Most Popular Privacy Law Blawgs Expanded View List View

Blogs 1 - 45 of 54

Advertising Law Blog

Advertising Law Blog

Provides commentary and news on developing legal issues in advertising, promotional marketing, Internet, and privacy law. By Olshan Frome Wolosky LLP.

http://www.olshanlaw.com/blogs-Advertising-Law-Blog
  • Aug 27

    Andrew Lustigman Quoted in AdExchanger.Com on Cybersecurity Practice

    Andrew Lustigman Quoted in AdExchanger.Com on Cybersecurity Practice
    Olshan Advertising Partner Andrew Lustigman was quoted regarding FTC’s power to penalize companies for insufficient cybersecurity practices. Read More › Tags: Advertising, Advertising Law, cybersecurity, FTC,…
  • Aug 25

    DirectTv

    DirectTv
    Advertisers may believe that claims contained in light-hearted or humorous advertising are immune from challenge. Read More › Tags: Ads, Advertising, DirectTV, NAD, NARB
  • Aug 23

    Text Marketer Gains Legal Victory in California

    Text Marketer Gains Legal Victory in California
    “Human intervention” was key to avoiding TCPA liability Read More › Tags: Auto-dial, FCC, Mass texts, TCPA, TCPA Claim, TCPA Liability
Rank this Week: 718

Beyond Telecom Law Blog

Beyond Telecom Law Blog

Covers telecom policy, services agreements and data security/privacy. By Keller and Heckman LLP.

http://www.beyondtelecomlawblog.com
  • Jul 20

    M&A Counsel: Don't Overlook Section 310(d) of the Communications Act

    M&A Counsel: Don't Overlook Section 310(d) of the Communications Act
    This year’s mergers-and-acquisitions boom is re-shaping industries and contributing handsomely to the bottom lines of leading investment banks.  One statutory provision triggered in many transactions—not just those involving…
  • May 19

    Open Internet Order: Appellate Advocacy at Full Throttle

    Open Internet Order: Appellate Advocacy at Full Throttle
    The appeals of the Open Internet Order have been consolidated in United States Telecom Assoc. v. FCC, No. 15-1063 (and consolidated cases) (D.C. Cir. filed Mar. 23, 2015).  Thus, the court that decided Verizon v. FCC will rule on the…
  • Mar 30

    The Open Internet Order - In Brief

    The Open Internet Order - In Brief
    The entry summarizes the major elements of the Open Internet Order.  An analysis of the FCC’s policy determinations and reasoning for regulating broadband internet access service as a Title II telecommunications service will be…
Rank this Week: 2658

Broadband Law Advisor

Broadband Law Advisor

Provides insight and information on the FCC's National Broadband Plan. By Davis Wright Tremaine LLP.

http://www.broadbandlawadvisor.com/
  • Jul 21

    An Oft-Forgotten Detail in Infrastructure Deals – Telecom License

    An Oft-Forgotten Detail in Infrastructure Deals – Telecom License
    Much of the nation’s infrastructure, from energy to transportation, depends upon telecommunications for safe and efficient operation. The facilities that provide such communications services generally are proprietary operations that are…
  • Jun 9

    Open Internet Webinar

    Open Internet Webinar
    June 11, 2015 1:00 PM – 2:00 PM EST CLE   Please join us for an interactive discussion on the FCC’s new “Open Internet” (a.k.a. net neutrality) rules on the eve of their effective date to learn how these sweeping…
  • Jun 9

    Open Internet Rules Become Effective June 12: Impact on Pole Attachment

    Open Internet Rules Become Effective June 12: Impact on Pole Attachment
    On Friday, June 12 – barring a judicial stay – many of the FCC’s “Open Internet” rules will become effective.  A significant consequence of the reclassification of retail broadband Internet access service…
Rank this Week: 2149

Business Litigation Info

Business Litigation Info

Covers business litigation, intellectual property, data security, and advertising and media. By Faruki Ireland & Cox P.L.L.

http://www.businesslitigationinfo.com/
  • Aug 28

    Scot Ganow Discusses the Ashley Madison Breach on 700 WLW

    Scot Ganow Discusses the Ashley Madison Breach on 700 WLW
    I have always written and spoken about the individual value for privacy and when it is violated, how that violation can be very personal and akin to trauma. The recent breach at Ashley Madison and the potential harm it may unleash on the…
  • Aug 27

    Is Footage of City Council Meetings Protected by Copyright Laws?

    Is Footage of City Council Meetings Protected by Copyright Laws?
    Not according to one federal judge in California. In City of Inglewood v. Joseph Teixeira, et. al., No. 2:15-cv-01815 (C.D. Ca. Aug. 20, 2015), United Stated District Judge Michael W. Fitzgerald found that California state law bars the city…
  • Aug 26

    Doe v. Gangland: Why Breaking a Confidentiality Agreement with a Former Gang-Member is a Bad Idea

    Doe v. Gangland: Why Breaking a Confidentiality Agreement with a Former Gang-Member is a Bad Idea
    For those of you into true-crime documentaries, have you ever wondered how producers get criminals and accused criminals to talk on the record?  In rare instances, some subjects of a documentary will agree to talk because they want to…
Rank this Week: 2108

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 3660

Chronicle of Data Protection

Chronicle of Data Protection

Covers consumer privacy, data security, HIPAA, financial privacy and EU privacy. By Hogan Lovells.

http://www.hldataprotection.com
  • Aug 28

    California Legislature Advances UAS Legislation

    California Legislature Advances UAS Legislation
    For the past several years, California’s Legislature has actively sought to regulate unmanned aerial systems, including, but not only, through privacy-related legislation.. In the 2014 session, one bill passed and was signed by Governor…
  • Aug 27

    Analysis of FTC v. Wyndham: Third Circuit Affirms FTC Authority to Regulate Data Security

    Analysis of FTC v. Wyndham: Third Circuit Affirms FTC Authority to Regulate Data Security
    On Monday, August 24, 2015, the U.S. Court of Appeals for the Third Circuit issued its opinion in FTC v. Wyndham Worldwide Corp upholding the authority of the Federal Trade Commissionto oversee cybersecurity practices. The Wyndham case first…
  • Aug 25

    Influential OECD Report Sets Out Future Challenges for the Digital Economy

    Influential OECD Report Sets Out Future Challenges for the Digital Economy
    The Organisation for Economic Co-operation and Development (OECD) has published its 2015 Digital Economy Outlook ("Report"), a survey of changes and opportunities in, and challenges arising from, the digital economy. The Report identifies…
Rank this Week: 2357

Clancco: Art & Law

Clancco: Art & Law

Covers the relationship between art and law with a focus on intellectual property, nonprofit tax-exempt organizations, free speech, and contemporary art. By Sergio Muñoz Sarmiento.

http://clancco.com/wp
  • Aug 30

    “a glaring example of the commoditization of the art world.”

    “a glaring example of the commoditization of the art world.”
      This is what happens when an artist doesn’t perform to the tunes of an art dealer. Los Angeles dealer and artist agent Stefan Simchowitz and Dublin dealer Jonathan Ellis King have filed suit against the Ghanaian artist Ibrahim…
  • Aug 26

    Now Accepting Applications for the 2016 Art & Law Program

    Now Accepting Applications for the 2016 Art & Law Program
    Applications for the 2016 Art & Law Program are now being accepted.  Deadline for applications:  October 19, 2015 Going on its 7th year, The Program seeks qualified, open-minded and self-motivated individuals with an…
  • Aug 26

    Germany Stops Collector From Selling Artwork

    Germany Stops Collector From Selling Artwork
    German public broadcaster Westdeutscher Rundfunk (WDR), which controversially put some of its art collection up for sale to pay off debts, has been banned from exporting two paintings by Ernst Ludwig Kirchner and Max Beckmann. More here.
Rank this Week: 286

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • May 15

    The New York Bitlicense is coming: What you need to know

    The New York Bitlicense is coming: What you need to know
    As the final version of the New York BitLicense will roll out within the next 2 weeks, bitcoin startups are gearing up to enter the U.S. market. The post The New York Bitlicense is coming: What you need to know appeared first on .
  • May 12

    What Makes a Brand a Good Trademark?

    What Makes a Brand a Good Trademark?
    A suggestive trademark can be a salutary compromise between marketing and legal considerations. The post What Makes a Brand a Good Trademark? appeared first on .
  • Apr 30

    LLC., C Corp, S Corp: How to Pick a Business Structure

    LLC., C Corp, S Corp: How to Pick a Business Structure
    Few decisions are as important as choosing the right entity for your new startup. This post explores the factors that matter most when making this decision. The post LLC., C Corp, S Corp: How to Pick a Business Structure appeared first on .
Rank this Week: 3470

Copyright, Intellectual Property,…

Copyright, Intellectual Property, Computer, Internet, e-Commerce Law

Covers IP/IT law, with a strong focus on copyright and internet law. By Barry Sookman.

http://www.barrysookman.com
  • Aug 31

    Computer and Internet Updates for 2015-08-30

    Computer and Internet Updates for 2015-08-30
    Ashley Madison's members by the numbers – Technology & Science http://t.co/RNNSWJg9WM -> Air Canada blames computer glitch for bargain clawback – British Columbia http://t.co/CYTZi6gULi -> Canada's Anti-Spam Legislation…
  • Aug 30

    Computer and Internet Weekly Updates for 2015-08-29

    Computer and Internet Weekly Updates for 2015-08-29
    Computer and Internet Weekly Updates for 2015-08-22 http://t.co/hkfW47Zzbj -> Computer and Internet Weekly Updates for 2015-08-22: Computer and Internet Updates for 2015-08-15 htt… http://t.co/ENMChVQIao -> NC Man Admits To Music…
  • Aug 28

    Computer and Internet Updates for 2015-08-27

    Computer and Internet Updates for 2015-08-27
    How new global tax rules could erode your financial privacy http://t.co/5GjybuGOI2 -> So you just want politicians to leave you alone? Good luck with that. https://t.co/9H12qkTpFo -> Copyright preemption notwithstanding no copyright…
Rank this Week: 1161

CyberLaw Currents

CyberLaw Currents

Covers technology news headlines, statutes, and case law developments related to e-commerce, privacy, advertising, and intellectual property. Edited by Glen K. Westerback.

http://www.cyberlawcurrents.com
  • Jul 3

    Distinguishing Advertising from Search Result

    Distinguishing Advertising from Search Result
    As part of its ongoing effort to provide guidance to digital advertisers (including the recent release of the updated digital advertising guidance, “dot.com Disclosures: How to Make Effective Disclosures in Digital Advertising“),…
  • May 17

    FTC Answers 92 Questions about its Revised Children’s Online Privacy Protection Act Rule

    FTC Answers 92 Questions about its Revised Children’s Online Privacy Protection Act Rule
    In an effort to provide clarity on it its revised Children’s Online Privacy Protection Rule (“Rules”), the FTC recently published a list of  Frequently Asked Questions (“FAQs“) with information on how to…
  • May 16

    FTC Answers 92 Questions about its Revised Children’s Online Privacy Protection Act Rule

    FTC Answers 92 Questions about its Revised Children’s Online Privacy Protection Act Rule
    In an effort to provide clarity on it its revised Children’s Online Privacy Protection Rule (“Rules”), the FTC recently published a list of  Frequently Asked Questions (“FAQs“) with information on how to…
Rank this Week: 3204

Data Privacy Monitor

Data Privacy Monitor

Covers data privacy, security and social media subjects. By Baker Hostetler.

http://www.dataprivacymonitor.com/
Rank this Week: 3244

Data Security Law Journal

Data Security Law Journal

Covers data security, cloud computing, data privacy and anything E. By Al Saikali.

http://www.datasecuritylawjournal.com/
  • Nov 30

    60 Minutes Reports on Payment Card Data Breache

    60 Minutes Reports on Payment Card Data Breache
    Ever wonder how your credit card gets compromised and how the bad guys get your information? This report on tonight’s episode of 60 Minutes provides an overview of what happens from the moment you swipe your card at the point-of-sale…
  • May 26

    Why Every Business Should Care About Florida’s Information Protection Act

    Why Every Business Should Care About Florida’s Information Protection Act
    My last post described what the recently passed Florida Information Protection Act (FIPA) will do.  This post analyzes how FIPA differs from Florida’s existing breach notification law and explains why those differences will hurt or…
  • May 15

    Everything You Need To Know About Florida’s New Data Protection Law

    Everything You Need To Know About Florida’s New Data Protection Law
    The Florida Legislature recently passed the Florida Information Protection Act of 2014 (FIPA).  This post describes the FIPA and analyzes the advantages and disadvantages to businesses governed by the new law.  The FIPA must still…
Rank this Week: 4554

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Aug 31

    Calling All Cosplayers: Project Secret Identity Returns to Dragon Con

    Calling All Cosplayers: Project Secret Identity Returns to Dragon Con
    Project Secret Identity is back.  EFF is returning to Dragon Con, the science fiction and fantasy convention in Atlanta, Georgia, for a Labor Day weekend of cosplay activism. This year’s privacy campaign will be even more…
  • Aug 28

    Appeals Court Falls for Government’s Shell Game in NSA Spying Case

    Appeals Court Falls for Government’s Shell Game in NSA Spying Case
    The U.S. Court of Appeals for the D.C. Circuit’s opinion today in Klayman v. Obama is highly disappointing and, worse, based on a mistaken concern about the underlying facts. The court said that since the plaintiffs' phone…
  • Aug 28

    Russia's Wikipedia Ban Buckles Under HTTPS Encryption

    Russia's Wikipedia Ban Buckles Under HTTPS Encryption
    Dueling forces of encryption and government censorship came to a head in Russia this week in the form of an order to block Wikipedia. One Wikipedia article in particular (about charas hashish) was deemed to run afoul of the country's…
Rank this Week: 1482

Dot Indicia

Dot Indicia

Covers information, privacy and security from a Canadian perspective. By Michael Power.

http://michaelpower.ca
  • Mar 3

    The Law of Cybersecurity & In-House Counsel

    The Law of Cybersecurity & In-House Counsel
    Last month saw an interesting study emerge from the Maurer School of Law at Indiana University. It discusses the current and potential role of lawyers in the area of cybersecurity and the emerging, but still nascent, field of…
  • Feb 8

    The Canadian Privacy Cases of 2014

    The Canadian Privacy Cases of 2014
    As we move more into 2015, I thought I’d put together my own list of the more interesting Canadian privacy cases of 2014. These are judicial decisions so there’s no Commissioner findings or orders here. Some of these…
  • Jan 27

    Revenge Porn & Canadian Law

    Revenge Porn & Canadian Law
    Whenever a new technology arrives, society always plays “catch up” to determine what norms to apply to the use of that technology. It’s probably how we got traffic lights after the advent of automobiles.  One…
Rank this Week: 4067

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
  • Dec 10

    DNS Policy Notes for Dec. 10, 2014

    DNS Policy Notes for Dec. 10, 2014
    Topics include the inclusion in the omnibus spending bill language defunding the NTIA's involvement in the IANA functions transition policy development effort, Secretary Strickling's continuing effort to inject fact-based reasoning to the…
  • Nov 24

    DNS Policy Notes for Nov. 24, 2014

    DNS Policy Notes for Nov. 24, 2014
    Topics include Russia's tightening grip on the Internet, Facebook's foray into health content sans GAC advice, the latest twist in the Yoyo.email story, trademark owners on a URS hot streak, and a pair of industry analyses of the new…
  • Nov 21

    DNS Policy Notes for Nov. 21, 2014

    DNS Policy Notes for Nov. 21, 2014
    Topics include the Defending Internet Freedom Act of 2014, coverage of the World Internet Conference, the GAC's inquiry on additional protections for geographic names in new gTLDs, grousing about the NETmundial Initiative, and the defeat of…
Rank this Week: 2764

Fair Competition Law Blog

Fair Competition Law Blog

Covers trade secrets, noncompetes, privacy and security, the Computer Fraud and Abuse Act, trademarks, copyrights, and business torts. By Russell Beck.

http://faircompetitionlaw.com
  • Aug 9

    BRR 50-State Noncompete Chart Updated

    BRR 50-State Noncompete Chart Updated
    The BRR 50 State Noncompete Chart has been substantially updated to reflect numerous developments in statutory or case law since the last draft, as well as clarifications of existing laws. Click here to get the latest…
  • Aug 9

    Arkansas Strengthened Its Noncompete Law

    Arkansas Strengthened Its Noncompete Law
    As of Thursday, August 6, Arkansas noncompete law was statutorily modified by the addition of Ark. Code 4-70-207. With all of the talk about states (like New Hampshire, Hawaii, Massachusetts, Michigan, and Oregon) that have imposed, or…
  • Jun 4

    Proposed Federal Noncompete Law

    Proposed Federal Noncompete Law
    Noncompete law is a creature of state regulation. As such, no surprise, we have 50 variations (really 51, when you factor in DC – albeit 3 states (California, Oklahoma, and North Dakota) prohibit employee noncompetes altogether, so…
Rank this Week: 4415

Georgia Internet Law

Georgia Internet Law

Provides information and commentary regarding Internet law, e-commerce and technology law, World Wide Web regulation, and intellectual property. By Richardson Sixth, LLC.

http://georgiainternetlaw.com/
  • May 31

    Will Google Fiber Increase Internet Service Provider (ISP) Competition?

    Will Google Fiber Increase Internet Service Provider (ISP) Competition?
    Google Fiber will deliver “Gigabit” Internet and TV connectivity to multiple metro-Atlanta cities as early as 2016, laying out fiber-optic infrastructure across Atlanta, Avondale Estates, Brookhaven, College Park, Decatur, East…
  • Jan 13

    Bitcoin Keeps it Moving

    Bitcoin Keeps it Moving
    Bitcoin, a software-based online-payment system, as well as the synonymous payment unit, was introduced in 2009 by the perhaps pseudonymous Satoshi Nakamoto.  Bitcoin is virtual money exchanged online via any of various apps. …
  • Jul 31

    Visit to Atlanta Tech Village

    Visit to Atlanta Tech Village
    The Richardson Sixth firm made a visit to the Atlanta Tech Village yesterday.  The gathering was sponsored by the Buckhead Club, which shares valuable real estate with the Village as part of the “Buckhead Super-block.”…
Rank this Week: 4860

German IT Law

German IT Law

Provides updates and analysis on German and European IP/IT, technology, media and (open source) software law. By JBB Rechtsanwälte.

http://germanitlaw.com/
  • Feb 13

    German DPAs: Situation regarding consent for cookies is “unacceptable”

    German DPAs: Situation regarding consent for cookies is “unacceptable”
    In February 2015, the German data protection authorities adopted a resolution with the title “Tracking of user behavior on the Internet” (German). In this resolution, the authorities urge the German government to finally transpose…
  • Feb 4

    eBay Again – Your Ended Auctions Can Cause Some Trouble, Too

    eBay Again – Your Ended Auctions Can Cause Some Trouble, Too
    An eBay seller who has used copyright protected photos without the author’s permission and made a corresponding desist declaration is obliged not only to end the auction but rather to delete the pictures from the ended auctions…
  • Jan 30

    ECJ-decision: International jurisdiction in case of copyright infringement on a website

    ECJ-decision: International jurisdiction in case of copyright infringement on a website
    By judgment of 22 January 2015 (C-441/13), the European Court of Justice (ECJ) decided on the interpretation of Art. 5 para 3 of Regulation 44/2001 (Brussels I) on international jurisdiction of courts in a copyright infringement case.…
Rank this Week: 4697

Global Regulatory Enforcement Law…

Global Regulatory Enforcement Law Blog

Covers antitrust, privacy, international trade, and white color criminal defense. By Reed Smith.

http://www.globalregulatoryenforcementlawblog.com
Rank this Week: 1176

HIPAA Blog

HIPAA Blog

Features a discussion of medical privacy. By Jeffrey P. Drummond.

http://hipaablog.blogspot.com/
  • Aug 26

    Texting in the Healthcare Environment:…

    Texting in the Healthcare Environment: Here's a pretty good article highlighting the benefits and risks in texting in healthcare, with some pretty good tips as well on how to text safely and correctly if you're going to do it.  Key point:…
  • Aug 24

    UCLA and Medical ID Theft: An interesting…

    UCLA and Medical ID Theft: An interesting article from the LA Times.  If the intro paragraphs are indicative of how UCLA has handled this breach, I'd be awfully concerned if I ever got care at a UCLA facility.  Hate to say that, but one…
  • Aug 20

    Highlights of 4 recent breaches shows how…

    Highlights of 4 recent breaches shows how the data breach scene is a big worry in the healthcare space these days.
Rank this Week: 1834

Information Law Group

Information Law Group

Covers advertising law, privacy, information security and intellectual property.

http://www.infolawgroup.com/
  • Aug 24

    Know your Privacy Policy and Practices: An Important Reminder Illustrated by Recent FTC Action

    Know your Privacy Policy and Practices: An Important Reminder Illustrated by Recent FTC Action
    The Federal Trade Commission’s (“FTC”) announcement last week of settlements with 13 separate companies for charges of falsely advertising certification with the U.S.-EU and/or U.S.-Swiss Safe Harbor Frameworks (“Safe…
  • Aug 20

    Blue Apron and Others Face Spate of Suits under CA Auto-Renewal Law

    Blue Apron and Others Face Spate of Suits under CA Auto-Renewal Law
    A purported class action lawsuit was recently filed against meal-delivery service Blue Apron based on its alleged failure to satisfy the requirements of California’s law regulating automatic-renewal provisions in consumer contracts…
  • Jul 24

    McLean B. Sieverding Joins InfoLawGroup As Senior Counsel

    McLean B. Sieverding Joins InfoLawGroup As Senior Counsel
    InfoLawGroup is happy to announce that McLean B. Sieverding has joined the firm as Senior Counsel. Most recently, McLean served as Assistant General Counsel for Int’l Data Protection & Regulatory Compliance at Verizon…
Rank this Week: 2590

Information Technology Law Blog

Information Technology Law Blog

Covers social media, e-discovery, privacy, and intellectual property. By Foster Swift Collins & Smith PC.

http://www.michiganitlaw.com/
  • Aug 20

    Patent Basic

    Patent Basic
    So you just had a Eureka moment and your epiphany is going to make you millions as soon as it hits shelves. Learn more about patent basics in this short video including: Time limits for filing a patent; Different kinds of patents;…
  • Aug 13

    What's in a Name: Selecting a Name for Your Busine

    What's in a Name: Selecting a Name for Your Busine
    Why is a business name so important? A name is everything, it is your business's identity. When you select your business name, from a legal perspective, you need to come up with a unique name, a name that does not infringe on others rights.…
  • Aug 5

    Why You Should Register Your Copyrights: The Benefits of Registration Under The Copyright Act

    Why You Should Register Your Copyrights: The Benefits of Registration Under The Copyright Act
    A copyright is automatically created upon the completion of an original work of authorship that is fixed in a tangible medium of expression. While an automatic copyright protects that work, a formal registration of copyrighted materials…
Rank this Week: 3031

Inforrm's Blog

Inforrm's Blog

Discusses issues of media law and responsibility with a special focus on libel and privacy law and the balance between the two.

http://inforrm.wordpress.com
Rank this Week: 143

Inside Privacy

Inside Privacy

Covers global privacy and data security. By Covington & Burling LLP.

http://www.insideprivacy.com
Rank this Week: 1678

LegalTXTS

LegalTXTS

Covers law and technology, with an emphasis on legal issues regarding digital media, privacy and data security, and information management. By Elijah Yip.

http://www.legaltxts.com/
Rank this Week: 2362

New Media & Technology Law Blog

New Media & Technology Law Blog

Covers intellectual property, data security, online marketing and online commerce. By Proskauer.

http://newmedialaw.proskauer.com
  • Jul 23

    Clickwrap Agreement Available Only Through Hyperlink Enforceable Under New York Law

    Clickwrap Agreement Available Only Through Hyperlink Enforceable Under New York Law
    Last week, the Southern District of New York followed a long line of precedent under New York law and upheld the enforceability of a website clickwrap agreement, granting a website operator’s motion to compel arbitration pursuant to a…
  • Jun 30

    Supreme Court Rejects Google’s Appeal in Java API Dispute

    Supreme Court Rejects Google’s Appeal in Java API Dispute
    On Monday, the Supreme Court denied certiorari in Google’s appeal of the Federal Circuit’s 2014 ruling that that the declaring code and the structure, sequence, and organization of 37 Java API packages are entitled to copyright…
  • Jun 23

    Facial Recognition Technology: Social Media and Beyond, an Emerging Concern

    Facial Recognition Technology: Social Media and Beyond, an Emerging Concern
    This week, a major self-regulatory initiative intended to address privacy concerns associated with facial recognition technology hit a significant stumbling block.  Nine consumer advocacy groups withdrew from the National…
Rank this Week: 2348

North Carolina Journal of Law &…

North Carolina Journal of Law & Technology

Features legal scholarship in law and technology topics, including intellectual property law, cyberspace law, environmental law, criminal law, health law, and privacy law.

http://ncjolt.org/
  • Aug 24

    Google’s Potential Influence: How The 2016 Presidential Election Could Be Decided

    Google’s Potential Influence: How The 2016 Presidential Election Could Be Decided
    Political influence is a funny thing because it comes in a variety of forms and originates from a variety of sources. Fortune 500 companies inherently possess the ability to have an astounding amount of political influence on the…
  • Aug 12

    A Game of I Spy: Neighborhood Drone Usage

    A Game of I Spy: Neighborhood Drone Usage
    In July, a Kentucky man was arrested after he shot down a neighbor’s drone that he says was hovering over his yard where his daughter was sunbathing.William “Willie” Merideth, 47, of Bullitt County was charged with first…
  • Aug 6

    Silicon Valley backing “Siri for legal knowledge”

    Silicon Valley backing “Siri for legal knowledge”
    Picture this: You take your seat in your first-year Contracts course. The topic of the day is the Statute of Frauds. After outlining a hypothetical and quickly scanning the seating chart, your professor puts you on the spot: “Under…
Rank this Week: 4849

Peter Fleischer: Privacy...?

Peter Fleischer: Privacy...?

Covers privacy law and corporate privacy policy. By Peter Fleischer, Global Privacy Counsel for Google.

http://peterfleischer.blogspot.com/
  • May 14

    Harvard Nostalgia

    Harvard Nostalgia
    The older I get, the more I think back to Harvard with nostalgia.  I was very young at Harvard.  I went to college straight out of the 10th grade, and I graduated at the age of 19.  That officially makes me a high school…
  • Apr 6

    From pool to pool

    From pool to pool
    I love my pools.    In Paris, my pool is in a fancy private club, in the Bois de Boulogne, on the edge of Paris.  It's a gorgeous 50-meter pool, open year-round outdoors, framed by views of the Eiffel Tower. My pool nurtured…
  • Mar 12

    A Science Fiction Novel

    A Science Fiction Novel
    I'd like to crowd-source the plot for a science fiction novel.  Would this make a good story?:In a not-too-distant future, say 20 years from now, humanity lives through the biggest change in its history.  It doesn't happen…
Rank this Week: 5082

Politics of Privacy Blog

Politics of Privacy Blog

Covers privacy, liberty, security, economy and their interaction. By Andreas Busch.

http://politicsofprivacy.blogspot.com/
  • Jan 18

    Again: loss of personal data by public officials in the UK

    Again: loss of personal data by public officials in the UK
    Less than two months after the loss of the personal details of 25 million people by the UK's tax authorities (see this blog entry), another substantial loss of personal data has occurred in Britain. As the BBC website writes, a laptop…
  • Jan 7

    Jeremy Clarkson and identity theft

    Jeremy Clarkson and identity theft
    Well, first of all, a happy new year to my readers! And I am glad to be able to report that page visits to this blog more than doubled in 2007 over 2006, to well over 5000 pageviews. I am very happy about this and will take it as a reminder…
  • Nov 20

    British tax authorities lose personal details of 25 million people

    British tax authorities lose personal details of 25 million people
    A crass case of neglect and breach of data protection legislation has led to the loss of discs containing the names, addresses, dates of birth, bank account details and National Insurance numbers of 25 million people in the United Kingdom, it…
Rank this Week: 4561

Primary Opinion

Primary Opinion

Covers corporate, employment, IP and privacy news.

http://primaryopinion.com/
  • Nov 27

    Social media marketing for lawyers and law firm

    Social media marketing for lawyers and law firm
    Law firms of all sizes are now embracing social media as a means to showcase expertise and reach new customers. But, opening a Twitter, LinkedIn or Google+ account is only the first part of the process. Here are five pointers for realising…
  • Oct 13

    Legal opinion round up: CJEU’s ruling on registering 3D object trademark

    Legal opinion round up: CJEU’s ruling on registering 3D object trademark
    3D shape marks took another battering at the end of September with the European Court of Justice (CJEU) ruling that such trademarks can be declared invalid if the shape can be linked ‘essentially’ or ‘substantially’ to…
  • Oct 7

    Meet our independent blogger

    Meet our independent blogger
    Our new content portal www.primaryopinion.com draws together the best of the IP industry’s news, commentary and knowledge, so that IP professionals, in-house counsel and business heads can access it on one up-to-date platform. That…
Rank this Week: 3286

Privacy & Security Matters

Privacy & Security Matters

By Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

http://www.privacyandsecuritymatters.com
Rank this Week: 4601

Privacy & Security Source

Privacy & Security Source

Covers anonymous subpoenas, behavioral advertising, employee monitoring, geolocation and information security. By Foley & Lardner LLP.

http://www.privacysecuritysource.com
Rank this Week: 4620

Privacy & Information Security…

Privacy & Information Security Law Blog

Provides global privacy and information security law updates and analysis. By Hunton & Williams.

https://www.huntonprivacyblog.com/
Rank this Week: 90

Privacy and Data Security Law

Privacy and Data Security Law

Covers the creation, collection, use, destruction and security of data. By Dentons.

http://www.privacyanddatasecuritylaw.com/
  • Aug 21

    Subject Access Request risk: limits in sight?

    Subject Access Request risk: limits in sight?
    A recent High Court case took a very robust stance on the issue of DSARs (Data Subject Access Requests) being used to fuel litigation. An individual can make a DSAR to request access to any of his/her personal information. In Dawson-Damer v…
  • Aug 12

    The slow death of EU forum shopping

    The slow death of EU forum shopping
    Forum shopping (i.e. where businesses pick and choose the most privacy-friendly EU state to set up shop) has always been a somewhat unique side effect of EU data privacy law. Then last year saw the Google Spain case where the European Court…
  • Aug 10

    Ontario Issues Guidance on Internet Publication

    Ontario Issues Guidance on Internet Publication
    Ontario Municipalities Should Exercise Care in Publishing Personal Information The Information and Privacy Commissioner of Ontario (IPC) has published new guidance entitled, Transparency, Privacy and the Internet: Municipal Balancing Acts.…
Rank this Week: 1714

Privacy and IP Law Blog

Privacy and IP Law Blog

Addresses recent events in trademark, copyright, computer and privacy law. By Christina Frangiosa.

http://privacyandiplawblog.com/
  • Aug 18

    Copyrighting Software? Don’t Rely on Screenshots Alone!

    Copyrighting Software? Don’t Rely on Screenshots Alone!
    In a recent decision, the Second Circuit Court of Appeals recently held that a copyright application solely directed to screen shots generated from a software program was insufficient to establish copyright rights in the software as a whole,…
  • Apr 13

    Common Questions – Benefits of Trademark Searching

    Common Questions – Benefits of Trademark Searching
    Searching for potentially competing trademarks before you go through the time and expense of developing a strong brand is a very worthwhile exercise, but it costs money – and sometimes clients can be reluctant to spend the money if…
  • Feb 9

    Why Privacy Policies Must be Personalized

    Why Privacy Policies Must be Personalized
    (This was cross-posted.) The best argument for why companies should never simply copy and paste the text of another entities' privacy policy onto their own website can be found in the recent announcement by the FTC of a settlement…
Rank this Week: 2951

Privacy and Security Law Blog

Privacy and Security Law Blog

Covers biometrics, HIPAA, identity theft, PATRIOT Act, phishing and more. By Davis Wright Tremaine.

http://www.privsecblog.com/
  • Aug 26

    UPDATE: Third Circuit Affirms FTC’s Data Security Authority in Wyndham

    UPDATE: Third Circuit Affirms FTC’s Data Security Authority in Wyndham
    The U.S. Court of Appeals for the Third Circuit released its much-anticipated ruling in Federal Trade Commission v. Wyndham Worldwide Corp. on August 24, 2015, unanimously upholding the FTC’s authority to regulate companies’ data…
  • Aug 24

    How Will Your Company Handle a Security Breach?

    How Will Your Company Handle a Security Breach?
    Are you ready in the event that your company’s records or data are lost, stolen or accessed without authorization? Do you know the notification obligations that are applicable to a data breach or when your company’s data falls…
  • Aug 20

    FCC Announces Robocalling and Caller ID Spoofing Workshop

    FCC Announces Robocalling and Caller ID Spoofing Workshop
    Program Chains Off of Recent TCPA Order on Autodialed Calls and Texts Telemarketers and others who may have been wondering how the Federal Communications Commission’s recent and – to industry participants – concerning…
Rank this Week: 918

Privacy Law Blog

Privacy Law Blog

Covers data privacy, identity theft, invasion of privacy, and national security legal issues. By Proskauer Rose LLP.

http://privacylaw.proskauer.com/
Rank this Week: 1839

Reasonable Expectation

Reasonable Expectation

Focuses on privacy and data security. By M. Scott Koller.

http://www.reasonableexpectation.com
  • Jun 30

    Are Data Breach Investigations Privileged?

    Are Data Breach Investigations Privileged?
    #150654797 / gettyimages.com Are Data Breach Investigations Privileged? Originally Published on the InfoLaw Group Blog: Over the past year, the number of data breaches has skyrocketed and, as a result, companies are facing increased risk of…
  • Mar 20

    FTC Seeks Public Comment on iKeepSafe’s Proposed Safe Harbor Program Under the Children’s Online Privacy Protection Rule

    FTC Seeks Public Comment on iKeepSafe’s Proposed Safe Harbor Program Under the Children’s Online Privacy Protection Rule
    Internet Keep Safe Coalition (iKeep Safe) has submitted a proposed safe harbor program to the Federal Trade Commission under the the agency’s Children’s Online Privacy Protection Rule. Under 16 C.F.R. 312.11, COPPA safe…
  • Feb 28

    Obama’s new cybersecurity plan a good start

    Obama’s new cybersecurity plan a good start
    I recently authored an article for the Daily Journal on the new cybersecurity framework.  You can read about it by visiting the Daily Journal.  
Rank this Week: 3165

Security, Privacy and The Law

Security, Privacy and The Law

Covers information security and privacy issues. By Foley Hoag LLP.

http://www.securityprivacyandthelaw.com
Rank this Week: 1116

sobre privacidad y protección de…

sobre privacidad y protección de datos

Spanish language blog about privacy and data protection. By Daniel A. Lopez Carballo.

http://www.dlcarballo.com/
  • Aug 28

    Análisis del caso Ashley Madison y su impacto en la privacidad

    Análisis del caso Ashley Madison y su impacto en la privacidad
    Millones de datos personales e información privada de usuarios de la página de contactos Ashley Madison veían la luz tras el ataque sufrido por parte de un grupo de hackers denominado Impact Team. Este hecho de…
  • Jun 29

    Redes sociales, tecnología y la necesaria redefinición del dato personal

    Redes sociales, tecnología y la necesaria redefinición del dato personal
    Recientemente diferentes medios publicaban la noticia de que la red social “Facebook” había comenzado a probar un sistema capaz de reconocer a las personas en las, incluso si no están mirando a la cámara, como…
  • Jun 18

    Un paso firme para la protección de los datos en Europa

    Un paso firme para la protección de los datos en Europa
    El pasado 15 de junio se dio un paso firme hacia la aprobación del futuro Reglamento General de Protección de Datos de la Unión Europea. Más allá de algunas noticias en prensa que daban por aprobado el…
Rank this Week: 5033

Socially Aware Blog

Socially Aware Blog

Covers the law and business of social media. By Morrison Foerster.

http://www.sociallyawareblog.com/
Rank this Week: 2585

Spam Notes

Spam Notes

Covers Internet law, electronic communications law, privacy, ID theft, data protection, adware, spyware and more. Published by Seattle lawyer Venkat Balasubramani.

http://spamnotes.com
  • Dec 31

    The Marble and the Sculptor

    The Marble and the Sculptor
    A few months* ago, Keith Lee, who blogs at Associate's Mind, was kind enough to send me a review copy of his book titled "The Marble and the Sculptor". The book is a survival guide of sorts for newly minted lawyers, tackling a wide range…
  • Jul 19

    The Problem With the Sharknado Reference

    The Problem With the Sharknado Reference
    Judge Mills throws in a reference to Sharknado in Faulkner v. Woody Allen. (h/t @ericgoldman) The problem with the reference is this: five years from now, no one will know or recall what Sharknado was. Even today, many people reading the…
  • Jan 19

    Just Who Are the Change Agents in Law?

    Just Who Are the Change Agents in Law?
    Scott Greenfield has an interesting post up today with an equally interesting response from Keith Lee. Both posts nudge me in the direction of a "Godin-esque" question that's been percolating in my mind for a long long time now:  the…
Rank this Week: 1310

SullivanLawNet

SullivanLawNet

Legal news and analysis, with an emphasis on international and domestic intellectual property developments. By Shawn Sullivan.

http://sullivanlaw.net/
  • Sep 22

    Criminal Convictions in Salmonella Case

    Criminal Convictions in Salmonella Case
    A U.S. federal jury convicted three former food company executives of several crimes relating to a 2008-09 outbreak of Salmonella infections resulting from the production and distribution of adulterated peanut butter. See…
  • Sep 9

    3 Months in Spanish Prison for Plant Variety Rights Infringement

    3 Months in Spanish Prison for Plant Variety Rights Infringement
    On July 10, 2014, a criminal court in southwestern Spain sentenced a grower of carnation flowers to three months in prison, plus a fine of € 360 EUR, for infringing plant variety rights in violation of Article 274.3 of the ……
  • Sep 8

    Ecuador: Change Constitution to Protect Traditional Knowledge

    Ecuador: Change Constitution to Protect Traditional Knowledge
      Ecuador’s national government has proposed to amend the country’s constitution to provide special protections against the misappropriation of traditional knowledge and biological diversity. Propuesta de enmiendas…
Rank this Week: 2532

techblawg

techblawg

Focuses primarily on issues involving the intersection of law, technology and finance. By David Ma.

http://david-ma.ca/
  • Aug 27

    weekly tweet roundup

    weekly tweet roundup
    i suppose one upside of the ashley madison data breach is the potential for interesting analytics. like this. http://t.co/iVRD2QFDNV 2015-08-21 scientists grow human brain in lab from skin cells. extraordinarily creepy. http://t.co/iDBJQWZKZL…
  • Mar 5

    weekly tweet roundup

    weekly tweet roundup
    had no idea they've started using aerogel in clothing. so much for down. http://t.co/acpGLsONiq 2015-02-27 [Click on title above to read the full post]
  • Feb 26

    weekly tweet roundup

    weekly tweet roundup
    nsa stole encryption keys for sim cards, enabling it to monitor a huge portion of worlwide cell communications. http://t.co/9xLsHKroN8 2015-02-20 more details on nsa/equation group hard drive malware. in short, you can't get rid of it. ever.…
Rank this Week: 1906

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
Rank this Week: 2455