Most Popular Privacy Law Blawgs Expanded View List View

Blogs 1 - 45 of 56
Sort by Popularity | Sort by Name | Sorted by Last Post Date

Inforrm\'s Blog

Inforrm\'s Blog

Discusses issues of media law and responsibility with a special focus on libel and privacy law and the balance between the two.

https://inforrm.wordpress.com/
Rank this Week: 299

Broadband Law Advisor

Broadband Law Advisor

Provides insight and information on the FCC's National Broadband Plan. By Davis Wright Tremaine LLP.

http://www.broadbandlawadvisor.com/
  • Feb 23

    FCC Announces Details for Mobility Fund Phase II

    FCC Announces Details for Mobility Fund Phase II
    The FCC adopted an order today that establishes Phase II of the Mobility Fund.  As we have previously reported, the FCC established the Mobility Fund to provide universal service subsidies to help expand and preserve 4G LTE mobile…
  • Feb 23

    FCC Finalizes Criteria for CAF Phase II Auction

    FCC Finalizes Criteria for CAF Phase II Auction
    Today the FCC approved an order that moves the nearly two billion dollar Connect America Fund (CAF) Phase II Auction competitive bidding process forward.   As we have previously reported, the Phase II auction will provide support…
  • Feb 23

    FCC Approves ILEC Shift to GAAP Accounting, Mitigates Pole Rate Impact

    FCC Approves ILEC Shift to GAAP Accounting, Mitigates Pole Rate Impact
    At today’s open meeting the FCC adopted a Report and Order that streamlines and eliminates Part 32 accounting requirements governing price-cap carriers, allowing them instead to rely on GAAP accounting methods and thus eliminate the…
Rank this Week: 4855

HIPAA Blog

HIPAA Blog

Features a discussion of medical privacy. By Jeffrey P. Drummond.

http://hipaablog.blogspot.com/
  • Feb 23

    Interesting Question: HIPAA lawyer Adam…

    Interesting Question: HIPAA lawyer Adam Greene was interviewed at HIMSS, and noted that HHS is close to publishing the regulations implementing the HITECH revisions that allow affected individuals to get a share of the fines levied by OCR.…
  • Feb 22

    2 Healthcare Data Breaches up 40%, Affect…

    2 Healthcare Data Breaches up 40%, Affect 25% of Consumers: According to the Identity Theft Research Center, Healthcare represents one third of all data breaches, and the number of reported breaches has risen from 780 in 2015 to 1093 last…
  • Feb 17

    Another Day, Another Monster Fine: This…

    Another Day, Another Monster Fine: This time it's Memorial Healthcare System (Florida), with a $5.5 million fine for not following access controls and allowing terminated employees to continue accessing medical records after being terminated.…
Rank this Week: 2381

Socially Aware Blog

Socially Aware Blog

Covers the law and business of social media. By Morrison Foerster.

http://www.sociallyawareblog.com/
  • Feb 23

    Google Ordered to Comply with Warrant for Foreign-Stored User Data

    Google Ordered to Comply with Warrant for Foreign-Stored User Data
    In a major development for cloud and other data storage providers, and further complicating the legal landscape for the cross-border handling of data, a Federal Magistrate Judge in the Eastern District of Pennsylvania ruled for the Department…
  • Feb 16

    The Hague District Court’s WhatsApp Decision Creates Concerns for Mobile App Developer

    The Hague District Court’s WhatsApp Decision Creates Concerns for Mobile App Developer
    Can the mere offering of a mobile app subject the provider of such app to the privacy laws of countries in the European Union (EU)—even if the provider does not have any establishments or presence in the EU? The answer from the District…
  • Feb 14

    FTC Report Reinforces the Rules for Cross-Device Tracking

    FTC Report Reinforces the Rules for Cross-Device Tracking
    Well over a year after holding a workshop addressing privacy issues associated with cross-device tracking, Federal Trade Commission (FTC) staff have issued a report. The report sets the stage by describing how cross-device tracking…
Rank this Week: 3881

North Carolina Journal of Law &…

North Carolina Journal of Law & Technology

Features legal scholarship in law and technology topics, including intellectual property law, cyberspace law, environmental law, criminal law, health law, and privacy law.

http://ncjolt.org/
  • Feb 23

    Microsoft is Fighting to Protect Your Secret

    Microsoft is Fighting to Protect Your Secret
    It seems the United States Government cannot stop secretly spying on its citizens, but Microsoft, and other service providers, may be paving the way to at least remove some of the secrecy. U.S. District Court Judge James Robart—recently…
  • Feb 22

    Helping Astronauts Go to the Bathroom in Space

    Helping Astronauts Go to the Bathroom in Space
    Imagine that moment of trying to unlock your front door when you desperately need to use the bathroom. You finally jiggle the key into the lock, burst into the room, drop everything you’re holding, and sprint to the bathroom. Relief.…
  • Feb 22

    Courts Continue to Split on the Fourth Amendment in Cyberspace

    Courts Continue to Split on the Fourth Amendment in Cyberspace
    Just two weeks ago, a United States Magistrate Judge for the Eastern District of Pennsylvania handed down a decision compelling Google to produce electronic data, even though the data had been stored on servers in foreign countries.…
Rank this Week: 4320

New Media & Technology Law Blog

New Media & Technology Law Blog

Covers intellectual property, data security, online marketing and online commerce. By Proskauer.

http://newmedialaw.proskauer.com
Rank this Week: 3976

Data Privacy Monitor

Data Privacy Monitor

Covers data privacy, security and social media subjects. By Baker Hostetler.

http://www.dataprivacymonitor.com/
  • Feb 23

    Finalized New York Department of Financial Services Cybersecurity Regulation to Take Effect March 1

    Finalized New York Department of Financial Services Cybersecurity Regulation to Take Effect March 1
    On February 16, 2017, the New York Department of Financial Services (NYDFS) announced the release of its finalized Cybersecurity Requirements for Financial Services Companies (“Cybersecurity Regulation”), which will take effect on…
  • Jan 27

    Will the proposed “Countering Russian Hostilities Act” stop Russian cyberattacks?

    Will the proposed “Countering Russian Hostilities Act” stop Russian cyberattacks?
    On Jan. 10, 2017, a bipartisan group of five Republican and five Democratic senators announced their support for the Countering Russian Hostilities Act of 2017. Lindsey Graham, one of the senators who announced the proposed legislation, told…
  • Jan 26

    FINRA Seeks Comment on Blockchain

    FINRA Seeks Comment on Blockchain
    On Jan. 18, 2017, the Financial Industry Regulatory Authority (FINRA) became the latest organization to weigh in on distributed ledger technology (DLT), also known as blockchain. Recognizing the growing interest and potential benefits…
Rank this Week: 2925

Cyberinsurance Law Blog

Cyberinsurance Law Blog

News and comments on Business Law. By Dilworth Paxson L.L.P.

http://www.databreachninja.com/
  • Feb 23

    “3 Tips for Public Pension Funds”

    “3 Tips for Public Pension Funds”
    On Tuesday, I was privileged to be part of a panel discussing cyberinsurance for public pension funds at Kessler Topaz’s Evolving Fiduciary Obligations for Institutional Investors conference, joining Victoria Hale, General Counsel of…
  • Feb 2

    “Unfortunately, This Will Get Physical”

    “Unfortunately, This Will Get Physical”
    There have been relatively few confirmed cyber attacks resulting in substantial physical harm to property (other than computer hardware) and people.  The first known event involved the 2008-2010 infiltration of a computer virus called…
  • Jan 19

    “Carriers and Brokers Filling the Coverage Gaps”

    “Carriers and Brokers Filling the Coverage Gaps”
    Stand-alone cyberinsurance is a critical component of enterprise risk management.  But even companies with traditional and cyber coverage may, and usually do, have gaps in coverage created by what I’ve referred to as the ‘hot…
Rank this Week: 2434

Copyright, Intellectual Property,…

Copyright, Intellectual Property, Computer, Internet, e-Commerce Law

Covers IP/IT law, with a strong focus on copyright and internet law. By Barry Sookman.

http://www.barrysookman.com
Rank this Week: 2356

Data Protection Report

Data Protection Report

Covers global privacy, data protection and cybersecurity regulatory and litigation environment. By Norton Rose Fulbright.

http://www.dataprotectionreport.com/
  • Feb 23

    US Government Contractors Now Required to Train Employees on Privacy

    US Government Contractors Now Required to Train Employees on Privacy
    Effective January 19, 2017,  an update to the Federal Acquisition Regulation (FAR) will require certain contractors that provide services to the federal government to train their employees on privacy.  New contracts into which the…
  • Feb 19

    UK Court of Appeal Rules that Exemptions to Access Rights are Construed Narrowly

    UK Court of Appeal Rules that Exemptions to Access Rights are Construed Narrowly
    Under the UK Data Protection Act 1998 (“DPA“), data subjects have rights to obtain copies of their personal information through a data subject access request (“DSAR“). Data subjects frequently use DSARs to obtain…
  • Feb 7

    Settlement of Target Data Breach Consumer Class Action Is Derailed On Appeal

    Settlement of Target Data Breach Consumer Class Action Is Derailed On Appeal
    The Eighth Circuit Court of Appeals last week reversed the district court’s approval of a settlement and settlement class in the consolidated consumer class action arising from Target Corporation’s 2013 security incident. …
Rank this Week: 2063

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Feb 22

    Congressional Oversight Committee Wants Warrants to Rein in Police Abuse of Cell-Site Simulator

    Congressional Oversight Committee Wants Warrants to Rein in Police Abuse of Cell-Site Simulator
    A bipartisan Congressional committee’s recent report showcases troubling details about police abuse of cell-site simulators, and calls on Congress to pass laws ensuring that this powerful technology is only deployed with a court-issued…
  • Feb 22

    Virginia Supreme Court Should Protect Drivers from License Plate Surveillance

    Virginia Supreme Court Should Protect Drivers from License Plate Surveillance
    EFF urged the Supreme Court of Virginia today to protect the state's residents from a police surveillance database created with automated license plate readers (ALPRs). We've been following law enforcement use of ALPR technology a long time,…
  • Feb 22

    BWP Media v. Polyvore: It’s All About Control

    BWP Media v. Polyvore: It’s All About Control
    Major entertainment companies are once again trying to expand copyright law to gain leverage over a wide variety of user-generated content sites. If they succeed, they would have a veto over Internet users’ access to the tools that…
Rank this Week: 2852

Privacy & Security Matters

Privacy & Security Matters

By Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

http://www.privacyandsecuritymatters.com
  • Feb 22

    Failure of Audit Controls Can Cost $$$

    Failure of Audit Controls Can Cost $$$
    Last week, the HHS Office for Civil Rights (OCR) disclosed a $5.5 million settlement with Memorial Healthcare Systems (MHS) for HIPAA violations affecting the protected health information (PHI) of 115,143 individuals. The Resolution…
  • Feb 16

    The February 2017 Update – The Mintz Matrix

    The February 2017 Update – The Mintz Matrix
    As our readers know we maintain a summary of U.S. state data breach notification laws, which we refer to as the “Mintz Matrix.”   Our latest update is available here, and it should be part of your incident response…
  • Feb 14

    WEBINAR – Access, Correction, Erasure and Portability under the GDPR: How to Minimize the Burden

    WEBINAR – Access, Correction, Erasure and Portability under the GDPR: How to Minimize the Burden
    Since September, the Mintz Levin Privacy Webinar Series has focused on the upcoming EU General Data Protection Regulation (GDPR) to help businesses understand the reach and scope of the GDPR and prepare for the potentially game-changing…
Rank this Week: 3897

Security, Privacy and The Law

Security, Privacy and The Law

Covers information security and privacy issues. By Foley Hoag LLP.

http://www.securityprivacyandthelaw.com
Rank this Week: 3990

Privacy and Security Law Blog

Privacy and Security Law Blog

Covers biometrics, HIPAA, identity theft, PATRIOT Act, phishing and more. By Davis Wright Tremaine.

http://www.privsecblog.com/
  • Feb 21

    Comments Sought of FCC Privacy Regime

    Comments Sought of FCC Privacy Regime
    On Friday, the Federal Register published the FCC’s January 17th Public Notice of the fact that eleven Petitions for Reconsideration were filed in the Broadband Privacy proceeding (WC Docket No. 16-106).  The Petitions challenge…
  • Feb 17

    42 C.F.R. Part 2 Final Rule Is Officially Delayed … Can Comments to HHS and OMB Fix It?

    42 C.F.R. Part 2 Final Rule Is Officially Delayed … Can Comments to HHS and OMB Fix It?
    On January 18, 2017, the U.S. Department of Health and Human Services (HHS) published a final rule amending the Confidentiality of Substance Use Disorder Patient Records rule at 42 C.F.R. Part 2. Yesterday, HHS delayed the effective date of…
  • Feb 13

    To Settle or Not to Settle – That Is the Question Raised by Recent HIPAA CMP

    To Settle or Not to Settle – That Is the Question Raised by Recent HIPAA CMP
    On February 1, 2017, the Department of Health and Human Services, Office for Civil Rights (“OCR”) announced that the Children’s Medical Center of Dallas (“Children’s”) has paid a civil monetary penalty…
Rank this Week: 2586

Workplace Privacy, Data Management…

Workplace Privacy, Data Management & Security Report

Covers data security, HIPAA, identity theft and workplace privacy. By Jackson Lewis.

http://www.workplaceprivacyreport.com
  • Feb 21

    $3.2M Fine for Failure to Protect Electronic Record

    $3.2M Fine for Failure to Protect Electronic Record
    The Department of Health and Human Services Office of Civil Rights (“OCR”) fined a Texas hospital $3.2 million for its impermissible disclosure of unsecured electronic protected health information (ePHI) and non-compliance over…
  • Feb 14

    Expert Insights on Developing a Physical Security Program

    Expert Insights on Developing a Physical Security Program
    In today’s digital age, security tends to be thought about in terms of firewalls, malware, encryption and other safeguards for electronic systems. But the security of those systems, as well as an organization’s…
  • Feb 12

    GPS Tracking and Smartphone Apps – Get Consent!

    GPS Tracking and Smartphone Apps – Get Consent!
    With the proliferation of satellite navigation systems and smart phones, many employers have contemplated using GPS tracking to increase efficiency, and frankly, to keep a better eye on their employees during the work day. The use of GPS…
Rank this Week: 4017

Privacy and IP Law Blog

Privacy and IP Law Blog

Addresses recent events in trademark, copyright, computer and privacy law. By Christina Frangiosa.

http://privacyandiplawblog.com/
  • Feb 20

    USPTO Requests Comment on Draft Examination Guide for Matter “Incapable” of Registration

    USPTO Requests Comment on Draft Examination Guide for Matter “Incapable” of Registration
    This post examines the USPTO's draft Examination Guide on Incapable Informational Matter - essentially matter that is not capable of federal trademark registration because it cannot function as a trademark. The Draft Guide focused on three…
  • Nov 28

    Common Questions – Can I Copyright My Formula?

    Common Questions – Can I Copyright My Formula?
    Probably not. No matter how new a formula (a.k.a. recipe) may be, if it simply comprises a combination of ingredients mixed together to form a new and unique dish, it is not likely to be copyrightable. And, once published, even if the recipe…
  • Nov 17

    Common Questions: What’s the Difference Between a Trademark and a Service Mark?

    Common Questions: What’s the Difference Between a Trademark and a Service Mark?
    This is actually a trick question – the answer is, “not much”. Generally, trademarks refer to source-identifying marks used in connection with goods (products) and service marks are used for the same purpose, but in…
Rank this Week: 4942

Advertising Law Blog

Advertising Law Blog

Provides commentary and news on developing legal issues in advertising, promotional marketing, Internet, and privacy law. By Olshan Frome Wolosky LLP.

http://www.olshanlaw.com/blogs-Advertising-Law-Blog
Rank this Week: 574

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
  • Feb 20

    Trends in behavioral advertising: What you need to know about cross-device tracking

    Trends in behavioral advertising: What you need to know about cross-device tracking
    The Federal Trade Commission (FTC) recently issued a staff report (available here) on the trend to link consumers’ online behavior across multiple devices. Among other recommendations, the FTC suggests that companies not track sensitive…
  • Feb 13

    Supreme Court to consider international patent exhaustion

    Supreme Court to consider international patent exhaustion
    Four years after fully embracing international copyright exhaustion in Kirtsaeng v. John Wiley & Sons, Inc., the U.S. Supreme Court has finally taken up the issue of patent exhaustion. In Impression Products, Inc. v. Lexmark International…
  • Jan 31

    Why HIPAA Compliance Matters: How a “small” breach can yield a large fine

    Why HIPAA Compliance Matters: How a “small” breach can yield a large fine
    The new year continues as the old ended, with HIPAA enforcement actions. On Jan. 11, 2017, MAPFRE Life Insurance Company of Puerto Rico (MAPFRE Life) entered into a Resolution Agreement with the United States Department of Health and Human…
Rank this Week: 2787

Clancco: Art & Law

Clancco: Art & Law

Covers the relationship between art and law with a focus on intellectual property, nonprofit tax-exempt organizations, free speech, and contemporary art. By Sergio Muñoz Sarmiento.

http://clancco.com/wp
  • Feb 17

    Battle Over August Sander Estate?

    Battle Over August Sander Estate?
    Or is it merely a misunderstanding as to what an “estate” is, legally and colloquially?
  • Feb 9

    “The Left Has Shanghaied Copyright”

    “The Left Has Shanghaied Copyright”
    The Federalist’s Robin Ridless takes some clean power-punches at the “ivy-cloistered radicalism” of the “all-appropriation-is-fair-use” jihadists. Here’s one example, To read a sampling of current…
  • Feb 8

    Can the “artworld” Resist President Trump? Don’t Count On It.

    Can the “artworld” Resist President Trump? Don’t Count On It.
    The Washington Post’s Tom Rachman shoots several zingers and comedy and farce that “political art” has become. Example number one: “Today, ‘politicized artist’ is as likely to evoke a whiny, entitled,…
Rank this Week: 419

Chronicle of Data Protection

Chronicle of Data Protection

Covers consumer privacy, data security, HIPAA, financial privacy and EU privacy. By Hogan Lovells.

http://www.hldataprotection.com
  • Feb 17

    Polish DPA Releases Data Privacy Inspection Plans – Targets Health, Shopping

    Polish DPA Releases Data Privacy Inspection Plans – Targets Health, Shopping
    The Polish Data Protection Authority has just released its inspection plans for 2017. This year, the GIODO has decided to target its review of compliance with data protection laws on the health services sector, as well as on the consumer…
  • Feb 16

    Your Cyber Minute: Watch Our Topline Digest of Today’s Cybersecurity Issue

    Your Cyber Minute: Watch Our Topline Digest of Today’s Cybersecurity Issue
    With cybersecurity issues evolving rapidly, every minute counts. Our new video series, Your Cyber Minute, is specifically designed for busy in-house counsel to gain practical perspectives – fast. This multi-part series is an extension…
  • Feb 15

    ICO Turns Spotlight on Data Broker Industry

    ICO Turns Spotlight on Data Broker Industry
    Data brokers are organisations that obtain data from a variety of sources and then sell or license it to third parties. Many trade in personal data, which is purchased by their customers for several purposes, most commonly to support…
Rank this Week: 4015

techblawg

techblawg

Focuses primarily on issues involving the intersection of law, technology and finance. By David Ma.

http://david-ma.ca/
  • Feb 16

    weekly tweet roundup

    weekly tweet roundup
    internet backbone provider cogent cuts off the pirate bay and other pirate sites. first step on the slippery slope? https://t.co/a6ANe6HKBS 2017-02-13 interesting (but long) piece on the most successful ticket scalper in the us and the ticket…
  • Feb 9

    weekly tweet roundup

    weekly tweet roundup
    an interesting peek at the poker ai that bested humans. https://t.co/HJPK8SNjdE 2017-02-03 why ups trucks don't turn left. quite interesting. https://t.co/tqswHI0CzD 2017-02-08 goldman has replaced 600 traders with 200 engineers since 2000…
  • Feb 2

    weekly tweet roundup

    weekly tweet roundup
    i never fail to be impressed by boston dynamics – their latest creation – a wheeled robot. https://t.co/T6vzLgQ43o 2017-02-01 interesting piece on the sometimes imperfect world of science and one fellow who's funding attempts to…
Rank this Week: 3210

Privacy Law Blog

Privacy Law Blog

Covers data privacy, identity theft, invasion of privacy, and national security legal issues. By Proskauer Rose LLP.

http://privacylaw.proskauer.com/
  • Feb 16

    Kingdom in the Cloud: Saudi Arabia’s Draft Cloud Computing Regulation

    Kingdom in the Cloud: Saudi Arabia’s Draft Cloud Computing Regulation
    Courtney M. Bowman Proskauer litigation associate Courtney Bowman and Jonathan Reardon, head of the Al Khobar, Saudi Arabia office of the Middle East-based firm Al Tamini & Co., recently co-authored an article published by Bloomberg about…
  • Jan 30

    Qatar’s New Personal Data Privacy Law

    Qatar’s New Personal Data Privacy Law
    Courtney M. Bowman At the end of last year, Qatar became the first Gulf state to enact a comprehensive privacy law. Until now, the many companies that market to consumers or have employees based in Gulf Cooperation Council (GCC) countries…
  • Jan 25

    Draft Privacy and Electronic Communications Regulation published by European Commission

    Draft Privacy and Electronic Communications Regulation published by European Commission
    Kelly McMullon The European Commission has released proposals for new legislation that seeks to create stronger privacy in electronic communications. The draft Privacy and Electronic Communications Regulation (the “Regulation”) is…
Rank this Week: 4438

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 2753

Information Technology Law Blog

Information Technology Law Blog

Covers social media, e-discovery, privacy, and intellectual property. By Foster Swift Collins & Smith PC.

http://www.michiganitlaw.com/
  • Feb 15

    Fiduciary Rule update: the beginning of the end?

    Fiduciary Rule update: the beginning of the end?
    Shortly after our first article on the DOL Fiduciary Rule the White House issued an Executive Order that requires the Department of Labor (the "DOL") to revisit the Fiduciary Rule (the "Fiduciary Rule" or the "Rule") and the Prohibited…
  • Feb 7

    5 Tips for Investigating and Purchasing Cyber Insurance

    5 Tips for Investigating and Purchasing Cyber Insurance
    In 2016 Lansing, MI's Board of Water and Light fell victim to a cyber-attack that resulted in $2.4 million in costs, including a $25,000 ransom paid to the perpetrators. In the aftermath of the breach, BWL announced that it was filing for a…
  • Jan 31

    The New Fiduciary Rule and its Future

    The New Fiduciary Rule and its Future
    With a sea of political change in Washington this year, many are speculating on what regulatory reforms the Trump administration and a Republican Congress will make in 2017. One reform in particular is commonly mentioned: a repeal, delay, or…
Rank this Week: 3150

Privacy & Information Security…

Privacy & Information Security Law Blog

Provides global privacy and information security law updates and analysis. By Hunton & Williams.

https://www.huntonprivacyblog.com/
  • Feb 13

    CIPL to Hold Next GDPR Implementation Workshop in Madrid

    CIPL to Hold Next GDPR Implementation Workshop in Madrid
    On March 6 and 7, 2017, the Centre for Information Policy Leadership at Hunton & Williams LLP and over 100 public and private sector participants in CIPL’s GDPR Implementation Project will convene in Madrid, Spain, for CIPL’s…
  • Feb 9

    DPA of Argentina Issues Draft Data Protection Bill

    DPA of Argentina Issues Draft Data Protection Bill
    Pablo Palazzi, from Buenos Aires law firm Allende & Brea, reports that earlier this month, the Argentine Data Protection Agency posted the first draft of a new data protection bill on its website. The Draft Bill is heavily based on the EU…
  • Feb 9

    House of Representatives Passes Email Privacy Act

    House of Representatives Passes Email Privacy Act
    On February 6, 2017, the House of Representatives suspended its rules and passed by voice vote H.R 387, the Email Privacy Act. The Email Privacy Act now moves to the Senate, where it will be considered by the Senate Judiciary Committee.…
Rank this Week: 96

Global Regulatory Enforcement Law…

Global Regulatory Enforcement Law Blog

Covers antitrust, privacy, international trade, and white color criminal defense. By Reed Smith.

http://www.globalregulatoryenforcementlawblog.com
  • Feb 10

    Private Equity Firm Held Responsible for Portfolio Company’s Antitrust Violation

    Private Equity Firm Held Responsible for Portfolio Company’s Antitrust Violation
    In January of 2017 a private equity firm, Bencis, was found liable for a portfolio company’s involvement as one of 14 cartelists producing flour in the Netherlands, Belgium, and Germany. The Authority for Consumers and Markets (ACM)…
  • Feb 10

    2017 Expectations of the U.S. CFTC Enforcement Agenda

    2017 Expectations of the U.S. CFTC Enforcement Agenda
    The U.S. Commodity Futures Trading Commission is undergoing a transformation with the new Trump administration while staying on course with its statutory mission of protecting US commodities and derivatives markets.  Some of CFTC’s…
  • Feb 10

    Iran Missile Test Leads to New Sanction

    Iran Missile Test Leads to New Sanction
    On February 2nd the Office of Foreign Assets Control (“OFAC”) imposed new sanctions on 13 individuals and 12 entities that were believed to be “involved in procuring technology and/or materials to support Iran’s…
Rank this Week: 1029

Information Law Group

Information Law Group

Covers advertising law, privacy, information security and intellectual property.

http://www.infolawgroup.com/
  • Feb 9

    InfoLawGroup Launches CPO on Demand™ Service

    InfoLawGroup Launches CPO on Demand™ Service
    InfoLawGroup announces the launch of CPO on Demand™, a service through which we serve as outside Chief Privacy Officers, Privacy Counsel, and DPOs as required under EU regulation. CPO on Demand™ brings the depth and breadth of our…
  • Feb 7

    FTC and NJ AG Reach $2.2 Million Settlement to Resolve Vizio Video Privacy Matter

    FTC and NJ AG Reach $2.2 Million Settlement to Resolve Vizio Video Privacy Matter
    On Monday, February 6, 2017, the Federal Trade Commission (“FTC”) and New Jersey Attorney General (“NJAG”) announced a settlement agreement to resolve their joint enforcement action against Vizio. The regulators…
  • Feb 2

    NJ TCCWNA Claim Thwarted by CA Choice-of-Law Provision

    NJ TCCWNA Claim Thwarted by CA Choice-of-Law Provision
    As we have previously written about, 2016 saw a wave of litigation brought under New Jersey’s Truth-in-Consumer Contracting, Warranty, and Notice Act (“TCCWNA”) regarding website Terms of Use.  While service…
Rank this Week: 3795

Cybersecurity Lawyer Forum

Cybersecurity Lawyer Forum

Covers business and privacy law. By Jeffer Mangels Butler & Mitchell LLP.

http://cybersecurity.jmbm.com/
  • Feb 8

    Cybersecurity and Ransomware – It can get ugly when a hacker takes control of your smart building

    Cybersecurity and Ransomware – It can get ugly when a hacker takes control of your smart building
    Cyber risk affects businesses of every size and industry. A data breach can lead to negative publicity, loss of customer confidence and potential lawsuits. There can be a variety of unanticipated – and costly – business…
  • Dec 28

    Risk Assessment – the Key to Risk Management

    Risk Assessment – the Key to Risk Management
    One of the great frustrations in contemplating a data security program is that there is no such thing as a one-size-fits-all solution.  There is no law or regulation that specifies the exact steps a company needs to take in order achieve…
  • Dec 12

    Cybersecurity Law in 2017 – Predictions and Prognostication

    Cybersecurity Law in 2017 – Predictions and Prognostication
    December is the month for predictions.  During this month, commentators of all sorts and in all areas predict the trends and actions that will impact us during the coming year.  While speculating the future is a questionable…
Rank this Week: 2156

Fair Competition Law Blog

Fair Competition Law Blog

Covers trade secrets, noncompetes, privacy and security, the Computer Fraud and Abuse Act, trademarks, copyrights, and business torts. By Russell Beck.

http://faircompetitionlaw.com
  • Feb 4

    Trade Secrets Laws and the UTSA – A 50 State and Federal Law Survey Chart (revised)

    Trade Secrets Laws and the UTSA – A 50 State and Federal Law Survey Chart (revised)
    Every state but Massachusetts and New York has adopted the Uniform Trade Secrets Act (the UTSA) in one form or another – though some may quibble with whether Alabama or North Carolina actually adopted it. (The Uniform Law…
  • Feb 4

    BRR 50-State Noncompete Chart (Updated Today)

    BRR 50-State Noncompete Chart (Updated Today)
    The BRR 50 State Noncompete Chart has been updated to reflect a few developments and to make a few tweaks since the last draft. Most significantly, Georgia surprised many (me included) with its decision that the 2011…
  • Feb 1

    Trade Secret and Noncompete Survey – National Case Graph 2017

    Trade Secret and Noncompete Survey – National Case Graph 2017
    As regular readers of this blog know, several years ago, I became curious to see how many reported trade secret / noncompete decisions were issued each year in all federal and state courts around the country. So, I did a “back of the…
Rank this Week: 4637

sobre privacidad y protección de…

sobre privacidad y protección de datos

Spanish language blog about privacy and data protection. By Daniel A. Lopez Carballo.

http://www.dlcarballo.com/
Rank this Week: 3773

LegalTXTS

LegalTXTS

Covers law and technology, with an emphasis on legal issues regarding digital media, privacy and data security, and information management. By Elijah Yip.

http://www.legaltxts.com/
  • Jan 25

    The Tax Scams Cometh

    The Tax Scams Cometh
    Tax season is miserable for many because it means having to cut a check to the IRS.  But it’s not just Uncle Sam who’s interested in your money.  Scammers are also looking to get paid, and they’ll do it by stealing…
  • Oct 26

    Police officer suspended for controversial Facebook posts allowed to go to trial on First Amendment retaliation claim

    Police officer suspended for controversial Facebook posts allowed to go to trial on First Amendment retaliation claim
    It’s generally a good practice to set standards of online employee conduct to prevent the social media activity of employees from disrupting the workplace or tarnishing your organization’s reputation.  But the mere fact that…
  • Sep 21

    Six Years Later, NLRB’s Social Media Guidelines Still Confound

    Six Years Later, NLRB’s Social Media Guidelines Still Confound
    Six years ago, the National Labor Relations Board (NLRB) became one of the first governmental agencies to regulate social media use in the workplace.  In 2010 and 2011, the NLRB issued a series of guidance memos and decisions sketching…
Rank this Week: 3477

Privacy and Data Security Law

Privacy and Data Security Law

Covers the creation, collection, use, destruction and security of data. By Dentons.

http://www.privacyanddatasecuritylaw.com/
  • Dec 21

    Private Right of Action under CASL coming July 2017

    Private Right of Action under CASL coming July 2017
    Canada’s Anti-Spam Law came into force on July 1, 2014.  Since then, all eyes have been on the Canadian Radio-television and Telecommunications Commission (CRTC) for decisions concerning CASL violations. …
  • Dec 3

    HHS Issues Warning About Phishing Campaign Disguised As Official Communication

    HHS Issues Warning About Phishing Campaign Disguised As Official Communication
    As part of its efforts to assess compliance with the HIPAA Privacy, Security and Breach Notification Rules, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) engages in audits of covered entities and their…
  • Nov 23

    FTC Announces New Guidance on Ransomware

    FTC Announces New Guidance on Ransomware
    On November 10, 2016, the U.S. Federal Trade Commission (FTC) released new guidance for businesses and consumers on the impact of, and how to respond to ransomware.  Ransomware is a form of malicious software that infiltrates computer…
Rank this Week: 3698

Data Security Law Journal

Data Security Law Journal

Covers data security, cloud computing, data privacy and anything E. By Al Saikali.

http://www.datasecuritylawjournal.com/
  • Dec 11

    Law Firm Data Security: The First Class Action

    Law Firm Data Security: The First Class Action
    Earlier this year, Bloomberg Law reported that Edelson PC, a leading plaintiffs’ firm in privacy and data security law, filed a class action lawsuit against a regional law firm that had vulnerabilities in its information security…
  • Jun 22

    The SEC Makes Clear There is No Room For Error in Cybersecurity

    The SEC Makes Clear There is No Room For Error in Cybersecurity
    The SEC recently agreed to a $1,000,000 settlement of an enforcement action against Morgan Stanley for its failure to have sufficient data security policies and procedures to protect customer data. The settlement was significant for its…
  • Mar 9

    Understanding EMV Payment Card Technology

    Understanding EMV Payment Card Technology
    A significant change is happening to payment card technology. Any company that accepts credit cards as a form of payment needs to know about it if they intend to continue accepting payment cards in the future. The technology is called…
Rank this Week: 3904

Data Breach Lawyer Blog

Data Breach Lawyer Blog

Covers intellectual property law. By Raines Feldman.

http://www.databreachlawyerblog.com/
  • Oct 24

    Trade Secrets and Internet Scraping

    Trade Secrets and Internet Scraping
    Recently, our cyber liability team discussed the impact internet data scraping has had upon trade secrets litigation.  Trade secrets cases are tough to win as plaintiffs.  The availability of competitive data online presents…
  • Oct 24

    Trade Secrets and Internet Scraping

    Trade Secrets and Internet Scraping
    Recently, our cyber liability team discussed the impact internet data scraping has had upon trade secrets litigation.  Trade secrets cases are tough to win as plaintiffs.  The availability of competitive data online presents…
  • Aug 30

    Be Mindful of Statute of Limitations for Internet Defamation

    Be Mindful of Statute of Limitations for Internet Defamation
    Often, data breaches are associated with internet defamation or other torts like impersonation.  Many times we come across strong defamation cases that cannot proceed because the potential client has waited too long to take action.…
Rank this Week: 1857

German IT Law

German IT Law

Provides updates and analysis on German and European IP/IT, technology, media and (open source) software law. By JBB Rechtsanwälte.

http://germanitlaw.com/
Rank this Week: 3497

SullivanLawNet

SullivanLawNet

Legal news and analysis, with an emphasis on international and domestic intellectual property developments. By Shawn Sullivan.

http://sullivanlaw.net/
  • Jun 20

    EU Court: 3-D Toothbrush Shape not Registrable as Trademark

    EU Court: 3-D Toothbrush Shape not Registrable as Trademark
    In Loops, LLC v EUIPO, Case T‑385/15 (14 June 2016), the General Court of the European Union held that held that the three dimensional shape of a toothbrush lacked any distinctive character and could not be registered as an EU ……
  • May 31

    Court Refuses Interim Order in Strawberry Licensing Case

    Court Refuses Interim Order in Strawberry Licensing Case
    A U.S. district judge has refused to enter a temporary restraining order (TRO) against the University of California, Davis in litigation contesting the university’s alleged refusal to transfer or license strawberry germplasm developed…
  • May 12

    Prison Term for PVP Infringement by Alleged Wheat Bandit

    Prison Term for PVP Infringement by Alleged Wheat Bandit
    On 14 April 2016, a criminal court in the Spanish city of Segovia sentenced an individual to a six month prison term for infringing the plant variety protection (PVP) rights of Limagrain Europe SA in the soft wheat variety known as…
Rank this Week: 2351

Trials and Tribulations

Trials and Tribulations

Covers the Elvey v. TDAmeritrade case concerning information security, spam and identity theft.

http://caringaboutsecurity.wordpress.com
  • May 6

    Looking back

    Looking back
    This is a response to DataLossDB blog post Legal Sub-Project – Elvey v. TD Ameritrade by jkouns on June 14, 2009 You ask some tough questions, and I have answers!  This is Elvey.  I filed the case. I was not aware of this post…
  • Jul 3

    Advice for TD Ameritrade from Tim Devaney and Tom Stein

    Advice for TD Ameritrade from Tim Devaney and Tom Stein
    TD Ameritrade’s PR flacks think this is bad advice on how to handle haters, I guess.Filed under: Settlement Component
  • Jun 13

    Settlement Valuation

    Settlement Valuation
    Judge Walker repeatedly asked the former class counsel to place a value on the benefits the rejected settlement offered to the class. I think it’s doable, and no one has truly done so, so I’m going to give it a shot. The audit…
Rank this Week: 4546

Beyond Telecom Law Blog

Beyond Telecom Law Blog

Covers telecom policy, services agreements and data security/privacy. By Keller and Heckman LLP.

http://www.beyondtelecomlawblog.com
  • Apr 25

    "Section 6409 vs. Reality"-- A Panel Discussion at the Wireless West Conference

    "Section 6409 vs. Reality"-- A Panel Discussion at the Wireless West Conference
    I had the pleasure of speaking at the first annual Wireless West Conference in Anaheim, CA on April 20. Wireless West was organized and managed by five state wireless associations—Arizona, California, Colorado, Nevada, and Northwest…
  • Apr 18

    The Industrial Internet - Legal Issues and Procurement Implications--A Series; Part 1--Overview

    The Industrial Internet - Legal Issues and Procurement Implications--A Series; Part 1--Overview
    This is the first entry in a series on the “Industrial Internet,” focusing on the basic elements, legal issues and procurement implications, principally from the perspective of the end user. The term is used to distinguish…
  • Apr 4

    Another FirstNet Milestone

    Another FirstNet Milestone
      Another marker passed on the FirstNet roadmap last week as Capability Statements from bidders interested in building, operating and maintaining the Nationwide Public Safety Broadband Network were submitted March 31, 2016. Final bids…
Rank this Week: 3813

Threat Level

Threat Level

Covers privacy, crime and security online. From Wired News.

http://www.wired.com/threatlevel
  • Apr 14

    Researchers Cracked Microsoft and Google’s Shortened URLs To Spy On People

    Researchers Cracked Microsoft and Google’s Shortened URLs To Spy On People
    They were even able to identify a young woman who'd sought Google Maps directions to a Planned Parenthood clinic. The post Researchers Cracked Microsoft and Google's Shortened URLs To Spy On People appeared first on WIRED.
  • Apr 14

    A Scheme to Encrypt the Entire Web Is Actually Working

    A Scheme to Encrypt the Entire Web Is Actually Working
    The non-profit certificate authority Let's Encrypt is enabling a sea change toward HTTPS encryption online. The post A Scheme to Encrypt the Entire Web Is Actually Working appeared first on WIRED.
  • Apr 13

    Matthew Keys Sentenced to Two Years for Aiding Anonymou

    Matthew Keys Sentenced to Two Years for Aiding Anonymou
    The former Tribune Company employee was convicted of giving Anonymous information that helped hackers access an LA Times server and alter a headline. The post Matthew Keys Sentenced to Two Years for Aiding Anonymous appeared first on WIRED.
Rank this Week: 40

Dot Indicia

Dot Indicia

Covers information, privacy and security from a Canadian perspective. By Michael Power.

http://michaelpower.ca
  • Feb 22

    Corporate Activism In the Protection of Privacy

    Corporate Activism In the Protection of Privacy
    Just how far is business supposed to go in protecting privacy? In the United States, one can starkly see an example with Apple and the retrieval of encrypted iPhone data. But a recent Canadian case also shines a spotlight on the role of the…
  • Jan 27

    Another New Privacy Tort for Ontario

    Another New Privacy Tort for Ontario
    Last week saw a rather striking decision issued by the Ontario Superior Court of Justice. 2102 saw the tort of “intrusion upon seclusion” recognized; in 2016, we now have the tort of “public disclosure of private…
  • Jan 19

    New Privacy Tort Empowers “Revenge Porn” Victim

    New Privacy Tort Empowers “Revenge Porn” Victim
    Manitoba’s Intimate Image Protection Act came into force on 15 January 2016. The statute does something that I think is especially noteworthy – it creates a new privacy tort concerning the “non-consensual distribution of…
Rank this Week: 4693

CyberLaw Currents

CyberLaw Currents

Covers technology news headlines, statutes, and case law developments related to e-commerce, privacy, advertising, and intellectual property. Edited by Glen K. Westerback.

http://www.cyberlawcurrents.com
Rank this Week: 4826

Georgia Internet Law

Georgia Internet Law

Provides information and commentary regarding Internet law, e-commerce and technology law, World Wide Web regulation, and intellectual property. By Richardson Sixth, LLC.

http://georgiainternetlaw.com/
  • Nov 28

    Bitcoin and Consumer Protection Measures in Digital Currency

    Bitcoin and Consumer Protection Measures in Digital Currency
    This is another in a series of posts focused on the first state regulation of cryptocurrency businesses.  Ostensibly, depending on one’s opinion, the New York BitLicense regulation of bitcoin (and digital currency businesses…
  • Nov 2

    The Bitcoin Business State License Requirement: BitLicense

    The Bitcoin Business State License Requirement: BitLicense
    The last post in this series by Atlanta Bitcoin attorney Mark Richardson VI familiarized the reader with the regulatory vernacular of the New York BitLicense law now in effect.  Let’s now examine to whom exactly that license…
  • Oct 19

    BitLicense Legal Regulations: What are We Talking About?

    BitLicense Legal Regulations: What are We Talking About?
    Here’s the first installment of a Crypto-Counsel ℠ series on the New York State Department of Financial Services (“NYDFS“) “BitLicense” regulations applicable to digital currency businesses (the…
Rank this Week: 3885

Business Litigation Info

Business Litigation Info

Covers business litigation, intellectual property, data security, and advertising and media. By Faruki Ireland & Cox P.L.L.

http://www.businesslitigationinfo.com/
  • Nov 24

    NOVEMBER 2015 FI&C WEBSITE NEWSLETTER

    NOVEMBER 2015 FI&C WEBSITE NEWSLETTER
    *     On September 17, 2015, Jeff Ireland and Jade Smarda, obtained a temporary restraining order on behalf of a local financial services firm in a trade secrets case. *     Jeff Sharkey and…
  • Nov 20

    Be Cautious When Social Networking is All “Atwitter “at Your Workplace

    Be Cautious When Social Networking is All “Atwitter “at Your Workplace
    We use social media all the time. Make it a point during the day to notice how often you see a friend or colleague checking a Facebook update or sending a tweet (or giving you a three-star rating on the new Peeple app).  People are on…
  • Nov 16

    Cybersecurity Information Sharing Act: The Devil Lurks and the Road to His House Appears Well Paved

    Cybersecurity Information Sharing Act: The Devil Lurks and the Road to His House Appears Well Paved
    Best Laid Plans. They say the devil is in the details. One might say that is most certainly the case with the recently advanced version of the Cybersecurity Information Sharing Act (“CISA”) that recently passed the U.S. Senate by…
Rank this Week: 3841

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • May 15

    The New York Bitlicense is coming: What you need to know

    The New York Bitlicense is coming: What you need to know
    As the final version of the New York BitLicense will roll out within the next 2 weeks, bitcoin startups are gearing up to enter the U.S. market. The post The New York Bitlicense is coming: What you need to know appeared first on .
  • May 12

    What Makes a Brand a Good Trademark?

    What Makes a Brand a Good Trademark?
    A suggestive trademark can be a salutary compromise between marketing and legal considerations. The post What Makes a Brand a Good Trademark? appeared first on .
  • Apr 30

    LLC., C Corp, S Corp: How to Pick a Business Structure

    LLC., C Corp, S Corp: How to Pick a Business Structure
    Few decisions are as important as choosing the right entity for your new startup. This post explores the factors that matter most when making this decision. The post LLC., C Corp, S Corp: How to Pick a Business Structure appeared first on .
Rank this Week: 2746

Workplace Privacy Counsel

Workplace Privacy Counsel

Covers employment related privacy issues. Published by Philip Gordon of Littler Mendelson's Privacy and Data Protection Practice Group.

http://www.littler.com/blog/workplace-privacy-counsel
Rank this Week: 4399