Most Popular Privacy Law Blawgs Expanded View List View

Blogs 1 - 45 of 54
Sort by Popularity | Sort by Name | Sorted by Last Post Date

Global Regulatory Enforcement Law…

Global Regulatory Enforcement Law Blog

Covers antitrust, privacy, international trade, and white color criminal defense. By Reed Smith.

http://www.globalregulatoryenforcementlawblog.com
Rank this Week: 293

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Feb 11

    To Annoy or Not To Annoy: That Was The Question

    To Annoy or Not To Annoy: That Was The Question
    Remembering One of the Original Constitutional Challenges to the CDA Clinton Fein is South African born artist, writer, activist & social media strategist, best known for his Torture exhibition—photographic reenactments based on the…
  • Feb 11

    California Department of Justice Agrees to Stop Skirting Open Meeting Rule

    California Department of Justice Agrees to Stop Skirting Open Meeting Rule
    The California Department of Justice (CADOJ) is ending its practice of holding meetings in ways that impede the public's ability to meaningfully participate in oversight of the state's sprawling network of police databases. The new reforms,…
  • Feb 10

    MPAA May Like Donuts, but They Shouldn’t Be the (Copyright) Police

    MPAA May Like Donuts, but They Shouldn’t Be the (Copyright) Police
    The companies and organizations that run the Internet’s domain name system shouldn’t be in the business of policing the contents of websites, or enforcing laws that can impinge on free speech. The staff of ICANN, the organization…
Rank this Week: 3882

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 4612

German IT Law

German IT Law

Provides updates and analysis on German and European IP/IT, technology, media and (open source) software law. By JBB Rechtsanwälte.

http://germanitlaw.com/
  • Feb 11

    MFM fee recommendations and the license analogy method

    MFM fee recommendations and the license analogy method
    Rightholders are entitled to damages when their photographs are used by third parties who have not been granted the necessary rights of use. Under German copyright law, damages are calculated according to the so-called license analogy method.…
  • Feb 4

    On “warranty” and “Gewährleistung”

    On “warranty” and “Gewährleistung”
    When drafting and negotiating technology agreements of almost any sort between German companies and US or UK companies (or companies from other common law based countries), particularly on software, one of the various Groundhog moments that…
  • Jan 28

    Smart Cars: Industry and German authorities agree on certain aspects of data protection

    Smart Cars: Industry and German authorities agree on certain aspects of data protection
    On 26th January 2016, the conference of the German data protection authorities and German Association of the Automotive Industry (VDA) agreed on a joint statement (PDF, in German) concerning aspects of data protection relating to the usage of…
Rank this Week: 3142

HIPAA Blog

HIPAA Blog

Features a discussion of medical privacy. By Jeffrey P. Drummond.

http://hipaablog.blogspot.com/
  • Feb 11

    Rochester Update: I previously reported on…

    Rochester Update: I previously reported on the NY AG fining University of Rochester Medical Center a pittance ($15,000) for a pretty minor patient privacy violation involving a departing employed provider taking medical records of patients…
  • Feb 5

    Lincare (home health agency) loses: Rarely…

    Lincare (home health agency) loses: Rarely do entities fined by OCR challenge their fines, but when they do, it's an Administrative Law Judge (ALJ) who decides the case.  Lincare was fined by OCR when an employee took home patient records…
  • Jan 29

    This is sad.  6-8 people took pictures of…

    This is sad.  6-8 people took pictures of this woman in the ER.  You'd think it would be common sense not to do that.
Rank this Week: 640

North Carolina Journal of Law &…

North Carolina Journal of Law & Technology

Features legal scholarship in law and technology topics, including intellectual property law, cyberspace law, environmental law, criminal law, health law, and privacy law.

http://ncjolt.org/
Rank this Week: 1782

Inforrm's Blog

Inforrm's Blog

Discusses issues of media law and responsibility with a special focus on libel and privacy law and the balance between the two.

http://inforrm.wordpress.com
Rank this Week: 130

Copyright, Intellectual Property,…

Copyright, Intellectual Property, Computer, Internet, e-Commerce Law

Covers IP/IT law, with a strong focus on copyright and internet law. By Barry Sookman.

http://www.barrysookman.com
  • Feb 11

    Computer and Internet Updates for 2016-02-10

    Computer and Internet Updates for 2016-02-10
    Netflix border crackdown cuts off some customers, but unblocking services fight back https://t.co/7uF1LBbp9i -> Happy Birthday: Warner offers up to $14M to settle copyright dispute https://t.co/xJg8uU7sqs -> Competition Tribunal…
  • Feb 9

    Computer and Internet Updates for 2016-02-08

    Computer and Internet Updates for 2016-02-08
    SCO slapped in latest round of eternal 'Who owns UNIX?' lawsuit https://t.co/YKTwqIL3l4 -> God Can Stop Piracy, Research Finds https://t.co/OBurT4u227 -> No-show cybersquatter liable for $1.2 million | IPPro The Internet news…
  • Feb 8

    Computer and Internet Updates for 2016-02-07

    Computer and Internet Updates for 2016-02-07
    Twitter suspends 125,000 accounts for promoting terrorism, most related to ISIS https://t.co/m5wgw48ZIs -> Courthouse News Service https://t.co/nnTKwyFM2B -> Copyhype Friday’s Endnotes – 02/05/16 https://t.co/qrH06Ow55w…
Rank this Week: 593

Privacy & Security Matters

Privacy & Security Matters

By Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

http://www.privacyandsecuritymatters.com
  • Feb 11

    Judicial Redress Act passes the House with the Senate Amendment

    Judicial Redress Act passes the House with the Senate Amendment
    The amended Judicial Redress Act has passed the House and is on its way to the president to be signed into law.  The Act, which we covered in an earlier blog post, gives citizens  of foreign countries the same rights as US…
  • Feb 10

    Amended version of Judicial Redress Act passes the Senate; now goes back to the House

    Amended version of Judicial Redress Act passes the Senate; now goes back to the House
    The US Senate passed the amended version of the Judicial Redress Act on February 9.  The amendments, which tie the Umbrella Agreement to Safe Harbor 2.0 (now dubbed the US-EU “Privacy Shield”), now go back to the House…
  • Feb 9

    Will free apps soon be dead in Europe?

    Will free apps soon be dead in Europe?
    As we’ve discussed previously, the GDPR significantly limits user consent as a basis for processing personal data.  One interesting question is whether the new rules on consent will kill free apps in Europe.  Free apps…
Rank this Week: 1550

Clancco: Art & Law

Clancco: Art & Law

Covers the relationship between art and law with a focus on intellectual property, nonprofit tax-exempt organizations, free speech, and contemporary art. By Sergio Muñoz Sarmiento.

http://clancco.com/wp
Rank this Week: 247

Privacy and IP Law Blog

Privacy and IP Law Blog

Addresses recent events in trademark, copyright, computer and privacy law. By Christina Frangiosa.

http://privacyandiplawblog.com/
  • Feb 10

    Mobile Device Security Policies for Employers – Small and Large

    Mobile Device Security Policies for Employers – Small and Large
    Placing restrictions on access to Company information, however, should not be limited only to those BYOD devices. Instead, if the Company issues Company-owned devices to employees for use on Company systems, similar ground rules should be…
  • Dec 29

    Common Questions – What’s Involved in Registering a US Trademark?

    Common Questions – What’s Involved in Registering a US Trademark?
    So, you’ve decided to launch a brand name in the U.S. and are contemplating registering it in the U.S. Patent & Trademark Office (“PTO”). What can you expect? Not every application is the same, so there will be…
  • Oct 16

    California Enacts Electronic Communications Privacy Act (CalECPA)

    California Enacts Electronic Communications Privacy Act (CalECPA)
    “For what logical reason should a handwritten letter stored in a desk drawer enjoy more protection from warrantless government surveillance than an email sent to a colleague or a text message to a loved one?” On October 8, 2015,…
Rank this Week: 1222

Workplace Privacy, Data Management…

Workplace Privacy, Data Management & Security Report

Covers data security, HIPAA, identity theft and workplace privacy. By Jackson Lewis.

http://www.workplaceprivacyreport.com
  • Feb 10

    The Status of the EU-U.S. Privacy Shield

    The Status of the EU-U.S. Privacy Shield
    As we previously reported, the EU and U.S. reached agreement last week on the EU-U.S. Privacy Shield to replace the invalidated EU-U.S. Safe Harbor Program for transatlantic data transfers.  While the announcement of the Privacy Shield…
  • Feb 9

    President Seeks $19 Billion and Creates a Commission to Address Cybersecurity

    President Seeks $19 Billion and Creates a Commission to Address Cybersecurity
    President Barack Obama requested $19 billion in his budget for 2017 to address cybersecurity in the United States, $5 billion more than was budgeted for the current year. Today, he issued an Executive Order that will create a commission…
  • Feb 2

    New Safe Harbor Framework!

    New Safe Harbor Framework!
    Compliance and privacy officials all over the U.S. just let out a breath they had been holding since last October when the European Court of Justice invalidated the US/EU Safe Harbor Program. BNA is reporting that negotiators just reached an…
Rank this Week: 1332

Cyberinsurance Law Blog

Cyberinsurance Law Blog

News and comments on Business Law. By Dilworth Paxson L.L.P.

http://www.databreachninja.com/
  • Feb 10

    “Ew Part II: EU/US Reach Privacy Shield Agreement”

    “Ew Part II: EU/US Reach Privacy Shield Agreement”
    It’s been four months since the EU invalidated the Safe Harbor agreement that had been allowing US companies to transfer data into and out of the EU despite the EU’s more stringent privacy laws.  I wrote about that here. In…
  • Jan 27

    “Bark But No Bite for Cybersecurity Act of 2015?”

    “Bark But No Bite for Cybersecurity Act of 2015?”
    Yes, I’m late to the party.  President Obama signed the Cybersecurity Act of 2015 into law over a month ago.  Plenty of ink has already been spilled about it.  The act encourages, but does not require, companies to share…
  • Jan 14

    “Cyberinsured Staying Alive – After Summary Judgment”

    “Cyberinsured Staying Alive – After Summary Judgment”
    There are few cases interpreting stand-alone cyberinsurance policies.  So, when there is a development in one of them, however unrelated to the novel construction issues raised by these new(ish) policies, it’s worth a word. …
Rank this Week: 3875

sobre privacidad y protección de…

sobre privacidad y protección de datos

Spanish language blog about privacy and data protection. By Daniel A. Lopez Carballo.

http://www.dlcarballo.com/
  • Feb 10

    Propiedad Intelectual, protección o tela de araña?

    Propiedad Intelectual, protección o tela de araña?
    Artículo de Noelia Marcos en Comunicar entre abogados. Publicado el 10 de febrero de 2016. El derecho anglosajón y el derecho continental son mundos distintos y entran en conexión cuando los usuarios de…
  • Feb 9

    Innovación y Protección de Datos objeto de análisis en Costa Rica

    Innovación y Protección de Datos objeto de análisis en Costa Rica
    Artículo de El Derecho. Publicado el 9 de enero de 2016. Derecho al Olvido, Drones, Transferencias Internacionales de Datos, el mercado negro de datos personales y el próximo Reglamento Europeo de Protección de Datos…
  • Feb 8

    Derecho al Olvido, drones y transferencia serán analizados en el segundo Foro de Protección de Dato

    Derecho al Olvido, drones y transferencia serán analizados en el segundo Foro de Protección de Dato
    Artículo de Confilegal. Publicado el 8 de enero de 2016. Derecho al Olvido, Drones, Transferencia Transfronteriza de Datos y el Nuevo Reglamento Europeo de Protección de Datos serán algunos de los temas que…
Rank this Week: 2735

Privacy & Information Security…

Privacy & Information Security Law Blog

Provides global privacy and information security law updates and analysis. By Hunton & Williams.

https://www.huntonprivacyblog.com/
Rank this Week: 222

Privacy and Security Law Blog

Privacy and Security Law Blog

Covers biometrics, HIPAA, identity theft, PATRIOT Act, phishing and more. By Davis Wright Tremaine.

http://www.privsecblog.com/
  • Feb 9

    Advisory Alert: Second CMP Assessed for HIPAA Violation

    Advisory Alert: Second CMP Assessed for HIPAA Violation
    Do You Know Where Your Data Is? For only the second time in its history, the U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) has imposed a civil money penalty (CMP) on a covered entity for allegedly violating…
  • Feb 8

    Advisory Alert: FCC CPNI Certification due March 1

    Advisory Alert: FCC CPNI Certification due March 1
    Upcoming Open Internet Rules may soon expand CPNI-Type Obligations to Broadband Last week the Federal Communications Commission (FCC) issued its annual CPNI “Enforcement Advisory,” reminding telecommunications and interconnected…
  • Feb 8

    Is Privacy Tourism Coming to Britain?

    Is Privacy Tourism Coming to Britain?
    The United Kingdom is known for Downton Abbey, earl grey tea and libel tourism.  Yes, there are have been countless lawsuits over free speech transcending continents, but as of May 2012 the British government overhauled such libel…
Rank this Week: 1039

Threat Level

Threat Level

Covers privacy, crime and security online. From Wired News.

http://www.wired.com/threatlevel
  • Feb 9

    How to Hack the Power Grid Through Home Air Conditioner

    How to Hack the Power Grid Through Home Air Conditioner
    Researchers show how hackers can manipulate the remote on-off device installed on some air conditioners to cause a blackout. The post How to Hack the Power Grid Through Home Air Conditioners appeared first on WIRED.
  • Feb 9

    Donate Your Old USB Drives to Fight North Korean Brainwashing

    Donate Your Old USB Drives to Fight North Korean Brainwashing
    The thumb drives gathering dust in your desk drawer could help to open one of the world's most closed countries. The post Donate Your Old USB Drives to Fight North Korean Brainwashing appeared first on WIRED.
  • Feb 8

    It’s Been 20 Years Since This Man Declared Cyberspace Independence

    It’s Been 20 Years Since This Man Declared Cyberspace Independence
    John Perry Barlow stands by his Declaration of Independence of Cyberspace, the libertarian idea that lit up the Internet on this day in 1996. The post It’s Been 20 Years Since This Man Declared Cyberspace Independence appeared first on…
Rank this Week: 38

Chronicle of Data Protection

Chronicle of Data Protection

Covers consumer privacy, data security, HIPAA, financial privacy and EU privacy. By Hogan Lovells.

http://www.hldataprotection.com
  • Feb 8

    European Multi-Stakeholder Group Releases Connected Vehicles Report

    European Multi-Stakeholder Group Releases Connected Vehicles Report
    Connected cars can generate large volumes of data, including data on engine performance, location, and driver behaviour. The European Commission has convened multi-stakeholder groups to figure out how to organize access to that data in a…
  • Feb 4

    Russia Releases Data Localization Inspection Plan for 2016

    Russia Releases Data Localization Inspection Plan for 2016
    In mid-January, the territorial divisions of Russia’s Data Protection Authority, Roskomnadzor, uploaded their 2016 plans for conducting inspections of local companies’ compliance with Russia’s data localization requirements,…
  • Feb 3

    International Data Transfers – The Uncertainty Continue

    International Data Transfers – The Uncertainty Continue
    Following the announcement by the European Commission of the newly agreed EU-US Privacy Shield, the missing piece of the jigsaw was the Article 29 Working Party's stance on the adequacy of the existing mechanisms in place—in particular,…
Rank this Week: 1064

Broadband Law Advisor

Broadband Law Advisor

Provides insight and information on the FCC's National Broadband Plan. By Davis Wright Tremaine LLP.

http://www.broadbandlawadvisor.com/
  • Feb 8

    Advisory Alert: Annual FCC CPNI Certification Due by March 1, 2016

    Advisory Alert: Annual FCC CPNI Certification Due by March 1, 2016
    Upcoming Open Internet Rules Will Soon Expand CPNI-Type Obligations to Broadband This is to remind our clients that the Federal Communications Commission’s (FCC) rules require every telecommunications and interconnected VoIP service…
  • Feb 4

    FCC Releases 2016 Broadband Progress Report

    FCC Releases 2016 Broadband Progress Report
    According to the Federal Communications Commission, 90 percent of Americans have access to broadband Internet access service at the FCC’s benchmark speeds of 25 Mbps for downloads/3 Mbps for uploads. But the FCC also found that 34…
  • Jan 14

    FCC Wireless Shot Clock Trumps Complex Local Processes, Says First Circuit While Addressing Section 332 “Final Action” Requirement

    FCC Wireless Shot Clock Trumps Complex Local Processes, Says First Circuit While Addressing Section 332 “Final Action” Requirement
    On Jan. 8, 2016, in Global Tower Assets, LLC v. Town of Rome, the U.S. Court of Appeals for the First Circuit held that a wireless permit applicant must go through all administrative appeals required by local law before there is a…
Rank this Week: 2312

Information Technology Law Blog

Information Technology Law Blog

Covers social media, e-discovery, privacy, and intellectual property. By Foster Swift Collins & Smith PC.

http://www.michiganitlaw.com/
Rank this Week: 3453

New Media & Technology Law Blog

New Media & Technology Law Blog

Covers intellectual property, data security, online marketing and online commerce. By Proskauer.

http://newmedialaw.proskauer.com
  • Feb 5

    Website HTML Is Copyrightable, Even If Look and Feel Is Not

    Website HTML Is Copyrightable, Even If Look and Feel Is Not
    In a notable ruling last month, a California district court ruled that the HTML underlying a custom search results page of an online advertising creation platform is copyrightable. In Media.net Advertising FZ-LLC v. Netseer Inc., No. 14-3883,…
  • Jan 14

    FTC Releases Big Data Report Outlining Risks, Benefits and Legal Hurdle

    FTC Releases Big Data Report Outlining Risks, Benefits and Legal Hurdle
    The big data revolution is quietly chugging along:  devices, sensors, websites and networks are collecting and producing significant amounts of data, the cost of data storage continues to plummet, public and private sector interest in…
  • Jan 4

    FTC Issues Enforcement Policy Statement on Native Advertising in New Media

    FTC Issues Enforcement Policy Statement on Native Advertising in New Media
    Digital media marketers are aggressively increasing the use of so-called sponsored content, or native advertising to reach new customers.  Particularly with the growing use of ad blockers on web and mobile browsers, marketers have sought…
Rank this Week: 2749

Beyond Telecom Law Blog

Beyond Telecom Law Blog

Covers telecom policy, services agreements and data security/privacy. By Keller and Heckman LLP.

http://www.beyondtelecomlawblog.com
  • Feb 5

    Historical Year For America And FirstNet

    Historical Year For America And FirstNet
    There could be two significant historical events this November. On November 8, 2016 the American people will elect the 45th President of the United States. One week earlier, on November 1st, the First Responder Network Authority, commonly…
  • Jan 21

    Enterprise Customers and the FCC--Part 2

    Enterprise Customers and the FCC--Part 2
    For better or worse, you decide, the FCC is challenged when adopting policies or making decisions that impact enterprise customers.  This is the second of two entries on enterprise customers and the FCC. IP Transition.  Responding…
  • Jan 12

    Enterprise Customers and the FCC--Part 1

    Enterprise Customers and the FCC--Part 1
    For better or worse, you decide, the FCC is challenged when adopting policies or making decisions that impact enterprise customers.  This is the first of two entries on enterprise customers and the FCC.Open Internet Order.  With no…
Rank this Week: 2744

techblawg

techblawg

Focuses primarily on issues involving the intersection of law, technology and finance. By David Ma.

http://david-ma.ca/
  • Feb 4

    weekly tweet roundup

    weekly tweet roundup
    fsco approves aviva's insurance offering for uberx drivers. interesting. h/t @thetastate https://t.co/ODX1hUzELG 2016-02-03 tattoo lawsuit raises some interesting copyright and moral rights issues. https://t.co/7cCkzKH6Jn 2016-02-04 [Click on…
  • Jan 28

    weekly tweet roundup

    weekly tweet roundup
    nsa chief endorses end-to-end encryption. guess they finally got the quantum computer working. https://t.co/kq2yHPrRvv 2016-01-22 supreme court of canada launches twitter acct. all future decisions to be 140 characters or less. h/t…
  • Jan 21

    weekly tweet roundup

    weekly tweet roundup
    developer asserts that bitcoin will fail due to capacity limits and the intro of return by fee. somewhat worrisome. https://t.co/D4YZh8p403 2016-01-15 ms develops 152 layer neural net with computer assisted modelling optimization. i.e. it's…
Rank this Week: 565

Security, Privacy and The Law

Security, Privacy and The Law

Covers information security and privacy issues. By Foley Hoag LLP.

http://www.securityprivacyandthelaw.com
Rank this Week: 1963

Privacy and Data Security Law

Privacy and Data Security Law

Covers the creation, collection, use, destruction and security of data. By Dentons.

http://www.privacyanddatasecuritylaw.com/
  • Feb 4

    Article 29 WP response to “Privacy Shield”

    Article 29 WP response to “Privacy Shield”
    The Article 29 Working Party (WP 29) published their initial response to the new Privacy Shield yesterday. Here’s the good news: WP 29 welcomes the conclusion of negotiations by the deadline (actually, the deal was announced on Tuesday…
  • Feb 2

    EU-US Privacy Shield Announced

    EU-US Privacy Shield Announced
    Today, political agreement has been reached on the new solution to replace the Safe Harbor regime, the so-called “EU-US Privacy Shield”. The College of Commissioners have approved the new framework which, according to the European…
  • Feb 1

    No deal yet on Safe Harbor 2.0!

    No deal yet on Safe Harbor 2.0!
     ‘Hot off the press’ as Commissioner Jourova continues to give her statement to the European Parliament: there is no deal yet on Safe Harbor 2.0.  The Commissioner outlined the current state of play on the key…
Rank this Week: 1876

Privacy Law Blog

Privacy Law Blog

Covers data privacy, identity theft, invasion of privacy, and national security legal issues. By Proskauer Rose LLP.

http://privacylaw.proskauer.com/
  • Feb 3

    Safe Harbor 2.0 Agreement Reached; New Program to be Named “Privacy Shield”

    Safe Harbor 2.0 Agreement Reached; New Program to be Named “Privacy Shield”
    Courtney Bowman Yesterday, the European Commission announced that EU and US officials had reached an agreement to implement a program known as the EU-US Privacy Shield.  Privacy Shield is designed to be the successor to the Safe Harbor…
  • Jan 29

    New Safe Harbor Deal Possible by February 1

    New Safe Harbor Deal Possible by February 1
    Courtney Bowman Companies anxiously watching their calendars to see if a new Safe Harbor program will be introduced before the end of January may get their wish: yesterday, a European Commission official announced that the Commission will…
  • Jan 26

    Baby You Can Drive My Car

    Baby You Can Drive My Car
    Adam Waks Consumers can expect many benefits from their cars’ increased data collection programs, running the gamut from simple location services like GPS and OnStar to “networked” cars that can communicate their location…
Rank this Week: 1000

Data Privacy Monitor

Data Privacy Monitor

Covers data privacy, security and social media subjects. By Baker Hostetler.

http://www.dataprivacymonitor.com/
  • Feb 3

    Safe Harbor Part Deux: The Privacy Shield

    Safe Harbor Part Deux: The Privacy Shield
    This week began like many. An arbitrary deadline came and went – this one, January 31, 2016, was set by the Article 29 Working Party for European and United States regulators to address the void created by the invalidation of the Safe…
  • Feb 2

    Legal Developments in Connected Car Arena Provide Glimpse of Privacy and Data Security Regulation in Internet of Thing

    Legal Developments in Connected Car Arena Provide Glimpse of Privacy and Data Security Regulation in Internet of Thing
    With the holiday season in the rear view, automobiles equipped with the newest technology connecting carmakers with their vehicles, vehicles with the world around them, and drivers with the consumer marketplace – Connected Cars –…
  • Jan 28

    Encryption: The Battle Between Privacy and Counterterrorism

    Encryption: The Battle Between Privacy and Counterterrorism
    For privacy advocates, it is universally accepted that encryption is a very good thing. After all, encrypted data is deemed a safe harbor under HIPAA and state breach-notification laws, providing an “out” from potential fines and…
Rank this Week: 1197

Advertising Law Blog

Advertising Law Blog

Provides commentary and news on developing legal issues in advertising, promotional marketing, Internet, and privacy law. By Olshan Frome Wolosky LLP.

http://www.olshanlaw.com/blogs-Advertising-Law-Blog
  • Feb 3

    Massachusetts District Court Dismisses Class Action Alleging Deceptive Pricing by Kohl’

    Massachusetts District Court Dismisses Class Action Alleging Deceptive Pricing by Kohl’
    Retailers across the country have been facing  private class action lawsuits alleging that certain discount pricing practices constitute false advertising based on the allegation that the discount is fictitious.  Discount retailer,…
  • Feb 3

    Retailer Agrees To Eight-Figure Settlement Over Text Messaging Campaign

    Retailer Agrees To Eight-Figure Settlement Over Text Messaging Campaign
    Abercrombie & Fitch sent text message to cell phone’s prior owner Read More › Tags: Class Action Lawsuit, FCC, TCPA, Text Message Ads, Text Messages, Text Messenger
  • Feb 1

    New EU-US Data Safe Harbor Agreement

    New EU-US Data Safe Harbor Agreement
    Calmer seas are on the horizon for businesses transferring personal data from the EU to the U.S. as negotiators are reported to have agreed today to a new framework for data transfers. Read More › Tags: Data Transfers,…
Rank this Week: 1386

Socially Aware Blog

Socially Aware Blog

Covers the law and business of social media. By Morrison Foerster.

http://www.sociallyawareblog.com/
  • Feb 3

    Consumer Privacy Survey Result

    Consumer Privacy Survey Result
    As Socially Aware readers know, privacy presents real business risks that have the potential to negatively impact a company’s bottom line, from the legal fees associated with a data breach to revenue declines stemming from a loss of…
  • Feb 2

    The Internet of Things: Evaluating the Interplay of Interoperability, Industry Standards and related IP Licensing Approache

    The Internet of Things: Evaluating the Interplay of Interoperability, Industry Standards and related IP Licensing Approache
    The financial impact of the Internet of Things on the global economy will be significantly affected by interoperability. A 2015 McKinsey Global Institute report indicated that, “[on] average, interoperability is necessary to create 40…
  • Jan 28

    Now Available: The January Issue of Our Socially Aware Newsletter

    Now Available: The January Issue of Our Socially Aware Newsletter
    The latest issue of our Socially Aware newsletter is now available here. In this issue of Socially Aware, our Burton Award-winning guide to the law and business of social media, we offer practical tips to help ensure…
Rank this Week: 1412

Information Law Group

Information Law Group

Covers advertising law, privacy, information security and intellectual property.

http://www.infolawgroup.com/
  • Feb 2

    The New “EU-US Privacy Shield”

    The New “EU-US Privacy Shield”
    Since the European Court of Justice invalidated the fifteen-year-old EU-US “Safe Harbor Privacy Framework” last October, thousands of US companies have been awaiting the results of negotiations between the US government and the…
  • Jan 28

    Businesses Take Heed: FTC’s Recent Report, Conference Signal Big Data’s the Big Deal in 2016

    Businesses Take Heed: FTC’s Recent Report, Conference Signal Big Data’s the Big Deal in 2016
    FTC Kicks Off New Year with New Report on Growing Use of Big Data Analytics Across All Industries Without so much as a week of 2016 having lapsed, the Federal Trade Commission (“FTC” or “Commission”) released a new…
  • Jan 6

    FTC Releases Policy Statement and Business Guides on Native Advertising

    FTC Releases Policy Statement and Business Guides on Native Advertising
    Just before 2015 came to an end, the Federal Trade Commission (“FTC”) released its much anticipated Enforcement Policy Statement on Deceptively Formatted Advertisements (“Policy Statement”) along with informal,…
Rank this Week: 1094

Fair Competition Law Blog

Fair Competition Law Blog

Covers trade secrets, noncompetes, privacy and security, the Computer Fraud and Abuse Act, trademarks, copyrights, and business torts. By Russell Beck.

http://faircompetitionlaw.com
  • Jan 31

    Trade Secret | Noncompete – Issues and Cases in the News – January Update

    Trade Secret | Noncompete – Issues and Cases in the News – January Update
    Having looked back over the last couple of years, I realized that I have failed to provide enough updates on issues and cases making trade secrets | noncompete news. So, I am going to try to resume those efforts moving forward.…
  • Jan 30

    2015 Trade Secrets and Noncompetes Year in Review

    2015 Trade Secrets and Noncompetes Year in Review
    In anticpation of speaking at the Boston Bar Association’s 16th Annual Intellectual Property Year in Review earlier this month, with some assistance from several of my colleagues (Nicole Daly, Hannah Joseph, and Will…
  • Jan 11

    Trade Secret and Noncompete Survey – National Case Graph 2016

    Trade Secret and Noncompete Survey – National Case Graph 2016
    As regular readers of this blog know, several years ago, I became curious to see how many reported trade secret / noncompete decisions were issued each year in all federal and state courts around the country. So, I did a “back of the…
Rank this Week: 1472

Dot Indicia

Dot Indicia

Covers information, privacy and security from a Canadian perspective. By Michael Power.

http://michaelpower.ca
  • Jan 27

    Another New Privacy Tort for Ontario

    Another New Privacy Tort for Ontario
    Last week saw a rather striking decision issued by the Ontario Superior Court of Justice. 2102 saw the tort of “intrusion upon seclusion” recognized; in 2016, we now have the tort of “public disclosure of private…
  • Jan 19

    New Privacy Tort Empowers “Revenge Porn” Victim

    New Privacy Tort Empowers “Revenge Porn” Victim
    Manitoba’s Intimate Image Protection Act came into force on 15 January 2016. The statute does something that I think is especially noteworthy – it creates a new privacy tort concerning the “non-consensual distribution of…
  • Mar 3

    The Law of Cybersecurity & In-House Counsel

    The Law of Cybersecurity & In-House Counsel
    Last month saw an interesting study emerge from the Maurer School of Law at Indiana University. It discusses the current and potential role of lawyers in the area of cybersecurity and the emerging, but still nascent, field of…
Rank this Week: 2469

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
  • Dec 2

    Minimizing the damages of health care data breache

    Minimizing the damages of health care data breache
    Our colleagues over at Antitrust Law Source recently published a podcast on the inevitable health care data breach and how you can lessen the damages. Some key issues include: when to review data security policies, how to prepare for a…
  • Sep 23

    PETA sues on behalf of selfie monkey

    PETA sues on behalf of selfie monkey
    Remember the dispute of copyright ownership over a selfie taken by a macaque in 2011? I wrote about it earlier this year when the owner of the camera that was used to take this shot sued Blurb, Inc., for unauthorized use of copyright. Well,…
  • Jul 28

    OSHA Nano-Workplace Factsheet

    OSHA Nano-Workplace Factsheet
    OSHA’s factsheet for working safely nanomaterials in the workplace suggests including the following basics in worker training and instruction: • Identification of nanomaterials the employer uses and the processes in which they are…
Rank this Week: 4272

CyberLaw Currents

CyberLaw Currents

Covers technology news headlines, statutes, and case law developments related to e-commerce, privacy, advertising, and intellectual property. Edited by Glen K. Westerback.

http://www.cyberlawcurrents.com
  • Dec 2

    Hello world!

    Hello world!
    Welcome to WordPress. This is your first post. Edit or delete it, then start writing!
  • Jul 3

    Distinguishing Advertising from Search Result

    Distinguishing Advertising from Search Result
    As part of its ongoing effort to provide guidance to digital advertisers (including the recent release of the updated digital advertising guidance, “dot.com Disclosures: How to Make Effective Disclosures in Digital Advertising“),…
  • May 17

    FTC Answers 92 Questions about its Revised Children’s Online Privacy Protection Act Rule

    FTC Answers 92 Questions about its Revised Children’s Online Privacy Protection Act Rule
    In an effort to provide clarity on it its revised Children’s Online Privacy Protection Rule (“Rules”), the FTC recently published a list of  Frequently Asked Questions (“FAQs“) with information on how to…
Rank this Week: 2117

Georgia Internet Law

Georgia Internet Law

Provides information and commentary regarding Internet law, e-commerce and technology law, World Wide Web regulation, and intellectual property. By Richardson Sixth, LLC.

http://georgiainternetlaw.com/
  • Nov 28

    Bitcoin and Consumer Protection Measures in Digital Currency

    Bitcoin and Consumer Protection Measures in Digital Currency
    This is another in a series of posts focused on the first state regulation of cryptocurrency businesses.  Ostensibly, depending on one’s opinion, the New York BitLicense regulation of bitcoin (and digital currency businesses…
  • Nov 2

    The Bitcoin Business State License Requirement: BitLicense

    The Bitcoin Business State License Requirement: BitLicense
    The last post in this series by Atlanta Bitcoin attorney Mark Richardson VI familiarized the reader with the regulatory vernacular of the New York BitLicense law now in effect.  Let’s now examine to whom exactly that license…
  • Oct 19

    BitLicense Legal Regulations: What are We Talking About?

    BitLicense Legal Regulations: What are We Talking About?
    Here’s the first installment of a Crypto-Counsel ℠ series on the New York State Department of Financial Services (“NYDFS“) “BitLicense” regulations applicable to digital currency businesses (the…
Rank this Week: 3256

Business Litigation Info

Business Litigation Info

Covers business litigation, intellectual property, data security, and advertising and media. By Faruki Ireland & Cox P.L.L.

http://www.businesslitigationinfo.com/
  • Nov 24

    NOVEMBER 2015 FI&C WEBSITE NEWSLETTER

    NOVEMBER 2015 FI&C WEBSITE NEWSLETTER
    *     On September 17, 2015, Jeff Ireland and Jade Smarda, obtained a temporary restraining order on behalf of a local financial services firm in a trade secrets case. *     Jeff Sharkey and…
  • Nov 20

    Be Cautious When Social Networking is All “Atwitter “at Your Workplace

    Be Cautious When Social Networking is All “Atwitter “at Your Workplace
    We use social media all the time. Make it a point during the day to notice how often you see a friend or colleague checking a Facebook update or sending a tweet (or giving you a three-star rating on the new Peeple app).  People are on…
  • Nov 16

    Cybersecurity Information Sharing Act: The Devil Lurks and the Road to His House Appears Well Paved

    Cybersecurity Information Sharing Act: The Devil Lurks and the Road to His House Appears Well Paved
    Best Laid Plans. They say the devil is in the details. One might say that is most certainly the case with the recently advanced version of the Cybersecurity Information Sharing Act (“CISA”) that recently passed the U.S. Senate by…
Rank this Week: 1421

LegalTXTS

LegalTXTS

Covers law and technology, with an emphasis on legal issues regarding digital media, privacy and data security, and information management. By Elijah Yip.

http://www.legaltxts.com/
Rank this Week: 1712

Data Breach Lawyer Blog

Data Breach Lawyer Blog

Covers intellectual property law. By Raines Feldman.

http://www.databreachlawyerblog.com/
  • Nov 17

    What the Shift to Chip-Cards Means for Your Small Busine

    What the Shift to Chip-Cards Means for Your Small Busine
    Accepting credit cards just became a riskier and more expensive proposition for small business owners. As a law firm specializing in data breach prevention and response, we know that the United States lags behind comparable markets globally…
  • Sep 3

    Data Breach Incidents and Attorney Client Privilege

    Data Breach Incidents and Attorney Client Privilege
    Data Breach incidents are a continuing threat to modern commercial activities.  Almost every company of every size is affected by data breach.  Large companies are obvious targets due to the size, nature and scope of their data…
  • Sep 3

    Data Breach Incidents and Attorney Client Privilege

    Data Breach Incidents and Attorney Client Privilege
    Data Breach incidents are a continuing threat to modern commercial activities.  Almost every company of every size is affected by data breach.  Large companies are obvious targets due to the size, nature and scope of their data…
Rank this Week: 4756

SullivanLawNet

SullivanLawNet

Legal news and analysis, with an emphasis on international and domestic intellectual property developments. By Shawn Sullivan.

http://sullivanlaw.net/
  • Oct 13

    Yoga Sequence not Protected by Copyright, says 9th Circuit

    Yoga Sequence not Protected by Copyright, says 9th Circuit
    On October 8, 2015, the U.S. Court of Appeals for the Ninth Circuit ruled that a sequence of yoga poses and breathing exercises was not entitled to copyright protection under the U.S. Copyright Act. Bikram’s Yoga College of India v.…
  • Oct 11

    Common Catalogue Listing not Proof of Plant Variety Rights Ownership

    Common Catalogue Listing not Proof of Plant Variety Rights Ownership
    In July 2015, a court in the city of Milan, Italy held that the Italian subsidiary of BASF failed to establish its ownership of plant variety rights in a lawsuit that BASF brought against a local company. BASF Italia S.p.A. … Continue…
  • Oct 11

    Canadian Supreme Court: Claimants May Seek to Enforce Ecuadorian Judgment against Chevron in Ontario

    Canadian Supreme Court: Claimants May Seek to Enforce Ecuadorian Judgment against Chevron in Ontario
    On 4 September 2015, Canada’s highest court dismissed arguments by US petrochemical company Chevron that Canadian courts cannot hear proceedings to enforce the US$ 9.51 billion judgment of an Ecuadorian court against it. Chevron…
Rank this Week: 2112

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • May 15

    The New York Bitlicense is coming: What you need to know

    The New York Bitlicense is coming: What you need to know
    As the final version of the New York BitLicense will roll out within the next 2 weeks, bitcoin startups are gearing up to enter the U.S. market. The post The New York Bitlicense is coming: What you need to know appeared first on .
  • May 12

    What Makes a Brand a Good Trademark?

    What Makes a Brand a Good Trademark?
    A suggestive trademark can be a salutary compromise between marketing and legal considerations. The post What Makes a Brand a Good Trademark? appeared first on .
  • Apr 30

    LLC., C Corp, S Corp: How to Pick a Business Structure

    LLC., C Corp, S Corp: How to Pick a Business Structure
    Few decisions are as important as choosing the right entity for your new startup. This post explores the factors that matter most when making this decision. The post LLC., C Corp, S Corp: How to Pick a Business Structure appeared first on .
Rank this Week: 4550

Workplace Privacy Counsel

Workplace Privacy Counsel

Covers employment related privacy issues. Published by Philip Gordon of Littler Mendelson's Privacy and Data Protection Practice Group.

http://www.littler.com/blog/workplace-privacy-counsel
Rank this Week: 850

Inside Privacy

Inside Privacy

Covers global privacy and data security. By Covington & Burling LLP.

http://www.insideprivacy.com
Rank this Week: 790

The D: Drive | E-Discovery,…

The D: Drive | E-Discovery, Privacy and All Things Data

Covers privacy, e-discovery, data security, and cloud computing. By Davis LLP.

http://www.davis.ca/en/blog/d-drive/
  • Jan 15

    Update on the Burgeoning International E-Discovery Standard

    Update on the Burgeoning International E-Discovery Standard
    In the D:Drive blog post “An International Standard on E-Discovery is Becoming a Reality”, I introduced the development of an international standard for electronic discovery, “ISO/IEC 27050 – Information technology…
  • Jan 14

    Update on the Burgeoning International E-Discovery Standard

    Update on the Burgeoning International E-Discovery Standard
    In the D:Drive blog post “An International Standard on E-Discovery is Becoming a Reality”, I introduced the development of an international standard for electronic discovery, “ISO/IEC 27050 – Information technology…
  • Nov 18

    Improving Cybersecurity Against Data Breaches: How Information Governance Paves the Way

    Improving Cybersecurity Against Data Breaches: How Information Governance Paves the Way
    The issue of data breach is not exactly new, but in the past it has been relegated to a niche corner of information technology. Increasingly, however, cybersecurity is becoming a critical priority for businesses as a recent surge of…
Rank this Week: 4520

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
  • Dec 10

    DNS Policy Notes for Dec. 10, 2014

    DNS Policy Notes for Dec. 10, 2014
    Topics include the inclusion in the omnibus spending bill language defunding the NTIA's involvement in the IANA functions transition policy development effort, Secretary Strickling's continuing effort to inject fact-based reasoning to the…
  • Nov 24

    DNS Policy Notes for Nov. 24, 2014

    DNS Policy Notes for Nov. 24, 2014
    Topics include Russia's tightening grip on the Internet, Facebook's foray into health content sans GAC advice, the latest twist in the Yoyo.email story, trademark owners on a URS hot streak, and a pair of industry analyses of the new…
  • Nov 21

    DNS Policy Notes for Nov. 21, 2014

    DNS Policy Notes for Nov. 21, 2014
    Topics include the Defending Internet Freedom Act of 2014, coverage of the World Internet Conference, the GAC's inquiry on additional protections for geographic names in new gTLDs, grousing about the NETmundial Initiative, and the defeat of…
Rank this Week: 4680

Data Security Law Journal

Data Security Law Journal

Covers data security, cloud computing, data privacy and anything E. By Al Saikali.

http://www.datasecuritylawjournal.com/
  • Nov 30

    60 Minutes Reports on Payment Card Data Breache

    60 Minutes Reports on Payment Card Data Breache
    Ever wonder how your credit card gets compromised and how the bad guys get your information? This report on tonight’s episode of 60 Minutes provides an overview of what happens from the moment you swipe your card at the point-of-sale…
  • May 26

    Why Every Business Should Care About Florida’s Information Protection Act

    Why Every Business Should Care About Florida’s Information Protection Act
    My last post described what the recently passed Florida Information Protection Act (FIPA) will do.  This post analyzes how FIPA differs from Florida’s existing breach notification law and explains why those differences will hurt or…
  • May 15

    Everything You Need To Know About Florida’s New Data Protection Law

    Everything You Need To Know About Florida’s New Data Protection Law
    The Florida Legislature recently passed the Florida Information Protection Act of 2014 (FIPA).  This post describes the FIPA and analyzes the advantages and disadvantages to businesses governed by the new law.  The FIPA must still…
Rank this Week: 2703