconocer a las personas en las, incluso si no están mirando a la cámara, como…
  • Jun 18

    Un paso firme para la protección de los datos en Europa

    Un paso firme para la protección de los datos en Europa
    El pasado 15 de junio se dio un paso firme hacia la aprobación del futuro Reglamento General de Protección de Datos de la Unión Europea. Más allá de algunas noticias en prensa que daban por aprobado el…
Rank this Week: 2787

techblawg

techblawg

Focuses primarily on issues involving the intersection of law, technology and finance. By David Ma.

http://david-ma.ca/
  • Aug 27

    weekly tweet roundup

    weekly tweet roundup
    i suppose one upside of the ashley madison data breach is the potential for interesting analytics. like this. http://t.co/iVRD2QFDNV 2015-08-21 scientists grow human brain in lab from skin cells. extraordinarily creepy. http://t.co/iDBJQWZKZL…
  • Mar 5

    weekly tweet roundup

    weekly tweet roundup
    had no idea they've started using aerogel in clothing. so much for down. http://t.co/acpGLsONiq 2015-02-27 [Click on title above to read the full post]
  • Feb 26

    weekly tweet roundup

    weekly tweet roundup
    nsa stole encryption keys for sim cards, enabling it to monitor a huge portion of worlwide cell communications. http://t.co/9xLsHKroN8 2015-02-20 more details on nsa/equation group hard drive malware. in short, you can't get rid of it. ever.…
Rank this Week: 564

Privacy Law Blog

Privacy Law Blog

Covers data privacy, identity theft, invasion of privacy, and national security legal issues. By Proskauer Rose LLP.

http://privacylaw.proskauer.com/
Rank this Week: 1006

Security, Privacy and The Law

Security, Privacy and The Law

Covers information security and privacy issues. By Foley Hoag LLP.

http://www.securityprivacyandthelaw.com
Rank this Week: 2004

Advertising Law Blog

Advertising Law Blog

Provides commentary and news on developing legal issues in advertising, promotional marketing, Internet, and privacy law. By Olshan Frome Wolosky LLP.

http://www.olshanlaw.com/blogs-Advertising-Law-Blog
  • Aug 27

    Andrew Lustigman Quoted in AdExchanger.Com on Cybersecurity Practice

    Andrew Lustigman Quoted in AdExchanger.Com on Cybersecurity Practice
    Olshan Advertising Partner Andrew Lustigman was quoted regarding FTC’s power to penalize companies for insufficient cybersecurity practices. Read More › Tags: Advertising, Advertising Law, cybersecurity, FTC,…
  • Aug 25

    DirectTv

    DirectTv
    Advertisers may believe that claims contained in light-hearted or humorous advertising are immune from challenge. Read More › Tags: Ads, Advertising, DirectTV, NAD, NARB
  • Aug 23

    Text Marketer Gains Legal Victory in California

    Text Marketer Gains Legal Victory in California
    “Human intervention” was key to avoiding TCPA liability Read More › Tags: Auto-dial, FCC, Mass texts, TCPA, TCPA Claim, TCPA Liability
Rank this Week: 1434

Data Privacy Monitor

Data Privacy Monitor

Covers data privacy, security and social media subjects. By Baker Hostetler.

http://www.dataprivacymonitor.com/
Rank this Week: 1203

HIPAA Blog

HIPAA Blog

Features a discussion of medical privacy. By Jeffrey P. Drummond.

http://hipaablog.blogspot.com/
  • Aug 26

    Texting in the Healthcare Environment:…

    Texting in the Healthcare Environment: Here's a pretty good article highlighting the benefits and risks in texting in healthcare, with some pretty good tips as well on how to text safely and correctly if you're going to do it.  Key point:…
  • Aug 24

    UCLA and Medical ID Theft: An interesting…

    UCLA and Medical ID Theft: An interesting article from the LA Times.  If the intro paragraphs are indicative of how UCLA has handled this breach, I'd be awfully concerned if I ever got care at a UCLA facility.  Hate to say that, but one…
  • Aug 20

    Highlights of 4 recent breaches shows how…

    Highlights of 4 recent breaches shows how the data breach scene is a big worry in the healthcare space these days.
Rank this Week: 641

Privacy & Security Matters

Privacy & Security Matters

By Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

http://www.privacyandsecuritymatters.com
Rank this Week: 1565

Information Law Group

Information Law Group

Covers advertising law, privacy, information security and intellectual property.

http://www.infolawgroup.com/
  • Aug 24

    Know your Privacy Policy and Practices: An Important Reminder Illustrated by Recent FTC Action

    Know your Privacy Policy and Practices: An Important Reminder Illustrated by Recent FTC Action
    The Federal Trade Commission’s (“FTC”) announcement last week of settlements with 13 separate companies for charges of falsely advertising certification with the U.S.-EU and/or U.S.-Swiss Safe Harbor Frameworks (“Safe…
  • Aug 20

    Blue Apron and Others Face Spate of Suits under CA Auto-Renewal Law

    Blue Apron and Others Face Spate of Suits under CA Auto-Renewal Law
    A purported class action lawsuit was recently filed against meal-delivery service Blue Apron based on its alleged failure to satisfy the requirements of California’s law regulating automatic-renewal provisions in consumer contracts…
  • Jul 24

    McLean B. Sieverding Joins InfoLawGroup As Senior Counsel

    McLean B. Sieverding Joins InfoLawGroup As Senior Counsel
    InfoLawGroup is happy to announce that McLean B. Sieverding has joined the firm as Senior Counsel. Most recently, McLean served as Assistant General Counsel for Int’l Data Protection & Regulatory Compliance at Verizon…
Rank this Week: 1090

North Carolina Journal of Law &…

North Carolina Journal of Law & Technology

Features legal scholarship in law and technology topics, including intellectual property law, cyberspace law, environmental law, criminal law, health law, and privacy law.

http://ncjolt.org/
  • Aug 24

    Google’s Potential Influence: How The 2016 Presidential Election Could Be Decided

    Google’s Potential Influence: How The 2016 Presidential Election Could Be Decided
    Political influence is a funny thing because it comes in a variety of forms and originates from a variety of sources. Fortune 500 companies inherently possess the ability to have an astounding amount of political influence on the…
  • Aug 12

    A Game of I Spy: Neighborhood Drone Usage

    A Game of I Spy: Neighborhood Drone Usage
    In July, a Kentucky man was arrested after he shot down a neighbor’s drone that he says was hovering over his yard where his daughter was sunbathing.William “Willie” Merideth, 47, of Bullitt County was charged with first…
  • Aug 6

    Silicon Valley backing “Siri for legal knowledge”

    Silicon Valley backing “Siri for legal knowledge”
    Picture this: You take your seat in your first-year Contracts course. The topic of the day is the Statute of Frauds. After outlining a hypothetical and quickly scanning the seating chart, your professor puts you on the spot: “Under…
Rank this Week: 1817

Privacy and Data Security Law

Privacy and Data Security Law

Covers the creation, collection, use, destruction and security of data. By Dentons.

http://www.privacyanddatasecuritylaw.com/
  • Aug 21

    Subject Access Request risk: limits in sight?

    Subject Access Request risk: limits in sight?
    A recent High Court case took a very robust stance on the issue of DSARs (Data Subject Access Requests) being used to fuel litigation. An individual can make a DSAR to request access to any of his/her personal information. In Dawson-Damer v…
  • Aug 12

    The slow death of EU forum shopping

    The slow death of EU forum shopping
    Forum shopping (i.e. where businesses pick and choose the most privacy-friendly EU state to set up shop) has always been a somewhat unique side effect of EU data privacy law. Then last year saw the Google Spain case where the European Court…
  • Aug 10

    Ontario Issues Guidance on Internet Publication

    Ontario Issues Guidance on Internet Publication
    Ontario Municipalities Should Exercise Care in Publishing Personal Information The Information and Privacy Commissioner of Ontario (IPC) has published new guidance entitled, Transparency, Privacy and the Internet: Municipal Balancing Acts.…
Rank this Week: 1892

Privacy and IP Law Blog

Privacy and IP Law Blog

Addresses recent events in trademark, copyright, computer and privacy law. By Christina Frangiosa.

http://privacyandiplawblog.com/
  • Aug 18

    Copyrighting Software? Don’t Rely on Screenshots Alone!

    Copyrighting Software? Don’t Rely on Screenshots Alone!
    In a recent decision, the Second Circuit Court of Appeals recently held that a copyright application solely directed to screen shots generated from a software program was insufficient to establish copyright rights in the software as a whole,…
  • Apr 13

    Common Questions – Benefits of Trademark Searching

    Common Questions – Benefits of Trademark Searching
    Searching for potentially competing trademarks before you go through the time and expense of developing a strong brand is a very worthwhile exercise, but it costs money – and sometimes clients can be reluctant to spend the money if…
  • Feb 9

    Why Privacy Policies Must be Personalized

    Why Privacy Policies Must be Personalized
    (This was cross-posted.) The best argument for why companies should never simply copy and paste the text of another entities' privacy policy onto their own website can be found in the recent announcement by the FTC of a settlement…
Rank this Week: 1231

LegalTXTS

LegalTXTS

Covers law and technology, with an emphasis on legal issues regarding digital media, privacy and data security, and information management. By Elijah Yip.

http://www.legaltxts.com/
Rank this Week: 1727

Workplace Privacy, Data Management…

Workplace Privacy, Data Management & Security Report

Covers data security, HIPAA, identity theft and workplace privacy. By Jackson Lewis.

http://www.workplaceprivacyreport.com
  • Aug 18

    A Sign of Things to Come for TCPA Defendants?

    A Sign of Things to Come for TCPA Defendants?
    In a recent ruling, the Seventh Circuit abandoned its previous stance as to whether a complete offer of judgment prior to the filing of a class certification motion would moot a class action brought pursuant to the Telephone Consumer…
  • Aug 13

    Credit Monitoring Services Following Data Breach NOT Taxable Income to Employees, IRS Announce

    Credit Monitoring Services Following Data Breach NOT Taxable Income to Employees, IRS Announce
    When an employer is responding to a breach of their employees’ personal information, one of the last things they may think about is whether the value of the credit monitoring or other identity protection services they make…
  • Jul 30

    Nevada Updated Its Definition of Personal Information, Have You?

    Nevada Updated Its Definition of Personal Information, Have You?
    When businesses set out to safeguard “personal information,” a fundamental consideration is what that term means. Likewise, when negotiating a third-party vendor agreement, it typically is not enough to rely on the standard…
Rank this Week: 1332

Fair Competition Law Blog

Fair Competition Law Blog

Covers trade secrets, noncompetes, privacy and security, the Computer Fraud and Abuse Act, trademarks, copyrights, and business torts. By Russell Beck.

http://faircompetitionlaw.com
  • Aug 9

    BRR 50-State Noncompete Chart Updated

    BRR 50-State Noncompete Chart Updated
    The BRR 50 State Noncompete Chart has been substantially updated to reflect numerous developments in statutory or case law since the last draft, as well as clarifications of existing laws. Click here to get the latest…
  • Aug 9

    Arkansas Strengthened Its Noncompete Law

    Arkansas Strengthened Its Noncompete Law
    As of Thursday, August 6, Arkansas noncompete law was statutorily modified by the addition of Ark. Code 4-70-207. With all of the talk about states (like New Hampshire, Hawaii, Massachusetts, Michigan, and Oregon) that have imposed, or…
  • Jun 4

    Proposed Federal Noncompete Law

    Proposed Federal Noncompete Law
    Noncompete law is a creature of state regulation. As such, no surprise, we have 50 variations (really 51, when you factor in DC – albeit 3 states (California, Oklahoma, and North Dakota) prohibit employee noncompetes altogether, so…
Rank this Week: 1488

Global Regulatory Enforcement Law…

Global Regulatory Enforcement Law Blog

Covers antitrust, privacy, international trade, and white color criminal defense. By Reed Smith.

http://www.globalregulatoryenforcementlawblog.com
Rank this Week: 290

Privacy & Information Security…

Privacy & Information Security Law Blog

Provides global privacy and information security law updates and analysis. By Hunton & Williams.

https://www.huntonprivacyblog.com/
Rank this Week: 230

New Media & Technology Law Blog

New Media & Technology Law Blog

Covers intellectual property, data security, online marketing and online commerce. By Proskauer.

http://newmedialaw.proskauer.com
  • Jul 23

    Clickwrap Agreement Available Only Through Hyperlink Enforceable Under New York Law

    Clickwrap Agreement Available Only Through Hyperlink Enforceable Under New York Law
    Last week, the Southern District of New York followed a long line of precedent under New York law and upheld the enforceability of a website clickwrap agreement, granting a website operator’s motion to compel arbitration pursuant to a…
  • Jun 30

    Supreme Court Rejects Google’s Appeal in Java API Dispute

    Supreme Court Rejects Google’s Appeal in Java API Dispute
    On Monday, the Supreme Court denied certiorari in Google’s appeal of the Federal Circuit’s 2014 ruling that that the declaring code and the structure, sequence, and organization of 37 Java API packages are entitled to copyright…
  • Jun 23

    Facial Recognition Technology: Social Media and Beyond, an Emerging Concern

    Facial Recognition Technology: Social Media and Beyond, an Emerging Concern
    This week, a major self-regulatory initiative intended to address privacy concerns associated with facial recognition technology hit a significant stumbling block.  Nine consumer advocacy groups withdrew from the National…
Rank this Week: 2822

Broadband Law Advisor

Broadband Law Advisor

Provides insight and information on the FCC's National Broadband Plan. By Davis Wright Tremaine LLP.

http://www.broadbandlawadvisor.com/
  • Jul 21

    An Oft-Forgotten Detail in Infrastructure Deals – Telecom License

    An Oft-Forgotten Detail in Infrastructure Deals – Telecom License
    Much of the nation’s infrastructure, from energy to transportation, depends upon telecommunications for safe and efficient operation. The facilities that provide such communications services generally are proprietary operations that are…
  • Jun 9

    Open Internet Webinar

    Open Internet Webinar
    June 11, 2015 1:00 PM – 2:00 PM EST CLE   Please join us for an interactive discussion on the FCC’s new “Open Internet” (a.k.a. net neutrality) rules on the eve of their effective date to learn how these sweeping…
  • Jun 9

    Open Internet Rules Become Effective June 12: Impact on Pole Attachment

    Open Internet Rules Become Effective June 12: Impact on Pole Attachment
    On Friday, June 12 – barring a judicial stay – many of the FCC’s “Open Internet” rules will become effective.  A significant consequence of the reclassification of retail broadband Internet access service…
Rank this Week: 2390

Beyond Telecom Law Blog

Beyond Telecom Law Blog

Covers telecom policy, services agreements and data security/privacy. By Keller and Heckman LLP.

http://www.beyondtelecomlawblog.com
  • Jul 20

    M&A Counsel: Don't Overlook Section 310(d) of the Communications Act

    M&A Counsel: Don't Overlook Section 310(d) of the Communications Act
    This year’s mergers-and-acquisitions boom is re-shaping industries and contributing handsomely to the bottom lines of leading investment banks.  One statutory provision triggered in many transactions—not just those involving…
  • May 19

    Open Internet Order: Appellate Advocacy at Full Throttle

    Open Internet Order: Appellate Advocacy at Full Throttle
    The appeals of the Open Internet Order have been consolidated in United States Telecom Assoc. v. FCC, No. 15-1063 (and consolidated cases) (D.C. Cir. filed Mar. 23, 2015).  Thus, the court that decided Verizon v. FCC will rule on the…
  • Mar 30

    The Open Internet Order - In Brief

    The Open Internet Order - In Brief
    The entry summarizes the major elements of the Open Internet Order.  An analysis of the FCC’s policy determinations and reasoning for regulating broadband internet access service as a Title II telecommunications service will be…
Rank this Week: 2794

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
Rank this Week: 4366

Georgia Internet Law

Georgia Internet Law

Provides information and commentary regarding Internet law, e-commerce and technology law, World Wide Web regulation, and intellectual property. By Richardson Sixth, LLC.

http://georgiainternetlaw.com/
  • May 31

    Will Google Fiber Increase Internet Service Provider (ISP) Competition?

    Will Google Fiber Increase Internet Service Provider (ISP) Competition?
    Google Fiber will deliver “Gigabit” Internet and TV connectivity to multiple metro-Atlanta cities as early as 2016, laying out fiber-optic infrastructure across Atlanta, Avondale Estates, Brookhaven, College Park, Decatur, East…
  • Jan 13

    Bitcoin Keeps it Moving

    Bitcoin Keeps it Moving
    Bitcoin, a software-based online-payment system, as well as the synonymous payment unit, was introduced in 2009 by the perhaps pseudonymous Satoshi Nakamoto.  Bitcoin is virtual money exchanged online via any of various apps. …
  • Jul 31

    Visit to Atlanta Tech Village

    Visit to Atlanta Tech Village
    The Richardson Sixth firm made a visit to the Atlanta Tech Village yesterday.  The gathering was sponsored by the Buckhead Club, which shares valuable real estate with the Village as part of the “Buckhead Super-block.”…
Rank this Week: 3321

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • May 15

    The New York Bitlicense is coming: What you need to know

    The New York Bitlicense is coming: What you need to know
    As the final version of the New York BitLicense will roll out within the next 2 weeks, bitcoin startups are gearing up to enter the U.S. market. The post The New York Bitlicense is coming: What you need to know appeared first on .
  • May 12

    What Makes a Brand a Good Trademark?

    What Makes a Brand a Good Trademark?
    A suggestive trademark can be a salutary compromise between marketing and legal considerations. The post What Makes a Brand a Good Trademark? appeared first on .
  • Apr 30

    LLC., C Corp, S Corp: How to Pick a Business Structure

    LLC., C Corp, S Corp: How to Pick a Business Structure
    Few decisions are as important as choosing the right entity for your new startup. This post explores the factors that matter most when making this decision. The post LLC., C Corp, S Corp: How to Pick a Business Structure appeared first on .
Rank this Week: 4600

Workplace Privacy Counsel

Workplace Privacy Counsel

Covers employment related privacy issues. Published by Philip Gordon of Littler Mendelson's Privacy and Data Protection Practice Group.

http://www.littler.com/blog/workplace-privacy-counsel
Rank this Week: 860

Dot Indicia

Dot Indicia

Covers information, privacy and security from a Canadian perspective. By Michael Power.

http://michaelpower.ca
  • Mar 3

    The Law of Cybersecurity & In-House Counsel

    The Law of Cybersecurity & In-House Counsel
    Last month saw an interesting study emerge from the Maurer School of Law at Indiana University. It discusses the current and potential role of lawyers in the area of cybersecurity and the emerging, but still nascent, field of…
  • Feb 8

    The Canadian Privacy Cases of 2014

    The Canadian Privacy Cases of 2014
    As we move more into 2015, I thought I’d put together my own list of the more interesting Canadian privacy cases of 2014. These are judicial decisions so there’s no Commissioner findings or orders here. Some of these…
  • Jan 27

    Revenge Porn & Canadian Law

    Revenge Porn & Canadian Law
    Whenever a new technology arrives, society always plays “catch up” to determine what norms to apply to the use of that technology. It’s probably how we got traffic lights after the advent of automobiles.  One…
Rank this Week: 2509

Inside Privacy

Inside Privacy

Covers global privacy and data security. By Covington & Burling LLP.

http://www.insideprivacy.com
Rank this Week: 793

German IT Law

German IT Law

Provides updates and analysis on German and European IP/IT, technology, media and (open source) software law. By JBB Rechtsanwälte.

http://germanitlaw.com/
  • Feb 13

    German DPAs: Situation regarding consent for cookies is “unacceptable”

    German DPAs: Situation regarding consent for cookies is “unacceptable”
    In February 2015, the German data protection authorities adopted a resolution with the title “Tracking of user behavior on the Internet” (German). In this resolution, the authorities urge the German government to finally transpose…
  • Feb 4

    eBay Again – Your Ended Auctions Can Cause Some Trouble, Too

    eBay Again – Your Ended Auctions Can Cause Some Trouble, Too
    An eBay seller who has used copyright protected photos without the author’s permission and made a corresponding desist declaration is obliged not only to end the auction but rather to delete the pictures from the ended auctions…
  • Jan 30

    ECJ-decision: International jurisdiction in case of copyright infringement on a website

    ECJ-decision: International jurisdiction in case of copyright infringement on a website
    By judgment of 22 January 2015 (C-441/13), the European Court of Justice (ECJ) decided on the interpretation of Art. 5 para 3 of Regulation 44/2001 (Brussels I) on international jurisdiction of courts in a copyright infringement case.…
Rank this Week: 3200

The D: Drive | E-Discovery,…

The D: Drive | E-Discovery, Privacy and All Things Data

Covers privacy, e-discovery, data security, and cloud computing. By Davis LLP.

http://www.davis.ca/en/blog/d-drive/
  • Jan 15

    Update on the Burgeoning International E-Discovery Standard

    Update on the Burgeoning International E-Discovery Standard
    In the D:Drive blog post “An International Standard on E-Discovery is Becoming a Reality”, I introduced the development of an international standard for electronic discovery, “ISO/IEC 27050 – Information technology…
  • Jan 14

    Update on the Burgeoning International E-Discovery Standard

    Update on the Burgeoning International E-Discovery Standard
    In the D:Drive blog post “An International Standard on E-Discovery is Becoming a Reality”, I introduced the development of an international standard for electronic discovery, “ISO/IEC 27050 – Information technology…
  • Nov 18

    Improving Cybersecurity Against Data Breaches: How Information Governance Paves the Way

    Improving Cybersecurity Against Data Breaches: How Information Governance Paves the Way
    The issue of data breach is not exactly new, but in the past it has been relegated to a niche corner of information technology. Increasingly, however, cybersecurity is becoming a critical priority for businesses as a recent surge of…
Rank this Week: 4747

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
  • Dec 10

    DNS Policy Notes for Dec. 10, 2014

    DNS Policy Notes for Dec. 10, 2014
    Topics include the inclusion in the omnibus spending bill language defunding the NTIA's involvement in the IANA functions transition policy development effort, Secretary Strickling's continuing effort to inject fact-based reasoning to the…
  • Nov 24

    DNS Policy Notes for Nov. 24, 2014

    DNS Policy Notes for Nov. 24, 2014
    Topics include Russia's tightening grip on the Internet, Facebook's foray into health content sans GAC advice, the latest twist in the Yoyo.email story, trademark owners on a URS hot streak, and a pair of industry analyses of the new…
  • Nov 21

    DNS Policy Notes for Nov. 21, 2014

    DNS Policy Notes for Nov. 21, 2014
    Topics include the Defending Internet Freedom Act of 2014, coverage of the World Internet Conference, the GAC's inquiry on additional protections for geographic names in new gTLDs, grousing about the NETmundial Initiative, and the defeat of…
Rank this Week: 4705

Data Security Law Journal

Data Security Law Journal

Covers data security, cloud computing, data privacy and anything E. By Al Saikali.

http://www.datasecuritylawjournal.com/
  • Nov 30

    60 Minutes Reports on Payment Card Data Breache

    60 Minutes Reports on Payment Card Data Breache
    Ever wonder how your credit card gets compromised and how the bad guys get your information? This report on tonight’s episode of 60 Minutes provides an overview of what happens from the moment you swipe your card at the point-of-sale…
  • May 26

    Why Every Business Should Care About Florida’s Information Protection Act

    Why Every Business Should Care About Florida’s Information Protection Act
    My last post described what the recently passed Florida Information Protection Act (FIPA) will do.  This post analyzes how FIPA differs from Florida’s existing breach notification law and explains why those differences will hurt or…
  • May 15

    Everything You Need To Know About Florida’s New Data Protection Law

    Everything You Need To Know About Florida’s New Data Protection Law
    The Florida Legislature recently passed the Florida Information Protection Act of 2014 (FIPA).  This post describes the FIPA and analyzes the advantages and disadvantages to businesses governed by the new law.  The FIPA must still…
Rank this Week: 2746

Primary Opinion

Primary Opinion

Covers corporate, employment, IP and privacy news.

http://primaryopinion.com/
  • Nov 27

    Social media marketing for lawyers and law firm

    Social media marketing for lawyers and law firm
    Law firms of all sizes are now embracing social media as a means to showcase expertise and reach new customers. But, opening a Twitter, LinkedIn or Google+ account is only the first part of the process. Here are five pointers for realising…
  • Oct 13

    Legal opinion round up: CJEU’s ruling on registering 3D object trademark

    Legal opinion round up: CJEU’s ruling on registering 3D object trademark
    3D shape marks took another battering at the end of September with the European Court of Justice (CJEU) ruling that such trademarks can be declared invalid if the shape can be linked ‘essentially’ or ‘substantially’ to…
  • Oct 7

    Meet our independent blogger

    Meet our independent blogger
    Our new content portal www.primaryopinion.com draws together the best of the IP industry’s news, commentary and knowledge, so that IP professionals, in-house counsel and business heads can access it on one up-to-date platform. That…
Rank this Week: 5084

SullivanLawNet

SullivanLawNet

Legal news and analysis, with an emphasis on international and domestic intellectual property developments. By Shawn Sullivan.

http://sullivanlaw.net/
  • Sep 22

    Criminal Convictions in Salmonella Case

    Criminal Convictions in Salmonella Case
    A U.S. federal jury convicted three former food company executives of several crimes relating to a 2008-09 outbreak of Salmonella infections resulting from the production and distribution of adulterated peanut butter. See…
  • Sep 9

    3 Months in Spanish Prison for Plant Variety Rights Infringement

    3 Months in Spanish Prison for Plant Variety Rights Infringement
    On July 10, 2014, a criminal court in southwestern Spain sentenced a grower of carnation flowers to three months in prison, plus a fine of € 360 EUR, for infringing plant variety rights in violation of Article 274.3 of the ……
  • Sep 8

    Ecuador: Change Constitution to Protect Traditional Knowledge

    Ecuador: Change Constitution to Protect Traditional Knowledge
      Ecuador’s national government has proposed to amend the country’s constitution to provide special protections against the misappropriation of traditional knowledge and biological diversity. Propuesta de enmiendas…
Rank this Week: 2144

Trials and Tribulations

Trials and Tribulations

Covers the Elvey v. TDAmeritrade case concerning information security, spam and identity theft.

http://caringaboutsecurity.wordpress.com
  • Jul 3

    Advice for TD Ameritrade from Tim Devaney and Tom Stein

    Advice for TD Ameritrade from Tim Devaney and Tom Stein
    TD Ameritrade’s PR flacks think this is bad advice on how to handle haters, I guess.Filed under: Settlement Component
  • Jun 13

    Settlement Valuation

    Settlement Valuation
    Judge Walker repeatedly asked the former class counsel to place a value on the benefits the rejected settlement offered to the class. I think it’s doable, and no one has truly done so, so I’m going to give it a shot. The audit…
  • Jun 13

    Settlement Valuation

    Settlement Valuation
    Judge Walker repeatedly asked the former class counsel to place a value on the benefits the rejected settlement offered to the class. I think it’s doable, and no one has truly done so, so I’m going to give it a shot. The audit…
Rank this Week: 3310

Reasonable Expectation

Reasonable Expectation

Focuses on privacy and data security. By M. Scott Koller.

http://www.reasonableexpectation.com
  • Jun 30

    Are Data Breach Investigations Privileged?

    Are Data Breach Investigations Privileged?
    #150654797 / gettyimages.com Are Data Breach Investigations Privileged? Originally Published on the InfoLaw Group Blog: Over the past year, the number of data breaches has skyrocketed and, as a result, companies are facing increased risk of…
  • Mar 20

    FTC Seeks Public Comment on iKeepSafe’s Proposed Safe Harbor Program Under the Children’s Online Privacy Protection Rule

    FTC Seeks Public Comment on iKeepSafe’s Proposed Safe Harbor Program Under the Children’s Online Privacy Protection Rule
    Internet Keep Safe Coalition (iKeep Safe) has submitted a proposed safe harbor program to the Federal Trade Commission under the the agency’s Children’s Online Privacy Protection Rule. Under 16 C.F.R. 312.11, COPPA safe…
  • Feb 28

    Obama’s new cybersecurity plan a good start

    Obama’s new cybersecurity plan a good start
    I recently authored an article for the Daily Journal on the new cybersecurity framework.  You can read about it by visiting the Daily Journal.  
Rank this Week: 2868