Most Popular Privacy Law Blawgs Expanded View List View

Blogs 1 - 45 of 52

Advertising Law Blog

Advertising Law Blog

Provides commentary and news on developing legal issues in advertising, promotional marketing, Internet, and privacy law. By Olshan Frome Wolosky LLP.

http://www.olshanlaw.com/blogs-Advertising-Law-Blog
Rank this Week: 1575

Beyond Telecom Law Blog

Beyond Telecom Law Blog

Covers telecom policy, services agreements and data security/privacy. By Keller and Heckman LLP.

http://www.beyondtelecomlawblog.com
  • May 19

    Privacy Concerns Escalate as Drones Are About to Take-Off

    Privacy Concerns Escalate as Drones Are About to Take-Off
    The widely-anticipated commercial deployment of drones piques the interest of critical infrastructure industries, the agricultural sector, and technology companies such as Amazon.  Consistent with this commercial interest and its…
  • Apr 25

    Improving In-Building Wireless Reception: Property Owners Are Not the Enemy

    Improving In-Building Wireless Reception: Property Owners Are Not the Enemy
    Wireless carriers’ networks are subject to recurring capacity constraints, particularly in high density, urban environments.  Owners of buildings and developments in urban areas and operators of major venues—stadiums, arenas…
  • Apr 3

    The Industrial Internet: The Emerging M2M Colossu

    The Industrial Internet: The Emerging M2M Colossu
    At the end of March, Intel, IBM, AT&T, GE and Cisco announced the formation of “the Industrial Internet Consortium (IIC), a nonprofit organization dedicated to the Internet of Things, to ‘improve the integration of the…
Rank this Week: 2809

Broadband Law Advisor

Broadband Law Advisor

Provides insight and information on the FCC's National Broadband Plan. By Davis Wright Tremaine LLP.

http://www.broadbandlawadvisor.com/
Rank this Week: 2421

Business Litigation Info

Business Litigation Info

Covers business litigation, intellectual property, data security, and advertising and media. By Faruki Ireland & Cox P.L.L.

http://www.businesslitigationinfo.com/
  • Jul 25

    July 2014 FI&C Website Newsletter

    July 2014 FI&C Website Newsletter
    What’s new at Faruki Ireland & Cox P.L.L. *  Dan Donnellon and Jade Smarda appeared in the U.S. District Court for the S.D. of Ohio for the trial of a petition to compel international arbitration that it filed on behalf of the…
  • Jul 23

    HIPAA has a bite. What to know about the civil and criminal penalties for non-compliance

    HIPAA has a bite. What to know about the civil and criminal penalties for non-compliance
    I was asked to comment for a story about a recent case in Texas in which criminal charges were filed against an individual for the misuse of Protected Health Information (“PHI”). Criminal charges have been available under the…
  • Jul 8

    Starbucks is Sending Baristas to College…With a Non-Compete Clause.

    Starbucks is Sending Baristas to College…With a Non-Compete Clause.
    University of Starbucks? The recent announcement of college scholarships for Starbucks Baristas is a great “perk,” but is this one of the businesses that can take the non-compete and trade secret claims, so often seen as…
Rank this Week: 1388

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 4693

Chronicle of Data Protection

Chronicle of Data Protection

Covers consumer privacy, data security, HIPAA, financial privacy and EU privacy. By Hogan Lovells.

http://www.hldataprotection.com
  • Jul 25

    Cookie Consent—What’s Changed?

    Cookie Consent—What’s Changed?
    Almost five years ago, EU legislators shocked the Internet world by changing the legal requirement for the use of cookies and similar device identification techniques from “notice and opt-out” to “notice and consent.”…
  • Jul 24

    2014 Intelligence Authorization Act Requires Contractors to Report Cybersecurity Breache

    2014 Intelligence Authorization Act Requires Contractors to Report Cybersecurity Breache
    On Monday, 7 July, the president signed into law the Intelligence Authorization Act for Fiscal Year 2014, which requires intelligence contractors with security clearances to promptly report network and information system penetrations and…
  • Jul 23

    Hogan Lovells White Paper on National Security Access to Cloud Data Updated to Add Analysis of Brazil, Italy, Spain

    Hogan Lovells White Paper on National Security Access to Cloud Data Updated to Add Analysis of Brazil, Italy, Spain
    Hogan Lovells today published an update to the White Paper A Sober Look at National Security Access to Data in the Cloud, which compares national security access to data stored with Cloud service providers in a number of countries. The White…
Rank this Week: 1061

Clancco: Art & Law

Clancco: Art & Law

Covers the relationship between art and law with a focus on intellectual property, nonprofit tax-exempt organizations, free speech, and contemporary art. By Sergio Muñoz Sarmiento.

http://clancco.com/wp
  • Jul 28

    Cariou v. Prince: Toward a Theory of Aesthetic-Judicial Judgment

    Cariou v. Prince: Toward a Theory of Aesthetic-Judicial Judgment
    Here’s another new law review article on Cariou v. Prince, and this time it’s from yours truly in collaboration with art historian and curator, Lauren van Haaften-Schick. The article is the product of a paper I presented at Texas…
  • Jul 24

    Exhibition: To Shoot a Kite, at the CUE Art Foundation

    Exhibition: To Shoot a Kite, at the CUE Art Foundation
    “In June 2012, Sesame Street introduced Alex, a new character on its online interactive program Little Children, Big Challenges. In the short educational video, Alex admits his father is in prison after skirting questions from his…
  • Jul 24

    Court Case Claims Australian Art Market Is 30 Percent Forgerie

    Court Case Claims Australian Art Market Is 30 Percent Forgerie
    On the heels of this Guardian article on why fake artworks may just be good enough, now this. A quick note on The Guardian article. The Walter Benjamin reference is a bit superficial. For Benjamin the aura did rest in the singular object, but…
Rank this Week: 252

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • Mar 10

    Independent Creation Paper Trail To Fend Off Copyright Suit

    Independent Creation Paper Trail To Fend Off Copyright Suit
    Keeping adequate record of your software creation efforts can be very helpful to stave off copyright infringement claimsThe post Independent Creation Paper Trail To Fend Off Copyright Suits appeared first on .
  • Feb 20

    Oracle’s Copyright Victory: An Ephemeral Win

    Oracle’s Copyright Victory: An Ephemeral Win
    Despite Oracle’s efforts to utilize copyright law to asphyxiate Rimini’s business model, Rimini’s support services appear to have bright days aheadThe post Oracle’s Copyright Victory: An Ephemeral Win appeared first…
  • Feb 14

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”
    After former employer declined to invest in Defendant’s new business, Defendant turned cybersquatterThe post Retaliatory Cybersquatter Used Domain Name To “Get Leverage” appeared first on .
Rank this Week: 4601

Copyright, Intellectual Property,…

Copyright, Intellectual Property, Computer, Internet, e-Commerce Law

Covers IP/IT law, with a strong focus on copyright and internet law. By Barry Sookman.

http://www.barrysookman.com
  • Jul 28

    Computer and Internet Law Updates for 2014-07-27

    Computer and Internet Law Updates for 2014-07-27
    Google doesn't want you to limit its ability to follow you around the internet http://t.co/9vYzPQjxcK -> RT @eurorights: 'French blogger owes $2,000 in damages for review 'too prominent' on Google'. http://t.co/UHMDvye7hC -> RT…
  • Jul 27

    Computer and Internet Law Weekly Updates for 2014-07-26

    Computer and Internet Law Weekly Updates for 2014-07-26
    Time to invest in better protections for Canada’s intellectual property http://t.co/VtXpfqNMeI -> Android set-top boxes for TV streaming: Copyright or wrong? http://t.co/kVbCOj0Gu7 -> Computer and Internet Law Weekly Updates for…
  • Jul 26

    Computer and Internet Law Updates for 2014-07-25

    Computer and Internet Law Updates for 2014-07-25
    Email Deliverability: 9 lessons about Canadian Anti-Spam Legislation http://t.co/eHSl6lLKlm -> UK Impact assessment opinion: Copyright Exception for Private Copying http://t.co/FOrv3goTPE -> Brandis proposes website blocking and piracy…
Rank this Week: 562

CyberLaw Currents

CyberLaw Currents

Covers technology news headlines, statutes, and case law developments related to e-commerce, privacy, advertising, and intellectual property. Edited by Glen K. Westerback.

http://www.cyberlawcurrents.com
  • Jul 3

    Distinguishing Advertising from Search Result

    Distinguishing Advertising from Search Result
    As part of its ongoing effort to provide guidance to digital advertisers (including the recent release of the updated digital advertising guidance, “dot.com Disclosures: How to Make Effective Disclosures in Digital Advertising“),…
  • May 17

    FTC Answers 92 Questions about its Revised Children’s Online Privacy Protection Act Rule

    FTC Answers 92 Questions about its Revised Children’s Online Privacy Protection Act Rule
    In an effort to provide clarity on it its revised Children’s Online Privacy Protection Rule (“Rules”), the FTC recently published a list of  Frequently Asked Questions (“FAQs“) with information on how to…
  • May 16

    FTC Answers 92 Questions about its Revised Children’s Online Privacy Protection Act Rule

    FTC Answers 92 Questions about its Revised Children’s Online Privacy Protection Act Rule
    In an effort to provide clarity on it its revised Children’s Online Privacy Protection Rule (“Rules”), the FTC recently published a list of  Frequently Asked Questions (“FAQs“) with information on how to…
Rank this Week: 2089

Data Privacy Monitor

Data Privacy Monitor

Covers data privacy, security and social media subjects. By Baker Hostetler.

http://www.dataprivacymonitor.com/
  • Jul 24

    Partner Alan Friel Named Influential Lawyer by LA Business Journal

    Partner Alan Friel Named Influential Lawyer by LA Business Journal
    Partner Alan Friel was named among the “Most Influential Lawyers: Digital Media and E-Commerce Law” in the Los Angeles Business Journal’s July 21, 2014, issue. The list recognizes 30 Los Angeles attorneys who have…
  • Jul 23

    What’s Old is New Again—Insecure Remote Acce

    What’s Old is New Again—Insecure Remote Acce
    When a merchant is suspected of being the victim of an account data compromise event, they are often required by the card brands to hire a Payment Card Industry Forensic Investigator (PFI). The PFI provides a report on the investigation to…
  • Jul 22

    Utilities, Oil and Gas Companies Feeling Drained by “Energetic Bear”

    Utilities, Oil and Gas Companies Feeling Drained by “Energetic Bear”
    The following was authored by Mary Guzman, Senior Vice President, InfoSec Practice Leader with McGriff, Seibels & Williams, Inc. There is much going on in the cyber world related to energy and utility companies.  As has long been…
Rank this Week: 1152

Data Security Law Journal

Data Security Law Journal

Covers data security, cloud computing, data privacy and anything E. By Al Saikali.

http://www.datasecuritylawjournal.com/
  • May 26

    Why Every Business Should Care About Florida’s Information Protection Act

    Why Every Business Should Care About Florida’s Information Protection Act
    My last post described what the recently passed Florida Information Protection Act (FIPA) will do.  This post analyzes how FIPA differs from Florida’s existing breach notification law and explains why those differences will hurt or…
  • May 15

    Everything You Need To Know About Florida’s New Data Protection Law

    Everything You Need To Know About Florida’s New Data Protection Law
    The Florida Legislature recently passed the Florida Information Protection Act of 2014 (FIPA).  This post describes the FIPA and analyzes the advantages and disadvantages to businesses governed by the new law.  The FIPA must still…
  • Dec 30

    The Target Data Breach Lawsuits: Why Every Company Should Care

    The Target Data Breach Lawsuits: Why Every Company Should Care
    Plaintiffs’ lawyers were falling over themselves last week in a race to the courthouse to sue Target as a result of its recent data breach.  By at least one report, over 40 lawsuits have already been filed against Target, the first…
Rank this Week: 2705

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Jul 26

    Deeper Dive into EFF's Motion on Backbone Surveillance

    Deeper Dive into EFF's Motion on Backbone Surveillance
    Yesterday we filed a motion for partial summary judgment in our long running Jewel v. NSA case, focusing on the government's admitted seizure and search of communications from the Internet backbone, also called "upstream." We've asked the…
  • Jul 25

    EFF Asks Judge to Rule NSA Internet "Backbone" Spying Techniques Unconstitutional

    EFF Asks Judge to Rule NSA Internet "Backbone" Spying Techniques Unconstitutional
    Graphic Explains to Court and the Public How the NSA Seizes and Searches Innocent Americans' CommunicationsSan Francisco - The Electronic Frontier Foundation (EFF) today presented a federal court with a detailed explanation of how the NSA…
  • Jul 24

    Net Neutrality and the Global Digital Divide

    Net Neutrality and the Global Digital Divide
    EFF's position on net neutrality simply calls for all data that travels over the Internet to be treated equally. This means that we oppose ISPs blocking content based on its source or destination, or discriminating against certain…
Rank this Week: 4287

Dot Indicia

Dot Indicia

Covers information, privacy and security from a Canadian perspective. By Michael Power.

http://michaelpower.ca
  • Jun 13

    Spencer, PIPEDA & Lawful Authority

    Spencer, PIPEDA & Lawful Authority
    A busy practice combined with a very bad shoulder injury will, regretfully, move blogging down the priority list. As we reach mid-2014 there have been a few interesting privacy law developments this year but, in my view, no real…
  • Feb 27

    Toronto Hydro Surveillance?

    Toronto Hydro Surveillance?
    I can’t help but think there’s a movie in this somewhere. Love, devotion and allegations of betrayal are all present. Mix in smart meters and privacy and it becomes obvious why I’m blogging about this. It’s quite a…
  • Feb 19

    Health Privacy: Is PHIPA the only game in town?

    Health Privacy: Is PHIPA the only game in town?
    There is a new and interesting decision out of Peterborough that raises but doesn’t answer a lot of questions. These questions revolve around the intersection of PHIPA, class action law and tort law. This is not something you see…
Rank this Week: 2464

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
Rank this Week: 4661

Fair Competition Law Blog

Fair Competition Law Blog

Covers trade secrets, noncompetes, privacy and security, the Computer Fraud and Abuse Act, trademarks, copyrights, and business torts. By Russell Beck.

http://faircompetitionlaw.com
Rank this Week: 1479

Georgia Internet Law

Georgia Internet Law

Provides information and commentary regarding Internet law, e-commerce and technology law, World Wide Web regulation, and intellectual property. By Richardson Sixth, LLC.

http://georgiainternetlaw.com/
  • Sep 30

    ReDigi and Movement in Copyright Law and Theory

    ReDigi and Movement in Copyright Law and Theory
    ReDigi, started in late 2011, holds itself out as a legal means for consumers to sell their digital music files online, giving them the same ability to re-sell as they possess with their CDs or vinyl. ReDigi proponents argue that the…
  • Aug 31

    Craigslist Copyright and CFAA Win

    Craigslist Copyright and CFAA Win
    The U.S. District Court for the Northern District of California has ruled that website owners have the right to selectively block user access, and any intentional circumvention of those access restrictions may violate the Computer Fraud and…
  • Jun 7

    Georgia Technology Industry Update

    Georgia Technology Industry Update
    Technology Association of Georgia President and CEO, Tino Mantella, gave a recent State of the Technology Industry report to the Buckhead Business Association.  Tech jobs in Georgia earn an average of $81,000, with the sector increasing…
Rank this Week: 3331

German IT Law

German IT Law

Provides updates and analysis on German and European IP/IT, technology, media and (open source) software law. By JBB Rechtsanwälte.

http://germanitlaw.com/
  • Oct 9

    Court Decision: Companies Allowed to run Fanpages on Facebook

    Court Decision: Companies Allowed to run Fanpages on Facebook
    The Administrative Court of Schleswig (Verwaltungsgericht Schleswig) held today in three parallel decisions that companies that run their own fanpages on Facebook are not responsible for the social network’s data collection and…
  • Mar 5

    German Data Protection Laws Do Not Apply to Facebook

    German Data Protection Laws Do Not Apply to Facebook
    On February 14th, 2013 the Administrative Court of Schleswig held in two decisions that German data protection laws do not apply to data processing by Facebook (file numbers 8 B 60/12 and 8 B 61/1).The interlocutory judicial procedure had…
  • Jan 28

    Federal Supreme Court: Can a foreign company use a .de-domain?

    Federal Supreme Court: Can a foreign company use a .de-domain?
    In the case laid before the Federal Supreme Court (Bundesgerichtshof; BGH) the court primarily had to decide about the liability of the administrative contact of the domain dlg.de. However, in the obiter dictum, the court also held under…
Rank this Week: 3201

Global Regulatory Enforcement Law…

Global Regulatory Enforcement Law Blog

Covers antitrust, privacy, international trade, and white color criminal defense. By Reed Smith.

http://www.globalregulatoryenforcementlawblog.com
  • Jul 25

    FTC Commissioner Brill Urges State AGs to Up the Ante

    FTC Commissioner Brill Urges State AGs to Up the Ante
    This post was written by Divonne Smoyer and Christine Czuprynski. Businesses that think they know what privacy issues are on the minds of the state attorneys general (AGs) should be aware that AGs are being urged to take action, either on…
  • Jul 25

    UK set to implement emergency Data Retention and Investigatory Powers Bill

    UK set to implement emergency Data Retention and Investigatory Powers Bill
    This post was written by Cynthia O'Donoghue, Angus Finnegan and Kate Brimsted. In April, the Court of Justice of the European Union (‘Court’) declared Directive 2006/24/EC on the Retention of Data to be invalid, creating…
  • Jul 25

    Has Facebook been evil? It's down to the regulators to decide

    Has Facebook been evil? It's down to the regulators to decide
    This post was written by Cynthia O'Donoghue and Kate Brimsted. In June, Facebook came under public scrutiny after it was revealed that the company carried out research in 2012 that manipulated the News Feeds of 689,000 users. Several…
Rank this Week: 272

HIPAA Blog

HIPAA Blog

Features a discussion of medical privacy. By Jeffrey P. Drummond.

http://hipaablog.blogspot.com/
  • Jul 28

    Self Regional (Greenwood, SC) laptop…

    Self Regional (Greenwood, SC) laptop theft: Two knuckelheads broke into a building and stole a laptop.  They've been caught, but said when they realized what they stole, they threw it into a lake.  Divers were not able to find the…
  • Jul 25

    HIPAA on Offense: Yes, it happens. 

    HIPAA on Offense: Yes, it happens. 
  • Jul 23

    Sutter Health Data Breach Update: No proof…

    Sutter Health Data Breach Update: No proof of harm, no statutory damages. As you know, someone threw a brick through a plate glass door and stole a desktop (!) computer from a Sutter Health location.  The desktop had protected health…
Rank this Week: 595

Information Law Group

Information Law Group

Covers advertising law, privacy, information security and intellectual property.

http://www.infolawgroup.com/
  • Jul 27

    The Games Advertisers Play: Heather Nolan to present this week on Gamification

    The Games Advertisers Play: Heather Nolan to present this week on Gamification
    This Wednesday, Heather Nolan will discuss the legal issues related to Gamification. The session is part of the Brand Activation Association’s comprehensive, 6-part webinar series, which has been covering the A-Z must-knows of…
  • Jul 25

    Massachusetts Continues Aggressive Information Security Enforcement Agenda

    Massachusetts Continues Aggressive Information Security Enforcement Agenda
    On July 23, 2014, the Massachusetts Attorney General announced a consent judgment with Women & Infant’s Hospital of Rhode Island (“WIH”) to resolve allegations that it violated federal and state information security laws…
  • Jul 23

    New Connecticut Mini-TCPA Provides for Giant Penalties and Attorneys’ Fee

    New Connecticut Mini-TCPA Provides for Giant Penalties and Attorneys’ Fee
    Companies sending text messages or conducting voice telemarketing in Connecticut beware! Connecticut has substantially amended its telemarketing law (the “mini-TCPA”), which now may regulate even more conduct than the federal TCPA…
Rank this Week: 1029

Information Technology Law Blog

Information Technology Law Blog

Covers social media, e-discovery, privacy, and intellectual property. By Foster Swift Collins & Smith PC.

http://www.michiganitlaw.com/
  • Jul 15

    Cincinnati Who-Dey Ruling is Big Deal for Internet Commerce: Website immune from Ex-Bengals Cheerleader’s Defamation Lawsuit

    Cincinnati Who-Dey Ruling is Big Deal for Internet Commerce: Website immune from Ex-Bengals Cheerleader’s Defamation Lawsuit
    The gossip website, thedirty.com, is immune from liability for online posts about an ex-Bengals Cheerleader’s sexual promiscuity and acquiring a sexually transmitted disease. In a closely followed decision from a case that…
  • Jul 1

    New Michigan Crowdfunding Website

    New Michigan Crowdfunding Website
    Since the passing of the Crowdfunding Act in December 2013, many questions concerning the applicability of the law have surfaced. This past month, the Michigan Municipal League launched CrowdfundingMI.com, a website pertaining to…
  • Jun 25

    Will the Government Force the Redskins to Change their Name?

    Will the Government Force the Redskins to Change their Name?
    On June 18, the United States Patent and Trademark Office ("USPTO") cancelled the Washington Redskins' trademark in its team name, concluding that the term "Redskin" was racially offensive and derogatory towards Native Americans. …
Rank this Week: 3593

Inforrm's Blog

Inforrm's Blog

Discusses issues of media law and responsibility with a special focus on libel and privacy law and the balance between the two.

http://inforrm.wordpress.com
  • Jul 28

    Defamation Act 2013, A Critical Evaluation, Part 3, “Truth” and “Honest Comment” – Dan Tench

    Defamation Act 2013, A Critical Evaluation, Part 3, “Truth” and “Honest Comment” – Dan Tench
    In earlier posts I have dealt with general concerns about the Defamation Act 2013 and concerns about section 1, “Serious harm”. In this post, I will look at at the new statutory defences of “truth” and…
  • Jul 27

    Law and Media Round Up – 28 July 2014

    Law and Media Round Up – 28 July 2014
    On Monday 21 July 2014, the trial of singer Tulisa Contostavlos collapsed after the judge had ruled that it was likely that the Sun’s well known ex-News of the World investigative reporter, the “Fake Sheikh”, Mazher Mahmood,…
  • Jul 27

    Defamation Act 2013, A Critical Evaluation, Part 2: “Serious Harm” – Dan Tench

    Defamation Act 2013, A Critical Evaluation, Part 2: “Serious Harm” – Dan Tench
    In this post, I continue setting out concerns with the Defamation Act 2013 by looking at the test for serious harm in section 1 of the Defamation Act 2013.  There is no sensible objection to a seriousness threshold for a defamation…
Rank this Week: 132

Inside Privacy

Inside Privacy

Covers global privacy and data security. By Covington & Burling LLP.

http://www.insideprivacy.com
  • Jul 28

    The Case for Not Overregulating Drone

    The Case for Not Overregulating Drone
    On the International Association of Privacy Professionals’ Privacy Perspectives blog, Covington privacy associate Jeff Kosseff shares his thoughts about the potential newsgathering uses of drones, and the dangers of overregulating them.
  • Jul 25

    Executive Order on Drone Privacy

    Executive Order on Drone Privacy
    By Gabriel Slater and Kurt Wimmer As reported in the press, President Obama plans to issue an Executive Order authorizing the Commerce Department’s National Telecommunications and Information Administration (“NTIA”) to…
  • Jul 23

    Extending Cybersecurity Breach Notice Requirements to Intelligence Community Contractor

    Extending Cybersecurity Breach Notice Requirements to Intelligence Community Contractor
    By David Fagan, Susan Cassidy, and Catlin Meade As an indicator of the continuing focus of government authorities on cybersecurity breaches and potential notification requirements, certain contractors for the federal government may soon face…
Rank this Week: 747

LegalTXTS

LegalTXTS

Covers law and technology, with an emphasis on legal issues regarding digital media, privacy and data security, and information management. By Elijah Yip.

http://www.legaltxts.com/
  • May 19

    Section 230 of the CDA: An Employer’s New Friend?

    Section 230 of the CDA: An Employer’s New Friend?
    Employees can get carried away on social media. US Airways learned this the hard way when its employee responded to a customer complaint on Twitter with an obscene picture of a woman and a toy jet. An apology and deletion of the tweet…
  • May 8

    Oh Snap! Lessons From the Snapchat Settlement With the FTC

    Oh Snap! Lessons From the Snapchat Settlement With the FTC
    The Federal Trade Commission (FTC) just announced that Snapchat agreed to settle charges that it deceived consumers about how its popular mobile message app worked and what personal data it collected from users. (Read the FTC’s press…
  • Apr 21

    NLRB Strikes Down Selective Enforcement of Work Email Policy

    NLRB Strikes Down Selective Enforcement of Work Email Policy
    Birth announcements. Girl Scout cookies fundraisers. Leftovers in the company lounge. We’ve all probably received an email at work on these or similar subjects. It’s uncommon for an employee be disciplined for sending an email of…
Rank this Week: 1678

New Media & Technology Law Blog

New Media & Technology Law Blog

Covers intellectual property, data security, online marketing and online commerce. By Proskauer.

http://newmedialaw.proskauer.com
  • Jul 23

    Proposed “Bitlicense” Regulations Published to the New York Register

    Proposed “Bitlicense” Regulations Published to the New York Register
    Today’s New York State Register includes a Notice of Proposed Rule Making from the New York State Department of Financial Services (the “NYSDFS”) regarding the regulation of virtual currency (“Regulation of the Conduct…
  • Jun 16

    Sixth Circuit Reinforces CDA Immunity – Reverses Lower Court in Jones v. Dirty World

    Sixth Circuit Reinforces CDA Immunity – Reverses Lower Court in Jones v. Dirty World
    On June 16th, 2014, the Sixth Circuit reversed the lower court’s holding that the gossip site, TheDirty.com, was responsible for its users’ defamatory posts and could not rely on immunity under CDA Section 230.   The…
  • Jun 9

    Mobile Alphabet Soup…What Exactly Is an ATDS under the TCPA?

    Mobile Alphabet Soup…What Exactly Is an ATDS under the TCPA?
    An Important Issue for Text-Message Marketers There has been an uptick in litigation under the federal Telephone Consumer Protection Act (TCPA), 47 U.S.C. § 227 – likely due to the increased use of mobile marketing (not to mention…
Rank this Week: 3109

North Carolina Journal of Law &…

North Carolina Journal of Law & Technology

Features legal scholarship in law and technology topics, including intellectual property law, cyberspace law, environmental law, criminal law, health law, and privacy law.

http://ncjolt.org/
Rank this Week: 1787

Peter Fleischer: Privacy...?

Peter Fleischer: Privacy...?

Covers privacy law and corporate privacy policy. By Peter Fleischer, Global Privacy Counsel for Google.

http://peterfleischer.blogspot.com/
  • May 14

    Harvard Nostalgia

    Harvard Nostalgia
    The older I get, the more I think back to Harvard with nostalgia.  I was very young at Harvard.  I went to college straight out of the 10th grade, and I graduated at the age of 19.  That officially makes me a high school…
  • Apr 6

    From pool to pool

    From pool to pool
    I love my pools.    In Paris, my pool is in a fancy private club, in the Bois de Boulogne, on the edge of Paris.  It's a gorgeous 50-meter pool, open year-round outdoors, framed by views of the Eiffel Tower. My pool nurtured…
  • Mar 12

    A Science Fiction Novel

    A Science Fiction Novel
    I'd like to crowd-source the plot for a science fiction novel.  Would this make a good story?:In a not-too-distant future, say 20 years from now, humanity lives through the biggest change in its history.  It doesn't happen…
Rank this Week: 2018

Politics of Privacy Blog

Politics of Privacy Blog

Covers privacy, liberty, security, economy and their interaction. By Andreas Busch.

http://politicsofprivacy.blogspot.com/
  • Jan 18

    Again: loss of personal data by public officials in the UK

    Again: loss of personal data by public officials in the UK
    Less than two months after the loss of the personal details of 25 million people by the UK's tax authorities (see this blog entry), another substantial loss of personal data has occurred in Britain. As the BBC website writes, a laptop…
  • Jan 7

    Jeremy Clarkson and identity theft

    Jeremy Clarkson and identity theft
    Well, first of all, a happy new year to my readers! And I am glad to be able to report that page visits to this blog more than doubled in 2007 over 2006, to well over 5000 pageviews. I am very happy about this and will take it as a reminder…
  • Nov 20

    British tax authorities lose personal details of 25 million people

    British tax authorities lose personal details of 25 million people
    A crass case of neglect and breach of data protection legislation has led to the loss of discs containing the names, addresses, dates of birth, bank account details and National Insurance numbers of 25 million people in the United Kingdom, it…
Rank this Week: 2695

Privacy & Security Matters

Privacy & Security Matters

By Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

http://www.privacyandsecuritymatters.com
  • Jul 28

    Privacy Monday: July 28, 2014

    Privacy Monday: July 28, 2014
    The last Monday in July — the summer of 2014 is rapidly slipping away!   Here are some privacy and security bits and bytes for this last week of July: US Congress Heads Out on August Recess Soon – Much to Do It has been…
  • Jul 24

    Honing in on the new rules for the transfer of personal data outside of the EEA

    Honing in on the new rules for the transfer of personal data outside of the EEA
    Written by Susan Foster, Solicitor England & Wales/Admitted in California  (LONDON) Although no major legislative milestones for the EU Data Protection Regulation have occurred since March 2014 (see status update here), there has…
  • Jul 24

    No news doesn’t mean it’s gone away: Timing Update for the EU Data Protection Regulation

    No news doesn’t mean it’s gone away: Timing Update for the EU Data Protection Regulation
    Written by Susan Foster, Solicitor England & Wales/Admitted in California  (LONDON) With no major legislative milestones since the March 2014 EU Parliamentary vote endorsing the LIBE draft of the new Data Protection Legislation,…
Rank this Week: 1520

Privacy & Security Source

Privacy & Security Source

Covers anonymous subpoenas, behavioral advertising, employee monitoring, geolocation and information security. By Foley & Lardner LLP.

http://www.privacysecuritysource.com
Rank this Week: 3898

Privacy & Information Security…

Privacy & Information Security Law Blog

Provides global privacy and information security law updates and analysis. By Hunton & Williams.

https://www.huntonprivacyblog.com/
  • Jul 24

    Data Security Council of India Announces Vodafone India Limited as DSCI Privacy Certified Organization

    Data Security Council of India Announces Vodafone India Limited as DSCI Privacy Certified Organization
    On July 22, 2014, the Data Security Council of India announced that Vodafone India Limited has been deemed a "DSCI Privacy Certified" organization. This is the first such certification for a telecommunications company in India.
  • Jul 23

    Hunton Global Privacy Update – July 2014

    Hunton Global Privacy Update – July 2014
    On July 15, 2014, the Hunton and Williams Global Privacy and Cybersecurity practice group hosted the latest webcast in its Hunton Global Privacy Update series. This blog post provides a link to a recording of the session, and to previous…
  • Jul 22

    New Cybersecurity Center to Be Established in Belgium

    New Cybersecurity Center to Be Established in Belgium
    On July 17, 2014, the Belgian government announced that it has finalized a Royal Decree on the establishment of a national Cybersecurity Center to oversee cybersecurity issues in Belgium. The Cybersecurity Center is expected to be operational…
Rank this Week: 259

Privacy and Data Security Law

Privacy and Data Security Law

Covers the creation, collection, use, destruction and security of data. By Dentons.

http://www.privacyanddatasecuritylaw.com/
  • Jul 22

    Update from UK Information Commissioner’s Office (ICO)

    Update from UK Information Commissioner’s Office (ICO)
    Christopher Graham spoke at the recent Privacy Laws & Business Conference in Cambridge, UK.  Here is an update of the main points: The new EU Regulation Will it happen? Well, “if it looks like a duck, swims like a duck and…
  • Jul 4

    Russia moves to ban exports of personal data

    Russia moves to ban exports of personal data
    The Russian Parliament has just passed new rules requiring personal data of Russians to be stored in Russia.  This could mean that the big US IT vendors and other businesses that service Russian consumers will have to invest in local IT…
  • Jul 2

    EU Data Protection Regulation: Update

    EU Data Protection Regulation: Update
    The EU Data Protection Regulation was discussed, yesterday, at the Privacy Laws & Business conference in Cambridge, UK. Here is the latest news: There has been a debate as to whether the new Regulation is actually going to happen. …
Rank this Week: 1858

Privacy and IP Law Blog

Privacy and IP Law Blog

Addresses recent events in trademark, copyright, computer and privacy law. By Christina Frangiosa.

http://privacyandip.blogspot.com/
  • Jul 14

    ABA IPL Publishes White Paper on Online Piracy and Counterfeiting

    ABA IPL Publishes White Paper on Online Piracy and Counterfeiting
    On July 7, 2014, the ABA Intellectual Property Law (IPL) Section released its comprehensive white paper, outlining the results of its research and analysis of continuing concerns about online pirates and counterfeiters based overseas. …
  • Apr 15

    Recent Presentations and Article

    Recent Presentations and Article
    More articles on IP and privacy issues will be posted here soon, but in the meantime, here are several recent articles that have published in other media:·        Participated in a panel discussion on…
  • Jan 28

    Today is Data Privacy Day!

    Today is Data Privacy Day!
    January 28 is “Data Privacy Day.”  In honor of the day, below are several links relating to efforts to protect the privacy of personal data and some tools for small businesses:Council of Europe’s explanation of the…
Rank this Week: 1186

Privacy and Security Law Blog

Privacy and Security Law Blog

Covers biometrics, HIPAA, identity theft, PATRIOT Act, phishing and more. By Davis Wright Tremaine.

http://www.privsecblog.com/
Rank this Week: 1121

Privacy Law Blog

Privacy Law Blog

Covers data privacy, identity theft, invasion of privacy, and national security legal issues. By Proskauer Rose LLP.

http://privacylaw.proskauer.com/
  • Jul 24

    e-IDs: the Future of Secure Digital Identification?

    e-IDs: the Future of Secure Digital Identification?
    Courtney BowmanOver the past decade, the EU has made significant technological and legal strides toward the widespread adoption of electronic identification cards.  An electronic ID card, or e-ID, serves as a form of secure…
  • Jul 9

    One year of Data Protection Enforcement in France: what the CNIL’s Activity Report 2013 Reveals and what to expect in 2014

    One year of Data Protection Enforcement in France: what the CNIL’s Activity Report 2013 Reveals and what to expect in 2014
    Marianne Le MoullecAccording to the French Data Protection Authority’s (“CNIL”) recently issued activity report for 2013 (http://www.cnil.fr/fileadmin/documents/La_CNIL/publications/CNIL_34e_Rapport_annuel_2013.pdf ), the…
  • Jul 1

    France Facilitates Implementation of Whistleblowing System

    France Facilitates Implementation of Whistleblowing System
    Cecile MartinIn France, before implementing a whistleblowing process, a company must inform and consult with its employees’ representatives, inform its employees and notify the French Data Protection Agency (CNIL). There are two…
Rank this Week: 978

Reasonable Expectation

Reasonable Expectation

Focuses on privacy and data security. By M. Scott Koller.

http://www.reasonableexpectation.com
  • Jun 30

    Are Data Breach Investigations Privileged?

    Are Data Breach Investigations Privileged?
    #150654797 / gettyimages.com Are Data Breach Investigations Privileged? Originally Published on the InfoLaw Group Blog: Over the past year, the number of data breaches has skyrocketed and, as a result, companies are facing increased risk of…
  • Mar 20

    FTC Seeks Public Comment on iKeepSafe’s Proposed Safe Harbor Program Under the Children’s Online Privacy Protection Rule

    FTC Seeks Public Comment on iKeepSafe’s Proposed Safe Harbor Program Under the Children’s Online Privacy Protection Rule
    Internet Keep Safe Coalition (iKeep Safe) has submitted a proposed safe harbor program to the Federal Trade Commission under the the agency’s Children’s Online Privacy Protection Rule. Under 16 C.F.R. 312.11, COPPA safe…
  • Feb 28

    Obama’s new cybersecurity plan a good start

    Obama’s new cybersecurity plan a good start
    I recently authored an article for the Daily Journal on the new cybersecurity framework.  You can read about it by visiting the Daily Journal.  
Rank this Week: 2887

Security, Privacy and The Law

Security, Privacy and The Law

Covers information security and privacy issues. By Foley Hoag LLP.

http://www.securityprivacyandthelaw.com
  • Jul 21

    App Developers Should Note Revisions to COPPA FAQ

    App Developers Should Note Revisions to COPPA FAQ
    The FTC’s July 10, 2014 complaint filed against Amazon has left app developers with concerns about how to make apps that target kids and still comply with the law. The complaint, brought under Section 5(a) of the FTC Act, alleged that…
  • Jun 25

    In Riley v. California, Supreme Court Rules Police Must Obtain Warrant before Searching Cell Phone

    In Riley v. California, Supreme Court Rules Police Must Obtain Warrant before Searching Cell Phone
    In a unanimous decision issued today, the Supreme Court ruled that police cannot search the cell phones of arrested individuals without a warrant. In reaching its decision, the Court recognized that there is an immense amount of personal…
  • Jun 25

    In Riley v. California, Supreme Court Rules Police Must Obtain Warrant before Searching Cell Phone

    In Riley v. California, Supreme Court Rules Police Must Obtain Warrant before Searching Cell Phone
    In a unanimous decision issued today, the Supreme Court ruled that police cannot search the cell phones of arrested individuals without a warrant. In reaching its decision, the Court recognized that there is an immense amount of personal…
Rank this Week: 2006

sobre privacidad y protección de…

sobre privacidad y protección de datos

Spanish language blog about privacy and data protection. By Daniel A. Lopez Carballo.

http://www.dlcarballo.com/
  • May 8

    Primeras sanciones por violación del Habeas Data en Colombia

    Primeras sanciones por violación del Habeas Data en Colombia
    Según se hacia eco la Radio Nacional de Colombia, un total de 350 sanciones, por más de mil millones de pesos,  ha impuesto la Superintendencia de Industria y Comercio por violar la nueva ley de Habeas Data. El dato lo…
  • Apr 22

    Aprobado el proyecto de ley de protección de datos de República Dominicana

    Aprobado el proyecto de ley de protección de datos de República Dominicana
    Según se hacían eco diferentes medios de comunicación, el Senado de la República Dominicana aprobó en segunda lectura el proyecto de Ley Orgánica sobre Protección de Datos de Carácter…
  • Apr 14

    Presentación de la Declaración de Lima

    Presentación de la Declaración de Lima
    El pasado viernes 12 de abril de 2013, fue presentada, en la ciudad de Lima (Perú), en el transcurso del Seminario de Derecho Constitucional la primera Declaración emanada en el seno del Observatorio Iberoamericano de…
Rank this Week: 2726

Socially Aware Blog

Socially Aware Blog

Covers the law and business of social media. By Morrison Foerster.

http://www.sociallyawareblog.com/
  • Jul 28

    Status Update

    Status Update
    Your tax dollars at work: Wikipedia placed a 10-day ban on changes to the collaborative encyclopedia from a certain IP address inside the U.S. Capitol after discovering that bizarre and embarrassing edits were being made from that address…
  • Jul 25

    Status Update

    Status Update
    Facebook reported strong results for ad revenue in the second quarter of 2014. Mobile advertising was particularly strong, up 30 percent from last year. Mobile ads now account for 62 percent of Facebook’s advertising revenue. A federal…
  • Jul 23

    Status Update

    Status Update
    An Illinois woman was arrested on July 11 and charged with theft after she allegedly stole a dress from a boutique in West Frankfort, Illinois, then posted a selfie wearing the dress on her Facebook page. Police Chief Shawn Talluto noted,…
Rank this Week: 1409

Spam Notes

Spam Notes

Covers Internet law, electronic communications law, privacy, ID theft, data protection, adware, spyware and more. Published by Seattle lawyer Venkat Balasubramani.

http://spamnotes.com
  • Dec 31

    The Marble and the Sculptor

    The Marble and the Sculptor
    A few months* ago, Keith Lee, who blogs at Associate's Mind, was kind enough to send me a review copy of his book titled "The Marble and the Sculptor". The book is a survival guide of sorts for newly minted lawyers, tackling a wide range…
  • Jul 19

    The Problem With the Sharknado Reference

    The Problem With the Sharknado Reference
    Judge Mills throws in a reference to Sharknado in Faulkner v. Woody Allen. (h/t @ericgoldman) The problem with the reference is this: five years from now, no one will know or recall what Sharknado was. Even today, many people reading the…
  • Jan 19

    Just Who Are the Change Agents in Law?

    Just Who Are the Change Agents in Law?
    Scott Greenfield has an interesting post up today with an equally interesting response from Keith Lee. Both posts nudge me in the direction of a "Godin-esque" question that's been percolating in my mind for a long long time now:  the…
Rank this Week: 1609

SullivanLawNet

SullivanLawNet

Legal news and analysis, with an emphasis on international and domestic intellectual property developments. By Shawn Sullivan.

http://sullivanlaw.net/
  • May 18

    Increased Fines for Violations of North Carolina Seed Law

    Increased Fines for Violations of North Carolina Seed Law
    In 2013, the North Carolina legislature increased the maximum fine for violations of the state’s seed law from $500 to $10,000 per violation. See N.C. Session Law 2013-345, Senate Bill 455, An act to increase penalties for…
  • Mar 31

    Unintended Consequences of Open Access Publishing Policie

    Unintended Consequences of Open Access Publishing Policie
    Rick Anderson at The Scholarly Kitchen has a thought-provoking article regarding the pressure on authors to publish their academic articles under the most permissive open access licenses available. See Rick Anderson, CC-BY, Copyright, and…
  • Mar 31

    “Twilight” Trademark Infringement Claims Cleared for Trial

    “Twilight” Trademark Infringement Claims Cleared for Trial
    The U.S. District Court for the Southern District of New York ruled that the entertainment company responsible for the “Twilight” film series is entitled to a trial on claims that its trademarks were infringed by a cosmetics…
Rank this Week: 2077

techblawg

techblawg

Focuses primarily on issues involving the intersection of law, technology and finance. By David Ma.

http://david-ma.ca/
  • Jun 28

    Protected: bob’s stuff

    Protected: bob’s stuff
    There is no excerpt because this is a protected post. [Click on title above to read the full post]
  • Jun 8

    weekly tweet roundup

    weekly tweet roundup
    haswell – not much of a tock, is it? at least not for desktop. http://t.co/Z4WytI0cnO 2013-06-02 analysis of carbon footprint of a tesla s. not as green as i thought, but still pretty good. http://t.co/6fPPVFnNzA 2013-06-02 better…
  • Jun 1

    weekly tweet roundup

    weekly tweet roundup
    for the next time someone says you don't need project controls aren't because of agile. http://t.co/RhdKFAr58d 2013-05-27 quebec cracks down on airbnb. or rather those who rent out their home using airbnb. http://t.co/fU22acDtHs 2013-05-27…
Rank this Week: 522

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
  • Jul 28

    A new Ohio weapon against patent trolls?

    A new Ohio weapon against patent trolls?
    By Dan Miller Ohio may become the next state — after Virginia, Georgia, and thirteen other states — to take on the fight against patent trolls. A bill pending in Ohio’s General Assembly, H.B. 573, would provide additional…
  • Jul 18

    Delegation slows this week but the gTLD program is still going steady

    Delegation slows this week but the gTLD program is still going steady
    By Melissa Barnett Three new gTLDs have been delegated to the root zone since our last post. The newest group of gTLDs to be delegated include: .gent .nrw .scb gTLDs in Sunrise period — update The following gTLDs are now added to the…
  • Jul 11

    ICANN continues to rapidly expand the Internet this summer — newest statistics released

    ICANN continues to rapidly expand the Internet this summer — newest statistics released
    By Melissa Barnett As of July 4, 2014 ICANN announced that out of the 1,930 applicants received in 2012, 1,146 have been invited to contracting. Contracting is the process through which ICANN will contact eligible applicants and engage with…
Rank this Week: 4469

The D: Drive | E-Discovery,…

The D: Drive | E-Discovery, Privacy and All Things Data

Covers privacy, e-discovery, data security, and cloud computing. By Davis LLP.

http://www.davis.ca/en/blog/d-drive/
  • Jul 22

    Why Your Lawyer Should Be the First Point of Contact after a Data Breach

    Why Your Lawyer Should Be the First Point of Contact after a Data Breach
    Securing corporate information assets against a data breach, and responding to a data breach when it occurs, is not just a technology problem. While information security certainly has a major technological component, it is also a public…
  • Jun 23

    Join the Dialogue: Sedona Canada Holds Working Group Meeting to Update E-Discovery Principle

    Join the Dialogue: Sedona Canada Holds Working Group Meeting to Update E-Discovery Principle
    The Sedona Conference’s Working Group 7 (Sedona Canada) strives to create forward-looking principles and best practice recommendations for lawyers, courts, businesses, and others who regularly confront eDiscovery issues in Canada. The…
  • Jun 3

    Minimizing Risks and Responding to Data Breache

    Minimizing Risks and Responding to Data Breache
    This article originally appeared on Canadian Lawyer InHouse Online and has been reproduced here with permission from the publisher. [More…]
Rank this Week: 4686