Most Popular Privacy Law Blawgs Expanded View List View

Blogs 1 - 45 of 56

Advertising Law Blog

Advertising Law Blog

Provides commentary and news on developing legal issues in advertising, promotional marketing, Internet, and privacy law. By Olshan Frome Wolosky LLP.

http://www.olshanlaw.com/blogs-Advertising-Law-Blog
Rank this Week: 1343

Beyond Telecom Law Blog

Beyond Telecom Law Blog

Covers telecom policy, services agreements and data security/privacy. By Keller and Heckman LLP.

http://www.beyondtelecomlawblog.com
  • Apr 25

    "Section 6409 vs. Reality"-- A Panel Discussion at the Wireless West Conference

    "Section 6409 vs. Reality"-- A Panel Discussion at the Wireless West Conference
    I had the pleasure of speaking at the first annual Wireless West Conference in Anaheim, CA on April 20. Wireless West was organized and managed by five state wireless associations—Arizona, California, Colorado, Nevada, and Northwest…
  • Apr 18

    The Industrial Internet - Legal Issues and Procurement Implications--A Series; Part 1--Overview

    The Industrial Internet - Legal Issues and Procurement Implications--A Series; Part 1--Overview
    This is the first entry in a series on the “Industrial Internet,” focusing on the basic elements, legal issues and procurement implications, principally from the perspective of the end user. The term is used to distinguish…
  • Apr 4

    Another FirstNet Milestone

    Another FirstNet Milestone
      Another marker passed on the FirstNet roadmap last week as Capability Statements from bidders interested in building, operating and maintaining the Nationwide Public Safety Broadband Network were submitted March 31, 2016. Final bids…
Rank this Week: 2732

Broadband Law Advisor

Broadband Law Advisor

Provides insight and information on the FCC's National Broadband Plan. By Davis Wright Tremaine LLP.

http://www.broadbandlawadvisor.com/
Rank this Week: 2304

Business Litigation Info

Business Litigation Info

Covers business litigation, intellectual property, data security, and advertising and media. By Faruki Ireland & Cox P.L.L.

http://www.businesslitigationinfo.com/
  • Nov 24

    NOVEMBER 2015 FI&C WEBSITE NEWSLETTER

    NOVEMBER 2015 FI&C WEBSITE NEWSLETTER
    *     On September 17, 2015, Jeff Ireland and Jade Smarda, obtained a temporary restraining order on behalf of a local financial services firm in a trade secrets case. *     Jeff Sharkey and…
  • Nov 20

    Be Cautious When Social Networking is All “Atwitter “at Your Workplace

    Be Cautious When Social Networking is All “Atwitter “at Your Workplace
    We use social media all the time. Make it a point during the day to notice how often you see a friend or colleague checking a Facebook update or sending a tweet (or giving you a three-star rating on the new Peeple app).  People are on…
  • Nov 16

    Cybersecurity Information Sharing Act: The Devil Lurks and the Road to His House Appears Well Paved

    Cybersecurity Information Sharing Act: The Devil Lurks and the Road to His House Appears Well Paved
    Best Laid Plans. They say the devil is in the details. One might say that is most certainly the case with the recently advanced version of the Cybersecurity Information Sharing Act (“CISA”) that recently passed the U.S. Senate by…
Rank this Week: 1434

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 4584

Chronicle of Data Protection

Chronicle of Data Protection

Covers consumer privacy, data security, HIPAA, financial privacy and EU privacy. By Hogan Lovells.

http://www.hldataprotection.com
  • Feb 17

    Polish DPA Releases Data Privacy Inspection Plans – Targets Health, Shopping

    Polish DPA Releases Data Privacy Inspection Plans – Targets Health, Shopping
    The Polish Data Protection Authority has just released its inspection plans for 2017. This year, the GIODO has decided to target its review of compliance with data protection laws on the health services sector, as well as on the consumer…
  • Feb 16

    Your Cyber Minute: Watch Our Topline Digest of Today’s Cybersecurity Issue

    Your Cyber Minute: Watch Our Topline Digest of Today’s Cybersecurity Issue
    With cybersecurity issues evolving rapidly, every minute counts. Our new video series, Your Cyber Minute, is specifically designed for busy in-house counsel to gain practical perspectives – fast. This multi-part series is an extension…
  • Feb 15

    ICO Turns Spotlight on Data Broker Industry

    ICO Turns Spotlight on Data Broker Industry
    Data brokers are organisations that obtain data from a variety of sources and then sell or license it to third parties. Many trade in personal data, which is purchased by their customers for several purposes, most commonly to support…
Rank this Week: 1062

Clancco: Art & Law

Clancco: Art & Law

Covers the relationship between art and law with a focus on intellectual property, nonprofit tax-exempt organizations, free speech, and contemporary art. By Sergio Muñoz Sarmiento.

http://clancco.com/wp
  • Feb 17

    Battle Over August Sander Estate?

    Battle Over August Sander Estate?
    Or is it merely a misunderstanding as to what an “estate” is, legally and colloquially?
  • Feb 9

    “The Left Has Shanghaied Copyright”

    “The Left Has Shanghaied Copyright”
    The Federalist’s Robin Ridless takes some clean power-punches at the “ivy-cloistered radicalism” of the “all-appropriation-is-fair-use” jihadists. Here’s one example, To read a sampling of current…
  • Feb 8

    Can the “artworld” Resist President Trump? Don’t Count On It.

    Can the “artworld” Resist President Trump? Don’t Count On It.
    The Washington Post’s Tom Rachman shoots several zingers and comedy and farce that “political art” has become. Example number one: “Today, ‘politicized artist’ is as likely to evoke a whiny, entitled,…
Rank this Week: 248

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • May 15

    The New York Bitlicense is coming: What you need to know

    The New York Bitlicense is coming: What you need to know
    As the final version of the New York BitLicense will roll out within the next 2 weeks, bitcoin startups are gearing up to enter the U.S. market. The post The New York Bitlicense is coming: What you need to know appeared first on .
  • May 12

    What Makes a Brand a Good Trademark?

    What Makes a Brand a Good Trademark?
    A suggestive trademark can be a salutary compromise between marketing and legal considerations. The post What Makes a Brand a Good Trademark? appeared first on .
  • Apr 30

    LLC., C Corp, S Corp: How to Pick a Business Structure

    LLC., C Corp, S Corp: How to Pick a Business Structure
    Few decisions are as important as choosing the right entity for your new startup. This post explores the factors that matter most when making this decision. The post LLC., C Corp, S Corp: How to Pick a Business Structure appeared first on .
Rank this Week: 4489

Copyright, Intellectual Property,…

Copyright, Intellectual Property, Computer, Internet, e-Commerce Law

Covers IP/IT law, with a strong focus on copyright and internet law. By Barry Sookman.

http://www.barrysookman.com
Rank this Week: 599

Cyberinsurance Law Blog

Cyberinsurance Law Blog

News and comments on Business Law. By Dilworth Paxson L.L.P.

http://www.databreachninja.com/
  • Feb 2

    “Unfortunately, This Will Get Physical”

    “Unfortunately, This Will Get Physical”
    There have been relatively few confirmed cyber attacks resulting in substantial physical harm to property (other than computer hardware) and people.  The first known event involved the 2008-2010 infiltration of a computer virus called…
  • Jan 19

    “Carriers and Brokers Filling the Coverage Gaps”

    “Carriers and Brokers Filling the Coverage Gaps”
    Stand-alone cyberinsurance is a critical component of enterprise risk management.  But even companies with traditional and cyber coverage may, and usually do, have gaps in coverage created by what I’ve referred to as the ‘hot…
  • Dec 20

    “What Pension Fund Fiduciaries Need to Know About Cyberinsurance”

    “What Pension Fund Fiduciaries Need to Know About Cyberinsurance”
    This article was first published in the Fall 2016 issue of “The Bulletin,” a quarterly newsletter published by Kessler Topaz Meltzer & Check, a renowned law firm representing institutional investors and classes in securities,…
Rank this Week: 3843

CyberLaw Currents

CyberLaw Currents

Covers technology news headlines, statutes, and case law developments related to e-commerce, privacy, advertising, and intellectual property. Edited by Glen K. Westerback.

http://www.cyberlawcurrents.com
Rank this Week: 2112

Cybersecurity Lawyer Forum

Cybersecurity Lawyer Forum

Covers business and privacy law. By Jeffer Mangels Butler & Mitchell LLP.

http://cybersecurity.jmbm.com/
  • Feb 8

    Cybersecurity and Ransomware – It can get ugly when a hacker takes control of your smart building

    Cybersecurity and Ransomware – It can get ugly when a hacker takes control of your smart building
    Cyber risk affects businesses of every size and industry. A data breach can lead to negative publicity, loss of customer confidence and potential lawsuits. There can be a variety of unanticipated – and costly – business…
  • Dec 28

    Risk Assessment – the Key to Risk Management

    Risk Assessment – the Key to Risk Management
    One of the great frustrations in contemplating a data security program is that there is no such thing as a one-size-fits-all solution.  There is no law or regulation that specifies the exact steps a company needs to take in order achieve…
  • Dec 12

    Cybersecurity Law in 2017 – Predictions and Prognostication

    Cybersecurity Law in 2017 – Predictions and Prognostication
    December is the month for predictions.  During this month, commentators of all sorts and in all areas predict the trends and actions that will impact us during the coming year.  While speculating the future is a questionable…
Rank this Week: 4876

Data Breach Lawyer Blog

Data Breach Lawyer Blog

Covers intellectual property law. By Raines Feldman.

http://www.databreachlawyerblog.com/
  • Oct 24

    Trade Secrets and Internet Scraping

    Trade Secrets and Internet Scraping
    Recently, our cyber liability team discussed the impact internet data scraping has had upon trade secrets litigation.  Trade secrets cases are tough to win as plaintiffs.  The availability of competitive data online presents…
  • Oct 24

    Trade Secrets and Internet Scraping

    Trade Secrets and Internet Scraping
    Recently, our cyber liability team discussed the impact internet data scraping has had upon trade secrets litigation.  Trade secrets cases are tough to win as plaintiffs.  The availability of competitive data online presents…
  • Aug 30

    Be Mindful of Statute of Limitations for Internet Defamation

    Be Mindful of Statute of Limitations for Internet Defamation
    Often, data breaches are associated with internet defamation or other torts like impersonation.  Many times we come across strong defamation cases that cannot proceed because the potential client has waited too long to take action.…
Rank this Week: 4734

Data Privacy Monitor

Data Privacy Monitor

Covers data privacy, security and social media subjects. By Baker Hostetler.

http://www.dataprivacymonitor.com/
  • Jan 27

    Will the proposed “Countering Russian Hostilities Act” stop Russian cyberattacks?

    Will the proposed “Countering Russian Hostilities Act” stop Russian cyberattacks?
    On Jan. 10, 2017, a bipartisan group of five Republican and five Democratic senators announced their support for the Countering Russian Hostilities Act of 2017. Lindsey Graham, one of the senators who announced the proposed legislation, told…
  • Jan 26

    FINRA Seeks Comment on Blockchain

    FINRA Seeks Comment on Blockchain
    On Jan. 18, 2017, the Financial Industry Regulatory Authority (FINRA) became the latest organization to weigh in on distributed ledger technology (DLT), also known as blockchain. Recognizing the growing interest and potential benefits…
  • Jan 26

    FINRA Seeks Comment on Blockchain

    FINRA Seeks Comment on Blockchain
    On Jan. 18, 2017, the Financial Industry Regulatory Authority (FINRA) became the latest organization to weigh in on distributed ledger technology (DLT), also known as blockchain. Recognizing the growing interest and potential benefits…
Rank this Week: 1202

Data Protection Report

Data Protection Report

Covers global privacy, data protection and cybersecurity regulatory and litigation environment. By Norton Rose Fulbright.

http://www.dataprotectionreport.com/
  • Feb 7

    Settlement of Target Data Breach Consumer Class Action Is Derailed On Appeal

    Settlement of Target Data Breach Consumer Class Action Is Derailed On Appeal
    The Eighth Circuit Court of Appeals last week reversed the district court’s approval of a settlement and settlement class in the consolidated consumer class action arising from Target Corporation’s 2013 security incident. …
  • Jan 30

    NIST Releases Internet of Things (IoT) Security Guidance

    NIST Releases Internet of Things (IoT) Security Guidance
    Late last year, the National Institute of Standards and Technology (“NIST”) released  Special Publication 800-160 (the “Guidance”) on implementing security in Internet-of-Things (“IoT”) devices. …
  • Jan 26

    European Commission Publishes Proposal for the New e-Privacy Regulation

    European Commission Publishes Proposal for the New e-Privacy Regulation
    On 10 January 2017, the European Commission published the official proposal of the revised e-Privacy Regulation, which amends the current e-Privacy Directive. Many of the alarming changes that were included in the leaked December draft of the…
Rank this Week: 4689

Data Security Law Journal

Data Security Law Journal

Covers data security, cloud computing, data privacy and anything E. By Al Saikali.

http://www.datasecuritylawjournal.com/
  • Dec 11

    Law Firm Data Security: The First Class Action

    Law Firm Data Security: The First Class Action
    Earlier this year, Bloomberg Law reported that Edelson PC, a leading plaintiffs’ firm in privacy and data security law, filed a class action lawsuit against a regional law firm that had vulnerabilities in its information security…
  • Jun 22

    The SEC Makes Clear There is No Room For Error in Cybersecurity

    The SEC Makes Clear There is No Room For Error in Cybersecurity
    The SEC recently agreed to a $1,000,000 settlement of an enforcement action against Morgan Stanley for its failure to have sufficient data security policies and procedures to protect customer data. The settlement was significant for its…
  • Mar 9

    Understanding EMV Payment Card Technology

    Understanding EMV Payment Card Technology
    A significant change is happening to payment card technology. Any company that accepts credit cards as a form of payment needs to know about it if they intend to continue accepting payment cards in the future. The technology is called…
Rank this Week: 2689

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Feb 17

    Congress Must Protect Americans’ Location Privacy

    Congress Must Protect Americans’ Location Privacy
    Your smartphone, navigation system, fitness device, and more know where you are most of the time. Law enforcement should need a warrant to access the information these technologies track. Lawmakers have a chance to create warrant requirements…
  • Feb 17

    Federal Circuit Sticks By Its Bad Law on Personal Jurisdiction In Patent Case

    Federal Circuit Sticks By Its Bad Law on Personal Jurisdiction In Patent Case
    Xilinx will get to fight patent troll in home court, but many troll targets will still be dragged to distant and inconvenient forums. If a patent troll threatens your company, can you go to your nearest federal court and ask for a ruling that…
  • Feb 17

    A Step Forward in Microsoft’s Legal Battle for Transparency about Government Data Request

    A Step Forward in Microsoft’s Legal Battle for Transparency about Government Data Request
    Last week, a federal court in Seattle issued a ruling in Microsoft’s ongoing challenge to the law that lets courts impose indefinite gag orders on Internet companies when they receive requests for information about their customers.…
Rank this Week: 3701

Dot Indicia

Dot Indicia

Covers information, privacy and security from a Canadian perspective. By Michael Power.

http://michaelpower.ca
  • Feb 22

    Corporate Activism In the Protection of Privacy

    Corporate Activism In the Protection of Privacy
    Just how far is business supposed to go in protecting privacy? In the United States, one can starkly see an example with Apple and the retrieval of encrypted iPhone data. But a recent Canadian case also shines a spotlight on the role of the…
  • Jan 27

    Another New Privacy Tort for Ontario

    Another New Privacy Tort for Ontario
    Last week saw a rather striking decision issued by the Ontario Superior Court of Justice. 2102 saw the tort of “intrusion upon seclusion” recognized; in 2016, we now have the tort of “public disclosure of private…
  • Jan 19

    New Privacy Tort Empowers “Revenge Porn” Victim

    New Privacy Tort Empowers “Revenge Porn” Victim
    Manitoba’s Intimate Image Protection Act came into force on 15 January 2016. The statute does something that I think is especially noteworthy – it creates a new privacy tort concerning the “non-consensual distribution of…
Rank this Week: 2475

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
  • Dec 10

    DNS Policy Notes for Dec. 10, 2014

    DNS Policy Notes for Dec. 10, 2014
    Topics include the inclusion in the omnibus spending bill language defunding the NTIA's involvement in the IANA functions transition policy development effort, Secretary Strickling's continuing effort to inject fact-based reasoning to the…
  • Nov 24

    DNS Policy Notes for Nov. 24, 2014

    DNS Policy Notes for Nov. 24, 2014
    Topics include Russia's tightening grip on the Internet, Facebook's foray into health content sans GAC advice, the latest twist in the Yoyo.email story, trademark owners on a URS hot streak, and a pair of industry analyses of the new…
  • Nov 21

    DNS Policy Notes for Nov. 21, 2014

    DNS Policy Notes for Nov. 21, 2014
    Topics include the Defending Internet Freedom Act of 2014, coverage of the World Internet Conference, the GAC's inquiry on additional protections for geographic names in new gTLDs, grousing about the NETmundial Initiative, and the defeat of…
Rank this Week: 4728

Fair Competition Law Blog

Fair Competition Law Blog

Covers trade secrets, noncompetes, privacy and security, the Computer Fraud and Abuse Act, trademarks, copyrights, and business torts. By Russell Beck.

http://faircompetitionlaw.com
  • Feb 4

    Trade Secrets Laws and the UTSA – A 50 State and Federal Law Survey Chart (revised)

    Trade Secrets Laws and the UTSA – A 50 State and Federal Law Survey Chart (revised)
    Every state but Massachusetts and New York has adopted the Uniform Trade Secrets Act (the UTSA) in one form or another – though some may quibble with whether Alabama or North Carolina actually adopted it. (The Uniform Law…
  • Feb 4

    BRR 50-State Noncompete Chart (Updated Today)

    BRR 50-State Noncompete Chart (Updated Today)
    The BRR 50 State Noncompete Chart has been updated to reflect a few developments and to make a few tweaks since the last draft. Most significantly, Georgia surprised many (me included) with its decision that the 2011…
  • Feb 1

    Trade Secret and Noncompete Survey – National Case Graph 2017

    Trade Secret and Noncompete Survey – National Case Graph 2017
    As regular readers of this blog know, several years ago, I became curious to see how many reported trade secret / noncompete decisions were issued each year in all federal and state courts around the country. So, I did a “back of the…
Rank this Week: 1483

Georgia Internet Law

Georgia Internet Law

Provides information and commentary regarding Internet law, e-commerce and technology law, World Wide Web regulation, and intellectual property. By Richardson Sixth, LLC.

http://georgiainternetlaw.com/
  • Nov 28

    Bitcoin and Consumer Protection Measures in Digital Currency

    Bitcoin and Consumer Protection Measures in Digital Currency
    This is another in a series of posts focused on the first state regulation of cryptocurrency businesses.  Ostensibly, depending on one’s opinion, the New York BitLicense regulation of bitcoin (and digital currency businesses…
  • Nov 2

    The Bitcoin Business State License Requirement: BitLicense

    The Bitcoin Business State License Requirement: BitLicense
    The last post in this series by Atlanta Bitcoin attorney Mark Richardson VI familiarized the reader with the regulatory vernacular of the New York BitLicense law now in effect.  Let’s now examine to whom exactly that license…
  • Oct 19

    BitLicense Legal Regulations: What are We Talking About?

    BitLicense Legal Regulations: What are We Talking About?
    Here’s the first installment of a Crypto-Counsel ℠ series on the New York State Department of Financial Services (“NYDFS“) “BitLicense” regulations applicable to digital currency businesses (the…
Rank this Week: 3235

German IT Law

German IT Law

Provides updates and analysis on German and European IP/IT, technology, media and (open source) software law. By JBB Rechtsanwälte.

http://germanitlaw.com/
Rank this Week: 3088

Global Regulatory Enforcement Law…

Global Regulatory Enforcement Law Blog

Covers antitrust, privacy, international trade, and white color criminal defense. By Reed Smith.

http://www.globalregulatoryenforcementlawblog.com
  • Feb 10

    Private Equity Firm Held Responsible for Portfolio Company’s Antitrust Violation

    Private Equity Firm Held Responsible for Portfolio Company’s Antitrust Violation
    In January of 2017 a private equity firm, Bencis, was found liable for a portfolio company’s involvement as one of 14 cartelists producing flour in the Netherlands, Belgium, and Germany. The Authority for Consumers and Markets (ACM)…
  • Feb 10

    2017 Expectations of the U.S. CFTC Enforcement Agenda

    2017 Expectations of the U.S. CFTC Enforcement Agenda
    The U.S. Commodity Futures Trading Commission is undergoing a transformation with the new Trump administration while staying on course with its statutory mission of protecting US commodities and derivatives markets.  Some of CFTC’s…
  • Feb 10

    Iran Missile Test Leads to New Sanction

    Iran Missile Test Leads to New Sanction
    On February 2nd the Office of Foreign Assets Control (“OFAC”) imposed new sanctions on 13 individuals and 12 entities that were believed to be “involved in procuring technology and/or materials to support Iran’s…
Rank this Week: 301

HIPAA Blog

HIPAA Blog

Features a discussion of medical privacy. By Jeffrey P. Drummond.

http://hipaablog.blogspot.com/
  • Feb 17

    Another Day, Another Monster Fine: This…

    Another Day, Another Monster Fine: This time it's Memorial Healthcare System (Florida), with a $5.5 million fine for not following access controls and allowing terminated employees to continue accessing medical records after being terminated.…
  • Feb 14

    On the News: Some dude talking about HIPAA…

    On the News: Some dude talking about HIPAA and misdirected faxes.
  • Feb 9

    Interesting case, wrong conclusion:…

    Interesting case, wrong conclusion: University of Pittsburg Medical Center suffered a data breach where 62,000 employees' SSNs and tax data were breached, but a Pennsylvania court has determined that as an employer, it has no duty to its…
Rank this Week: 648

Information Law Group

Information Law Group

Covers advertising law, privacy, information security and intellectual property.

http://www.infolawgroup.com/
  • Feb 9

    InfoLawGroup Launches CPO on Demand™ Service

    InfoLawGroup Launches CPO on Demand™ Service
    InfoLawGroup announces the launch of CPO on Demand™, a service through which we serve as outside Chief Privacy Officers, Privacy Counsel, and DPOs as required under EU regulation. CPO on Demand™ brings the depth and breadth of our…
  • Feb 7

    FTC and NJ AG Reach $2.2 Million Settlement to Resolve Vizio Video Privacy Matter

    FTC and NJ AG Reach $2.2 Million Settlement to Resolve Vizio Video Privacy Matter
    On Monday, February 6, 2017, the Federal Trade Commission (“FTC”) and New Jersey Attorney General (“NJAG”) announced a settlement agreement to resolve their joint enforcement action against Vizio. The regulators…
  • Feb 2

    NJ TCCWNA Claim Thwarted by CA Choice-of-Law Provision

    NJ TCCWNA Claim Thwarted by CA Choice-of-Law Provision
    As we have previously written about, 2016 saw a wave of litigation brought under New Jersey’s Truth-in-Consumer Contracting, Warranty, and Notice Act (“TCCWNA”) regarding website Terms of Use.  While service…
Rank this Week: 1099

Information Technology Law Blog

Information Technology Law Blog

Covers social media, e-discovery, privacy, and intellectual property. By Foster Swift Collins & Smith PC.

http://www.michiganitlaw.com/
  • Feb 15

    Fiduciary Rule update: the beginning of the end?

    Fiduciary Rule update: the beginning of the end?
    Shortly after our first article on the DOL Fiduciary Rule the White House issued an Executive Order that requires the Department of Labor (the "DOL") to revisit the Fiduciary Rule (the "Fiduciary Rule" or the "Rule") and the Prohibited…
  • Feb 7

    5 Tips for Investigating and Purchasing Cyber Insurance

    5 Tips for Investigating and Purchasing Cyber Insurance
    In 2016 Lansing, MI's Board of Water and Light fell victim to a cyber-attack that resulted in $2.4 million in costs, including a $25,000 ransom paid to the perpetrators. In the aftermath of the breach, BWL announced that it was filing for a…
  • Jan 31

    The New Fiduciary Rule and its Future

    The New Fiduciary Rule and its Future
    With a sea of political change in Washington this year, many are speculating on what regulatory reforms the Trump administration and a Republican Congress will make in 2017. One reform in particular is commonly mentioned: a repeal, delay, or…
Rank this Week: 3436

Inforrm\'s Blog

Inforrm\'s Blog

Discusses issues of media law and responsibility with a special focus on libel and privacy law and the balance between the two.

https://inforrm.wordpress.com/
Rank this Week: 128

Inside Privacy

Inside Privacy

Covers global privacy and data security. By Covington & Burling LLP.

http://www.insideprivacy.com
Rank this Week: 792

LegalTXTS

LegalTXTS

Covers law and technology, with an emphasis on legal issues regarding digital media, privacy and data security, and information management. By Elijah Yip.

http://www.legaltxts.com/
  • Jan 25

    The Tax Scams Cometh

    The Tax Scams Cometh
    Tax season is miserable for many because it means having to cut a check to the IRS.  But it’s not just Uncle Sam who’s interested in your money.  Scammers are also looking to get paid, and they’ll do it by stealing…
  • Oct 26

    Police officer suspended for controversial Facebook posts allowed to go to trial on First Amendment retaliation claim

    Police officer suspended for controversial Facebook posts allowed to go to trial on First Amendment retaliation claim
    It’s generally a good practice to set standards of online employee conduct to prevent the social media activity of employees from disrupting the workplace or tarnishing your organization’s reputation.  But the mere fact that…
  • Sep 21

    Six Years Later, NLRB’s Social Media Guidelines Still Confound

    Six Years Later, NLRB’s Social Media Guidelines Still Confound
    Six years ago, the National Labor Relations Board (NLRB) became one of the first governmental agencies to regulate social media use in the workplace.  In 2010 and 2011, the NLRB issued a series of guidance memos and decisions sketching…
Rank this Week: 1721

New Media & Technology Law Blog

New Media & Technology Law Blog

Covers intellectual property, data security, online marketing and online commerce. By Proskauer.

http://newmedialaw.proskauer.com
Rank this Week: 2695

North Carolina Journal of Law &…

North Carolina Journal of Law & Technology

Features legal scholarship in law and technology topics, including intellectual property law, cyberspace law, environmental law, criminal law, health law, and privacy law.

http://ncjolt.org/
  • Feb 17

    White House Staff Using Secretive Encrypted Apps to Leak Information about the Current Trump Administration

    White House Staff Using Secretive Encrypted Apps to Leak Information about the Current Trump Administration
    President Donald Trump stated in an animated press conference on February 16, 2017 that his “administration is running like a fine-tuned machine.” The number of leaks plaguing the current administration, and the information being…
  • Feb 17

    The Role of Telehealth and Privacy in the Trump Era

    The Role of Telehealth and Privacy in the Trump Era
    Telehealth, the use of telecommunication technologies to promote health care interactions, education, and administration, has been focused on lately by the media. The technology involved includes the internet, streaming, and even apps for…
  • Feb 15

    Disney v. VidAngel: Pious Pirates or Fighting for Filtering?

    Disney v. VidAngel: Pious Pirates or Fighting for Filtering?
    The on-demand economy has arrived. More and more companies are dedicating their business to giving people what they want, when they want it. In terms of watching movies and television shows, various on-demand subscription streaming services…
Rank this Week: 1751

Peter Fleischer: Privacy...?

Peter Fleischer: Privacy...?

Covers privacy law and corporate privacy policy. By Peter Fleischer, Global Privacy Counsel for Google.

http://peterfleischer.blogspot.com/
  • May 14

    Harvard Nostalgia

    Harvard Nostalgia
    The older I get, the more I think back to Harvard with nostalgia.  I was very young at Harvard.  I went to college straight out of the 10th grade, and I graduated at the age of 19.  That officially makes me a high school…
  • Apr 6

    From pool to pool

    From pool to pool
    I love my pools.    In Paris, my pool is in a fancy private club, in the Bois de Boulogne, on the edge of Paris.  It's a gorgeous 50-meter pool, open year-round outdoors, framed by views of the Eiffel Tower. My pool nurtured…
  • Mar 12

    A Science Fiction Novel

    A Science Fiction Novel
    I'd like to crowd-source the plot for a science fiction novel.  Would this make a good story?:In a not-too-distant future, say 20 years from now, humanity lives through the biggest change in its history.  It doesn't happen…
Rank this Week: 2080

Politics of Privacy Blog

Politics of Privacy Blog

Covers privacy, liberty, security, economy and their interaction. By Andreas Busch.

http://politicsofprivacy.blogspot.com/
  • Jan 18

    Again: loss of personal data by public officials in the UK

    Again: loss of personal data by public officials in the UK
    Less than two months after the loss of the personal details of 25 million people by the UK's tax authorities (see this blog entry), another substantial loss of personal data has occurred in Britain. As the BBC website writes, a laptop…
  • Jan 7

    Jeremy Clarkson and identity theft

    Jeremy Clarkson and identity theft
    Well, first of all, a happy new year to my readers! And I am glad to be able to report that page visits to this blog more than doubled in 2007 over 2006, to well over 5000 pageviews. I am very happy about this and will take it as a reminder…
  • Nov 20

    British tax authorities lose personal details of 25 million people

    British tax authorities lose personal details of 25 million people
    A crass case of neglect and breach of data protection legislation has led to the loss of discs containing the names, addresses, dates of birth, bank account details and National Insurance numbers of 25 million people in the United Kingdom, it…
Rank this Week: 2654

Primary Opinion

Primary Opinion

Covers corporate, employment, IP and privacy news.

http://primaryopinion.com/
  • Nov 27

    Social media marketing for lawyers and law firm

    Social media marketing for lawyers and law firm
    Law firms of all sizes are now embracing social media as a means to showcase expertise and reach new customers. But, opening a Twitter, LinkedIn or Google+ account is only the first part of the process. Here are five pointers for realising…
  • Oct 13

    Legal opinion round up: CJEU’s ruling on registering 3D object trademark

    Legal opinion round up: CJEU’s ruling on registering 3D object trademark
    3D shape marks took another battering at the end of September with the European Court of Justice (CJEU) ruling that such trademarks can be declared invalid if the shape can be linked ‘essentially’ or ‘substantially’ to…
  • Oct 7

    Meet our independent blogger

    Meet our independent blogger
    Our new content portal www.primaryopinion.com draws together the best of the IP industry’s news, commentary and knowledge, so that IP professionals, in-house counsel and business heads can access it on one up-to-date platform. That…
Rank this Week: 4889

Privacy & Security Matters

Privacy & Security Matters

By Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

http://www.privacyandsecuritymatters.com
  • Feb 16

    The February 2017 Update – The Mintz Matrix

    The February 2017 Update – The Mintz Matrix
    As our readers know we maintain a summary of U.S. state data breach notification laws, which we refer to as the “Mintz Matrix.”   Our latest update is available here, and it should be part of your incident response…
  • Feb 14

    WEBINAR – Access, Correction, Erasure and Portability under the GDPR: How to Minimize the Burden

    WEBINAR – Access, Correction, Erasure and Portability under the GDPR: How to Minimize the Burden
    Since September, the Mintz Levin Privacy Webinar Series has focused on the upcoming EU General Data Protection Regulation (GDPR) to help businesses understand the reach and scope of the GDPR and prepare for the potentially game-changing…
  • Feb 13

    Who is Watching you Watch TV? If You Have VIZIO … Your TV Might Be Watching You

    Who is Watching you Watch TV? If You Have VIZIO … Your TV Might Be Watching You
      What does your TV-watching history say about you? According to a recent lawsuit against VIZIO, Inc., it might be more than you think! One of the world’s largest sellers of “smart” televisions has recently paid a $2.2…
Rank this Week: 1566

Privacy & Security Source

Privacy & Security Source

Covers anonymous subpoenas, behavioral advertising, employee monitoring, geolocation and information security. By Foley & Lardner LLP.

http://www.privacysecuritysource.com
Rank this Week: 3743

Privacy & Information Security…

Privacy & Information Security Law Blog

Provides global privacy and information security law updates and analysis. By Hunton & Williams.

https://www.huntonprivacyblog.com/
  • Feb 13

    CIPL to Hold Next GDPR Implementation Workshop in Madrid

    CIPL to Hold Next GDPR Implementation Workshop in Madrid
    On March 6 and 7, 2017, the Centre for Information Policy Leadership at Hunton & Williams LLP and over 100 public and private sector participants in CIPL’s GDPR Implementation Project will convene in Madrid, Spain, for CIPL’s…
  • Feb 9

    DPA of Argentina Issues Draft Data Protection Bill

    DPA of Argentina Issues Draft Data Protection Bill
    Pablo Palazzi, from Buenos Aires law firm Allende & Brea, reports that earlier this month, the Argentine Data Protection Agency posted the first draft of a new data protection bill on its website. The Draft Bill is heavily based on the EU…
  • Feb 9

    House of Representatives Passes Email Privacy Act

    House of Representatives Passes Email Privacy Act
    On February 6, 2017, the House of Representatives suspended its rules and passed by voice vote H.R 387, the Email Privacy Act. The Email Privacy Act now moves to the Senate, where it will be considered by the Senate Judiciary Committee.…
Rank this Week: 217

Privacy and Data Security Law

Privacy and Data Security Law

Covers the creation, collection, use, destruction and security of data. By Dentons.

http://www.privacyanddatasecuritylaw.com/
  • Dec 21

    Private Right of Action under CASL coming July 2017

    Private Right of Action under CASL coming July 2017
    Canada’s Anti-Spam Law came into force on July 1, 2014.  Since then, all eyes have been on the Canadian Radio-television and Telecommunications Commission (CRTC) for decisions concerning CASL violations. …
  • Dec 3

    HHS Issues Warning About Phishing Campaign Disguised As Official Communication

    HHS Issues Warning About Phishing Campaign Disguised As Official Communication
    As part of its efforts to assess compliance with the HIPAA Privacy, Security and Breach Notification Rules, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) engages in audits of covered entities and their…
  • Nov 23

    FTC Announces New Guidance on Ransomware

    FTC Announces New Guidance on Ransomware
    On November 10, 2016, the U.S. Federal Trade Commission (FTC) released new guidance for businesses and consumers on the impact of, and how to respond to ransomware.  Ransomware is a form of malicious software that infiltrates computer…
Rank this Week: 1884

Privacy and IP Law Blog

Privacy and IP Law Blog

Addresses recent events in trademark, copyright, computer and privacy law. By Christina Frangiosa.

http://privacyandiplawblog.com/
  • Nov 28

    Common Questions – Can I Copyright My Formula?

    Common Questions – Can I Copyright My Formula?
    Probably not. No matter how new a formula (a.k.a. recipe) may be, if it simply comprises a combination of ingredients mixed together to form a new and unique dish, it is not likely to be copyrightable. And, once published, even if the recipe…
  • Nov 17

    Common Questions: What’s the Difference Between a Trademark and a Service Mark?

    Common Questions: What’s the Difference Between a Trademark and a Service Mark?
    This is actually a trick question – the answer is, “not much”. Generally, trademarks refer to source-identifying marks used in connection with goods (products) and service marks are used for the same purpose, but in…
  • Sep 9

    TEMPORARY HIATUS

    TEMPORARY HIATUS
    Dear Readers: I am pleased to announce that I have joined the IP practice of the law firm, Eckert Seamans Cherin & Mellott, LLC, in its Philadelphia Office. While I’m getting settled, I will not be in a position to post updates to…
Rank this Week: 1229

Privacy and Security Law Blog

Privacy and Security Law Blog

Covers biometrics, HIPAA, identity theft, PATRIOT Act, phishing and more. By Davis Wright Tremaine.

http://www.privsecblog.com/
  • Feb 17

    42 C.F.R. Part 2 Final Rule Is Officially Delayed … Can Comments to HHS and OMB Fix It?

    42 C.F.R. Part 2 Final Rule Is Officially Delayed … Can Comments to HHS and OMB Fix It?
    On January 18, 2017, the U.S. Department of Health and Human Services (HHS) published a final rule amending the Confidentiality of Substance Use Disorder Patient Records rule at 42 C.F.R. Part 2. Yesterday, HHS delayed the effective date of…
  • Feb 13

    To Settle or Not to Settle – That Is the Question Raised by Recent HIPAA CMP

    To Settle or Not to Settle – That Is the Question Raised by Recent HIPAA CMP
    On February 1, 2017, the Department of Health and Human Services, Office for Civil Rights (“OCR”) announced that the Children’s Medical Center of Dallas (“Children’s”) has paid a civil monetary penalty…
  • Feb 9

    HIPAA Small Breach Notifications Due March 1

    HIPAA Small Breach Notifications Due March 1
    March 1, 2017 is the date by which HIPAA covered entities must notify the U.S. Department of Health and Human Services Office for Civil Rights (OCR) of “small” breaches of unsecured protected health information that were…
Rank this Week: 1030

Privacy Law Blog

Privacy Law Blog

Covers data privacy, identity theft, invasion of privacy, and national security legal issues. By Proskauer Rose LLP.

http://privacylaw.proskauer.com/
  • Feb 16

    Kingdom in the Cloud: Saudi Arabia’s Draft Cloud Computing Regulation

    Kingdom in the Cloud: Saudi Arabia’s Draft Cloud Computing Regulation
    Courtney M. Bowman Proskauer litigation associate Courtney Bowman and Jonathan Reardon, head of the Al Khobar, Saudi Arabia office of the Middle East-based firm Al Tamini & Co., recently co-authored an article published by Bloomberg about…
  • Jan 30

    Qatar’s New Personal Data Privacy Law

    Qatar’s New Personal Data Privacy Law
    Courtney M. Bowman At the end of last year, Qatar became the first Gulf state to enact a comprehensive privacy law. Until now, the many companies that market to consumers or have employees based in Gulf Cooperation Council (GCC) countries…
  • Jan 25

    Draft Privacy and Electronic Communications Regulation published by European Commission

    Draft Privacy and Electronic Communications Regulation published by European Commission
    Kelly McMullon The European Commission has released proposals for new legislation that seeks to create stronger privacy in electronic communications. The draft Privacy and Electronic Communications Regulation (the “Regulation”) is…
Rank this Week: 1011

Reasonable Expectation

Reasonable Expectation

Focuses on privacy and data security. By M. Scott Koller.

http://www.reasonableexpectation.com
  • Jun 30

    Are Data Breach Investigations Privileged?

    Are Data Breach Investigations Privileged?
    #150654797 / gettyimages.com Are Data Breach Investigations Privileged? Originally Published on the InfoLaw Group Blog: Over the past year, the number of data breaches has skyrocketed and, as a result, companies are facing increased risk of…
  • Mar 20

    FTC Seeks Public Comment on iKeepSafe’s Proposed Safe Harbor Program Under the Children’s Online Privacy Protection Rule

    FTC Seeks Public Comment on iKeepSafe’s Proposed Safe Harbor Program Under the Children’s Online Privacy Protection Rule
    Internet Keep Safe Coalition (iKeep Safe) has submitted a proposed safe harbor program to the Federal Trade Commission under the the agency’s Children’s Online Privacy Protection Rule. Under 16 C.F.R. 312.11, COPPA safe…
  • Feb 28

    Obama’s new cybersecurity plan a good start

    Obama’s new cybersecurity plan a good start
    I recently authored an article for the Daily Journal on the new cybersecurity framework.  You can read about it by visiting the Daily Journal.  
Rank this Week: 2819

Security, Privacy and The Law

Security, Privacy and The Law

Covers information security and privacy issues. By Foley Hoag LLP.

http://www.securityprivacyandthelaw.com
  • Feb 18

    Want to Know Why Memorial Healthcare Systems Is Paying HHS OCR $5.5 Million?

    Want to Know Why Memorial Healthcare Systems Is Paying HHS OCR $5.5 Million?
    On February 16, 2017, HHS OCR announced that Memorial Healthcare Systems (MHS) had paid the U.S. Department of Health and Human Services (HHS) $5.5 million to settle potential violations of HIPAA’s Privacy and Security Rules and agreed…
  • Feb 17

    Webinar on March 16: Internet Takedowns and Domain Name Disputes for the Generalist In-House Counsel

    Webinar on March 16: Internet Takedowns and Domain Name Disputes for the Generalist In-House Counsel
    As all aspects of business inexorably shift toward online, it is not surprising that intellectual property infringement, cybersquatting, and related internet abuses abound. Luckily, there are various procedures available by which aggrieved…
  • Feb 16

    Court Declines to Issue Seizure Order under Defend Trade Secrets Act

    Court Declines to Issue Seizure Order under Defend Trade Secrets Act
    As we previously reported, the federal Defend Trade Secrets Act (DTSA) enacted last May includes a powerful ex parte seizure proceeding that allows courts in “extraordinary circumstances” to order the seizure of property…
Rank this Week: 1940

sobre privacidad y protección de…

sobre privacidad y protección de datos

Spanish language blog about privacy and data protection. By Daniel A. Lopez Carballo.

http://www.dlcarballo.com/
Rank this Week: 2728

Socially Aware Blog

Socially Aware Blog

Covers the law and business of social media. By Morrison Foerster.

http://www.sociallyawareblog.com/
Rank this Week: 1421