Most Popular Privacy Law Blawgs Expanded View List View

Blogs 1 - 45 of 57

Advertising Law Blog

Advertising Law Blog

Provides commentary and news on developing legal issues in advertising, promotional marketing, Internet, and privacy law. By Olshan Frome Wolosky LLP.

http://www.olshanlaw.com/blogs-Advertising-Law-Blog
Rank this Week: 382

Beyond Telecom Law Blog

Beyond Telecom Law Blog

Covers telecom policy, services agreements and data security/privacy. By Keller and Heckman LLP.

http://www.beyondtelecomlawblog.com
  • Apr 25

    "Section 6409 vs. Reality"-- A Panel Discussion at the Wireless West Conference

    "Section 6409 vs. Reality"-- A Panel Discussion at the Wireless West Conference
    I had the pleasure of speaking at the first annual Wireless West Conference in Anaheim, CA on April 20. Wireless West was organized and managed by five state wireless associations—Arizona, California, Colorado, Nevada, and Northwest…
  • Apr 18

    The Industrial Internet - Legal Issues and Procurement Implications--A Series; Part 1--Overview

    The Industrial Internet - Legal Issues and Procurement Implications--A Series; Part 1--Overview
    This is the first entry in a series on the “Industrial Internet,” focusing on the basic elements, legal issues and procurement implications, principally from the perspective of the end user. The term is used to distinguish…
  • Apr 4

    Another FirstNet Milestone

    Another FirstNet Milestone
      Another marker passed on the FirstNet roadmap last week as Capability Statements from bidders interested in building, operating and maintaining the Nationwide Public Safety Broadband Network were submitted March 31, 2016. Final bids…
Rank this Week: 3820

Broadband Law Advisor

Broadband Law Advisor

Provides insight and information on the FCC's National Broadband Plan. By Davis Wright Tremaine LLP.

http://www.broadbandlawadvisor.com/
  • Feb 23

    FCC Announces Details for Mobility Fund Phase II

    FCC Announces Details for Mobility Fund Phase II
    The FCC adopted an order today that establishes Phase II of the Mobility Fund.  As we have previously reported, the FCC established the Mobility Fund to provide universal service subsidies to help expand and preserve 4G LTE mobile…
  • Feb 23

    FCC Finalizes Criteria for CAF Phase II Auction

    FCC Finalizes Criteria for CAF Phase II Auction
    Today the FCC approved an order that moves the nearly two billion dollar Connect America Fund (CAF) Phase II Auction competitive bidding process forward.   As we have previously reported, the Phase II auction will provide support…
  • Feb 23

    FCC Approves ILEC Shift to GAAP Accounting, Mitigates Pole Rate Impact

    FCC Approves ILEC Shift to GAAP Accounting, Mitigates Pole Rate Impact
    At today’s open meeting the FCC adopted a Report and Order that streamlines and eliminates Part 32 accounting requirements governing price-cap carriers, allowing them instead to rely on GAAP accounting methods and thus eliminate the…
Rank this Week: 4857

Business Litigation Info

Business Litigation Info

Covers business litigation, intellectual property, data security, and advertising and media. By Faruki Ireland & Cox P.L.L.

http://www.businesslitigationinfo.com/
  • Nov 24

    NOVEMBER 2015 FI&C WEBSITE NEWSLETTER

    NOVEMBER 2015 FI&C WEBSITE NEWSLETTER
    *     On September 17, 2015, Jeff Ireland and Jade Smarda, obtained a temporary restraining order on behalf of a local financial services firm in a trade secrets case. *     Jeff Sharkey and…
  • Nov 20

    Be Cautious When Social Networking is All “Atwitter “at Your Workplace

    Be Cautious When Social Networking is All “Atwitter “at Your Workplace
    We use social media all the time. Make it a point during the day to notice how often you see a friend or colleague checking a Facebook update or sending a tweet (or giving you a three-star rating on the new Peeple app).  People are on…
  • Nov 16

    Cybersecurity Information Sharing Act: The Devil Lurks and the Road to His House Appears Well Paved

    Cybersecurity Information Sharing Act: The Devil Lurks and the Road to His House Appears Well Paved
    Best Laid Plans. They say the devil is in the details. One might say that is most certainly the case with the recently advanced version of the Cybersecurity Information Sharing Act (“CISA”) that recently passed the U.S. Senate by…
Rank this Week: 3864

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 2787

Chronicle of Data Protection

Chronicle of Data Protection

Covers consumer privacy, data security, HIPAA, financial privacy and EU privacy. By Hogan Lovells.

http://www.hldataprotection.com
  • Feb 24

    The “Final Final” is Here: NYDFS Cybersecurity Regulation

    The “Final Final” is Here: NYDFS Cybersecurity Regulation
    As Hogan Lovells previously reported, the New York State Department of Financial Services has launched a significant initiative to impose detailed cybersecurity requirements on covered financial institutions. On February 16, NYDFS issued its…
  • Feb 17

    Polish DPA Releases Data Privacy Inspection Plans – Targets Health, Shopping

    Polish DPA Releases Data Privacy Inspection Plans – Targets Health, Shopping
    The Polish Data Protection Authority has just released its inspection plans for 2017. This year, the GIODO has decided to target its review of compliance with data protection laws on the health services sector, as well as on the consumer…
  • Feb 16

    Your Cyber Minute: Watch Our Topline Digest of Today’s Cybersecurity Issue

    Your Cyber Minute: Watch Our Topline Digest of Today’s Cybersecurity Issue
    With cybersecurity issues evolving rapidly, every minute counts. Our new video series, Your Cyber Minute, is specifically designed for busy in-house counsel to gain practical perspectives – fast. This multi-part series is an extension…
Rank this Week: 924

Clancco: Art & Law

Clancco: Art & Law

Covers the relationship between art and law with a focus on intellectual property, nonprofit tax-exempt organizations, free speech, and contemporary art. By Sergio Muñoz Sarmiento.

http://clancco.com/wp
  • Feb 17

    Battle Over August Sander Estate?

    Battle Over August Sander Estate?
    Or is it merely a misunderstanding as to what an “estate” is, legally and colloquially?
  • Feb 9

    “The Left Has Shanghaied Copyright”

    “The Left Has Shanghaied Copyright”
    The Federalist’s Robin Ridless takes some clean power-punches at the “ivy-cloistered radicalism” of the “all-appropriation-is-fair-use” jihadists. Here’s one example, To read a sampling of current…
  • Feb 8

    Can the “artworld” Resist President Trump? Don’t Count On It.

    Can the “artworld” Resist President Trump? Don’t Count On It.
    The Washington Post’s Tom Rachman shoots several zingers and comedy and farce that “political art” has become. Example number one: “Today, ‘politicized artist’ is as likely to evoke a whiny, entitled,…
Rank this Week: 411

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • May 15

    The New York Bitlicense is coming: What you need to know

    The New York Bitlicense is coming: What you need to know
    As the final version of the New York BitLicense will roll out within the next 2 weeks, bitcoin startups are gearing up to enter the U.S. market. The post The New York Bitlicense is coming: What you need to know appeared first on .
  • May 12

    What Makes a Brand a Good Trademark?

    What Makes a Brand a Good Trademark?
    A suggestive trademark can be a salutary compromise between marketing and legal considerations. The post What Makes a Brand a Good Trademark? appeared first on .
  • Apr 30

    LLC., C Corp, S Corp: How to Pick a Business Structure

    LLC., C Corp, S Corp: How to Pick a Business Structure
    Few decisions are as important as choosing the right entity for your new startup. This post explores the factors that matter most when making this decision. The post LLC., C Corp, S Corp: How to Pick a Business Structure appeared first on .
Rank this Week: 2762

Copyright, Intellectual Property,…

Copyright, Intellectual Property, Computer, Internet, e-Commerce Law

Covers IP/IT law, with a strong focus on copyright and internet law. By Barry Sookman.

http://www.barrysookman.com
Rank this Week: 2393

Cyberinsurance Law Blog

Cyberinsurance Law Blog

News and comments on Business Law. By Dilworth Paxson L.L.P.

http://www.databreachninja.com/
  • Feb 23

    “3 Tips for Public Pension Funds”

    “3 Tips for Public Pension Funds”
    On Tuesday, I was privileged to be part of a panel discussing cyberinsurance for public pension funds at Kessler Topaz’s Evolving Fiduciary Obligations for Institutional Investors conference, joining Victoria Hale, General Counsel of…
  • Feb 2

    “Unfortunately, This Will Get Physical”

    “Unfortunately, This Will Get Physical”
    There have been relatively few confirmed cyber attacks resulting in substantial physical harm to property (other than computer hardware) and people.  The first known event involved the 2008-2010 infiltration of a computer virus called…
  • Jan 19

    “Carriers and Brokers Filling the Coverage Gaps”

    “Carriers and Brokers Filling the Coverage Gaps”
    Stand-alone cyberinsurance is a critical component of enterprise risk management.  But even companies with traditional and cyber coverage may, and usually do, have gaps in coverage created by what I’ve referred to as the ‘hot…
Rank this Week: 2442

CyberLaw Currents

CyberLaw Currents

Covers technology news headlines, statutes, and case law developments related to e-commerce, privacy, advertising, and intellectual property. Edited by Glen K. Westerback.

http://www.cyberlawcurrents.com
Rank this Week: 4844

Cybersecurity Lawyer Forum

Cybersecurity Lawyer Forum

Covers business and privacy law. By Jeffer Mangels Butler & Mitchell LLP.

http://cybersecurity.jmbm.com/
  • Feb 8

    Cybersecurity and Ransomware – It can get ugly when a hacker takes control of your smart building

    Cybersecurity and Ransomware – It can get ugly when a hacker takes control of your smart building
    Cyber risk affects businesses of every size and industry. A data breach can lead to negative publicity, loss of customer confidence and potential lawsuits. There can be a variety of unanticipated – and costly – business…
  • Dec 28

    Risk Assessment – the Key to Risk Management

    Risk Assessment – the Key to Risk Management
    One of the great frustrations in contemplating a data security program is that there is no such thing as a one-size-fits-all solution.  There is no law or regulation that specifies the exact steps a company needs to take in order achieve…
  • Dec 12

    Cybersecurity Law in 2017 – Predictions and Prognostication

    Cybersecurity Law in 2017 – Predictions and Prognostication
    December is the month for predictions.  During this month, commentators of all sorts and in all areas predict the trends and actions that will impact us during the coming year.  While speculating the future is a questionable…
Rank this Week: 2186

Data Breach Lawyer Blog

Data Breach Lawyer Blog

Covers intellectual property law. By Raines Feldman.

http://www.databreachlawyerblog.com/
  • Oct 24

    Trade Secrets and Internet Scraping

    Trade Secrets and Internet Scraping
    Recently, our cyber liability team discussed the impact internet data scraping has had upon trade secrets litigation.  Trade secrets cases are tough to win as plaintiffs.  The availability of competitive data online presents…
  • Oct 24

    Trade Secrets and Internet Scraping

    Trade Secrets and Internet Scraping
    Recently, our cyber liability team discussed the impact internet data scraping has had upon trade secrets litigation.  Trade secrets cases are tough to win as plaintiffs.  The availability of competitive data online presents…
  • Aug 30

    Be Mindful of Statute of Limitations for Internet Defamation

    Be Mindful of Statute of Limitations for Internet Defamation
    Often, data breaches are associated with internet defamation or other torts like impersonation.  Many times we come across strong defamation cases that cannot proceed because the potential client has waited too long to take action.…
Rank this Week: 1899

Data Privacy Monitor

Data Privacy Monitor

Covers data privacy, security and social media subjects. By Baker Hostetler.

http://www.dataprivacymonitor.com/
  • Feb 23

    Finalized New York Department of Financial Services Cybersecurity Regulation to Take Effect March 1

    Finalized New York Department of Financial Services Cybersecurity Regulation to Take Effect March 1
    On February 16, 2017, the New York Department of Financial Services (NYDFS) announced the release of its finalized Cybersecurity Requirements for Financial Services Companies (“Cybersecurity Regulation”), which will take effect on…
  • Jan 27

    Will the proposed “Countering Russian Hostilities Act” stop Russian cyberattacks?

    Will the proposed “Countering Russian Hostilities Act” stop Russian cyberattacks?
    On Jan. 10, 2017, a bipartisan group of five Republican and five Democratic senators announced their support for the Countering Russian Hostilities Act of 2017. Lindsey Graham, one of the senators who announced the proposed legislation, told…
  • Jan 26

    FINRA Seeks Comment on Blockchain

    FINRA Seeks Comment on Blockchain
    On Jan. 18, 2017, the Financial Industry Regulatory Authority (FINRA) became the latest organization to weigh in on distributed ledger technology (DLT), also known as blockchain. Recognizing the growing interest and potential benefits…
Rank this Week: 2959

Data Protection Report

Data Protection Report

Covers global privacy, data protection and cybersecurity regulatory and litigation environment. By Norton Rose Fulbright.

http://www.dataprotectionreport.com/
  • Feb 23

    US Government Contractors Now Required to Train Employees on Privacy

    US Government Contractors Now Required to Train Employees on Privacy
    Effective January 19, 2017,  an update to the Federal Acquisition Regulation (FAR) will require certain contractors that provide services to the federal government to train their employees on privacy.  New contracts into which the…
  • Feb 19

    UK Court of Appeal Rules that Exemptions to Access Rights are Construed Narrowly

    UK Court of Appeal Rules that Exemptions to Access Rights are Construed Narrowly
    Under the UK Data Protection Act 1998 (“DPA“), data subjects have rights to obtain copies of their personal information through a data subject access request (“DSAR“). Data subjects frequently use DSARs to obtain…
  • Feb 7

    Settlement of Target Data Breach Consumer Class Action Is Derailed On Appeal

    Settlement of Target Data Breach Consumer Class Action Is Derailed On Appeal
    The Eighth Circuit Court of Appeals last week reversed the district court’s approval of a settlement and settlement class in the consolidated consumer class action arising from Target Corporation’s 2013 security incident. …
Rank this Week: 2090

Data Security Law Journal

Data Security Law Journal

Covers data security, cloud computing, data privacy and anything E. By Al Saikali.

http://www.datasecuritylawjournal.com/
  • Dec 11

    Law Firm Data Security: The First Class Action

    Law Firm Data Security: The First Class Action
    Earlier this year, Bloomberg Law reported that Edelson PC, a leading plaintiffs’ firm in privacy and data security law, filed a class action lawsuit against a regional law firm that had vulnerabilities in its information security…
  • Jun 22

    The SEC Makes Clear There is No Room For Error in Cybersecurity

    The SEC Makes Clear There is No Room For Error in Cybersecurity
    The SEC recently agreed to a $1,000,000 settlement of an enforcement action against Morgan Stanley for its failure to have sufficient data security policies and procedures to protect customer data. The settlement was significant for its…
  • Mar 9

    Understanding EMV Payment Card Technology

    Understanding EMV Payment Card Technology
    A significant change is happening to payment card technology. Any company that accepts credit cards as a form of payment needs to know about it if they intend to continue accepting payment cards in the future. The technology is called…
Rank this Week: 3915

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Feb 24

    Fair Use as Consumer Protection

    Fair Use as Consumer Protection
    Talking about fair use often means talking about your right to re-use existing copyrighted works in the process of making something new  - to make remixes and documentaries, parodies, or even to build novel Internet search tools. But now…
  • Feb 24

    Copyright Law Versus Internet Culture

    Copyright Law Versus Internet Culture
    Throughout human history, culture has been made by people telling one another stories, building on what has come before, and making it their own. Every generation, every storyteller puts their own spin on old tales to reflect their own values…
  • Feb 24

    Cryptographers Demonstrate Collision in Popular SHA-1 Algorithm

    Cryptographers Demonstrate Collision in Popular SHA-1 Algorithm
    On February 23rd, a joint team from the CWI Amsterdam and Google announced that they had generated the first ever collision in the SHA-1 cryptographic hashing algorithm. SHA-1 has long been considered…
Rank this Week: 2869

Dot Indicia

Dot Indicia

Covers information, privacy and security from a Canadian perspective. By Michael Power.

http://michaelpower.ca
  • Feb 22

    Corporate Activism In the Protection of Privacy

    Corporate Activism In the Protection of Privacy
    Just how far is business supposed to go in protecting privacy? In the United States, one can starkly see an example with Apple and the retrieval of encrypted iPhone data. But a recent Canadian case also shines a spotlight on the role of the…
  • Jan 27

    Another New Privacy Tort for Ontario

    Another New Privacy Tort for Ontario
    Last week saw a rather striking decision issued by the Ontario Superior Court of Justice. 2102 saw the tort of “intrusion upon seclusion” recognized; in 2016, we now have the tort of “public disclosure of private…
  • Jan 19

    New Privacy Tort Empowers “Revenge Porn” Victim

    New Privacy Tort Empowers “Revenge Porn” Victim
    Manitoba’s Intimate Image Protection Act came into force on 15 January 2016. The statute does something that I think is especially noteworthy – it creates a new privacy tort concerning the “non-consensual distribution of…
Rank this Week: 4687

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
  • Dec 10

    DNS Policy Notes for Dec. 10, 2014

    DNS Policy Notes for Dec. 10, 2014
    Topics include the inclusion in the omnibus spending bill language defunding the NTIA's involvement in the IANA functions transition policy development effort, Secretary Strickling's continuing effort to inject fact-based reasoning to the…
  • Nov 24

    DNS Policy Notes for Nov. 24, 2014

    DNS Policy Notes for Nov. 24, 2014
    Topics include Russia's tightening grip on the Internet, Facebook's foray into health content sans GAC advice, the latest twist in the Yoyo.email story, trademark owners on a URS hot streak, and a pair of industry analyses of the new…
  • Nov 21

    DNS Policy Notes for Nov. 21, 2014

    DNS Policy Notes for Nov. 21, 2014
    Topics include the Defending Internet Freedom Act of 2014, coverage of the World Internet Conference, the GAC's inquiry on additional protections for geographic names in new gTLDs, grousing about the NETmundial Initiative, and the defeat of…
Rank this Week: 2472

Fair Competition Law Blog

Fair Competition Law Blog

Covers trade secrets, noncompetes, privacy and security, the Computer Fraud and Abuse Act, trademarks, copyrights, and business torts. By Russell Beck.

http://faircompetitionlaw.com
  • Feb 4

    Trade Secrets Laws and the UTSA – A 50 State and Federal Law Survey Chart (revised)

    Trade Secrets Laws and the UTSA – A 50 State and Federal Law Survey Chart (revised)
    Every state but Massachusetts and New York has adopted the Uniform Trade Secrets Act (the UTSA) in one form or another – though some may quibble with whether Alabama or North Carolina actually adopted it. (The Uniform Law…
  • Feb 4

    BRR 50-State Noncompete Chart (Updated Today)

    BRR 50-State Noncompete Chart (Updated Today)
    The BRR 50 State Noncompete Chart has been updated to reflect a few developments and to make a few tweaks since the last draft. Most significantly, Georgia surprised many (me included) with its decision that the 2011…
  • Feb 1

    Trade Secret and Noncompete Survey – National Case Graph 2017

    Trade Secret and Noncompete Survey – National Case Graph 2017
    As regular readers of this blog know, several years ago, I became curious to see how many reported trade secret / noncompete decisions were issued each year in all federal and state courts around the country. So, I did a “back of the…
Rank this Week: 4834

Georgia Internet Law

Georgia Internet Law

Provides information and commentary regarding Internet law, e-commerce and technology law, World Wide Web regulation, and intellectual property. By Richardson Sixth, LLC.

http://georgiainternetlaw.com/
  • Nov 28

    Bitcoin and Consumer Protection Measures in Digital Currency

    Bitcoin and Consumer Protection Measures in Digital Currency
    This is another in a series of posts focused on the first state regulation of cryptocurrency businesses.  Ostensibly, depending on one’s opinion, the New York BitLicense regulation of bitcoin (and digital currency businesses…
  • Nov 2

    The Bitcoin Business State License Requirement: BitLicense

    The Bitcoin Business State License Requirement: BitLicense
    The last post in this series by Atlanta Bitcoin attorney Mark Richardson VI familiarized the reader with the regulatory vernacular of the New York BitLicense law now in effect.  Let’s now examine to whom exactly that license…
  • Oct 19

    BitLicense Legal Regulations: What are We Talking About?

    BitLicense Legal Regulations: What are We Talking About?
    Here’s the first installment of a Crypto-Counsel ℠ series on the New York State Department of Financial Services (“NYDFS“) “BitLicense” regulations applicable to digital currency businesses (the…
Rank this Week: 3900

German IT Law

German IT Law

Provides updates and analysis on German and European IP/IT, technology, media and (open source) software law. By JBB Rechtsanwälte.

http://germanitlaw.com/
Rank this Week: 3507

Global Regulatory Enforcement Law…

Global Regulatory Enforcement Law Blog

Covers antitrust, privacy, international trade, and white color criminal defense. By Reed Smith.

http://www.globalregulatoryenforcementlawblog.com
  • Feb 10

    Private Equity Firm Held Responsible for Portfolio Company’s Antitrust Violation

    Private Equity Firm Held Responsible for Portfolio Company’s Antitrust Violation
    In January of 2017 a private equity firm, Bencis, was found liable for a portfolio company’s involvement as one of 14 cartelists producing flour in the Netherlands, Belgium, and Germany. The Authority for Consumers and Markets (ACM)…
  • Feb 10

    2017 Expectations of the U.S. CFTC Enforcement Agenda

    2017 Expectations of the U.S. CFTC Enforcement Agenda
    The U.S. Commodity Futures Trading Commission is undergoing a transformation with the new Trump administration while staying on course with its statutory mission of protecting US commodities and derivatives markets.  Some of CFTC’s…
  • Feb 10

    Iran Missile Test Leads to New Sanction

    Iran Missile Test Leads to New Sanction
    On February 2nd the Office of Foreign Assets Control (“OFAC”) imposed new sanctions on 13 individuals and 12 entities that were believed to be “involved in procuring technology and/or materials to support Iran’s…
Rank this Week: 1022

HIPAA Blog

HIPAA Blog

Features a discussion of medical privacy. By Jeffrey P. Drummond.

http://hipaablog.blogspot.com/
  • Feb 23

    Interesting Question: HIPAA lawyer Adam…

    Interesting Question: HIPAA lawyer Adam Greene was interviewed at HIMSS, and noted that HHS is close to publishing the regulations implementing the HITECH revisions that allow affected individuals to get a share of the fines levied by OCR.…
  • Feb 22

    2 Healthcare Data Breaches up 40%, Affect…

    2 Healthcare Data Breaches up 40%, Affect 25% of Consumers: According to the Identity Theft Research Center, Healthcare represents one third of all data breaches, and the number of reported breaches has risen from 780 in 2015 to 1093 last…
  • Feb 17

    Another Day, Another Monster Fine: This…

    Another Day, Another Monster Fine: This time it's Memorial Healthcare System (Florida), with a $5.5 million fine for not following access controls and allowing terminated employees to continue accessing medical records after being terminated.…
Rank this Week: 2595

Hunton Retail Law Resource Blog

Hunton Retail Law Resource Blog

Analysis and Insight in Retail Law

https://www.huntonretailindustryblog.com/
  • Feb 1

    FTC Issues Report on Cross-Device Tracking

    FTC Issues Report on Cross-Device Tracking
    On January 23, 2017, the FTC released a Staff Report on cross-device tracking technology that can link multiple Internet-connected devices to the same person and track that person’s activity across those devices. The Report follows a…
  • Jan 31

    Consumer Protection in Retail: Weekly Roundup

    Consumer Protection in Retail: Weekly Roundup
    This past week, several consumer actions made headlines that affect the retail industry. Continue reading for our weekly roundup. … Continue Reading
  • Jan 26

    Why Lawyers Can’t Give Straight Answers About Product Regulatory and Recall Risk (Part 3)

    Why Lawyers Can’t Give Straight Answers About Product Regulatory and Recall Risk (Part 3)
    Kelly Faglioni, a partner in Hunton’s Product Liability group, authored an article identifying and discussing approaches for managing risk that arises from complexity and ambiguity in product regulatory schemes including approaches to…
Rank this Week: 2192

Information Law Group

Information Law Group

Covers advertising law, privacy, information security and intellectual property.

http://www.infolawgroup.com/
  • Feb 9

    InfoLawGroup Launches CPO on Demand™ Service

    InfoLawGroup Launches CPO on Demand™ Service
    InfoLawGroup announces the launch of CPO on Demand™, a service through which we serve as outside Chief Privacy Officers, Privacy Counsel, and DPOs as required under EU regulation. CPO on Demand™ brings the depth and breadth of our…
  • Feb 7

    FTC and NJ AG Reach $2.2 Million Settlement to Resolve Vizio Video Privacy Matter

    FTC and NJ AG Reach $2.2 Million Settlement to Resolve Vizio Video Privacy Matter
    On Monday, February 6, 2017, the Federal Trade Commission (“FTC”) and New Jersey Attorney General (“NJAG”) announced a settlement agreement to resolve their joint enforcement action against Vizio. The regulators…
  • Feb 2

    NJ TCCWNA Claim Thwarted by CA Choice-of-Law Provision

    NJ TCCWNA Claim Thwarted by CA Choice-of-Law Provision
    As we have previously written about, 2016 saw a wave of litigation brought under New Jersey’s Truth-in-Consumer Contracting, Warranty, and Notice Act (“TCCWNA”) regarding website Terms of Use.  While service…
Rank this Week: 3906

Information Technology Law Blog

Information Technology Law Blog

Covers social media, e-discovery, privacy, and intellectual property. By Foster Swift Collins & Smith PC.

http://www.michiganitlaw.com/
  • Feb 15

    Fiduciary Rule update: the beginning of the end?

    Fiduciary Rule update: the beginning of the end?
    Shortly after our first article on the DOL Fiduciary Rule the White House issued an Executive Order that requires the Department of Labor (the "DOL") to revisit the Fiduciary Rule (the "Fiduciary Rule" or the "Rule") and the Prohibited…
  • Feb 7

    5 Tips for Investigating and Purchasing Cyber Insurance

    5 Tips for Investigating and Purchasing Cyber Insurance
    In 2016 Lansing, MI's Board of Water and Light fell victim to a cyber-attack that resulted in $2.4 million in costs, including a $25,000 ransom paid to the perpetrators. In the aftermath of the breach, BWL announced that it was filing for a…
  • Jan 31

    The New Fiduciary Rule and its Future

    The New Fiduciary Rule and its Future
    With a sea of political change in Washington this year, many are speculating on what regulatory reforms the Trump administration and a Republican Congress will make in 2017. One reform in particular is commonly mentioned: a repeal, delay, or…
Rank this Week: 3200

Inforrm\'s Blog

Inforrm\'s Blog

Discusses issues of media law and responsibility with a special focus on libel and privacy law and the balance between the two.

https://inforrm.wordpress.com/
Rank this Week: 309

Inside Privacy

Inside Privacy

Covers global privacy and data security. By Covington & Burling LLP.

http://www.insideprivacy.com
Rank this Week: 923

LegalTXTS

LegalTXTS

Covers law and technology, with an emphasis on legal issues regarding digital media, privacy and data security, and information management. By Elijah Yip.

http://www.legaltxts.com/
  • Jan 25

    The Tax Scams Cometh

    The Tax Scams Cometh
    Tax season is miserable for many because it means having to cut a check to the IRS.  But it’s not just Uncle Sam who’s interested in your money.  Scammers are also looking to get paid, and they’ll do it by stealing…
  • Oct 26

    Police officer suspended for controversial Facebook posts allowed to go to trial on First Amendment retaliation claim

    Police officer suspended for controversial Facebook posts allowed to go to trial on First Amendment retaliation claim
    It’s generally a good practice to set standards of online employee conduct to prevent the social media activity of employees from disrupting the workplace or tarnishing your organization’s reputation.  But the mere fact that…
  • Sep 21

    Six Years Later, NLRB’s Social Media Guidelines Still Confound

    Six Years Later, NLRB’s Social Media Guidelines Still Confound
    Six years ago, the National Labor Relations Board (NLRB) became one of the first governmental agencies to regulate social media use in the workplace.  In 2010 and 2011, the NLRB issued a series of guidance memos and decisions sketching…
Rank this Week: 3502

New Media & Technology Law Blog

New Media & Technology Law Blog

Covers intellectual property, data security, online marketing and online commerce. By Proskauer.

http://newmedialaw.proskauer.com
Rank this Week: 3982

North Carolina Journal of Law &…

North Carolina Journal of Law & Technology

Features legal scholarship in law and technology topics, including intellectual property law, cyberspace law, environmental law, criminal law, health law, and privacy law.

http://ncjolt.org/
  • Feb 24

    Treatment of Women in the Tech Industry Cannot Be Ignored

    Treatment of Women in the Tech Industry Cannot Be Ignored
    Technology companies, especially start-ups, have long been a beacon for the quirky yet talented to produce great products that make early investors and creators rich. Somewhere around 90% of startups will ultimately fail and with the speed in…
  • Feb 23

    Microsoft is Fighting to Protect Your Secret

    Microsoft is Fighting to Protect Your Secret
    It seems the United States Government cannot stop secretly spying on its citizens, but Microsoft, and other service providers, may be paving the way to at least remove some of the secrecy. U.S. District Court Judge James Robart—recently…
  • Feb 22

    Helping Astronauts Go to the Bathroom in Space

    Helping Astronauts Go to the Bathroom in Space
    Imagine that moment of trying to unlock your front door when you desperately need to use the bathroom. You finally jiggle the key into the lock, burst into the room, drop everything you’re holding, and sprint to the bathroom. Relief.…
Rank this Week: 4388

Peter Fleischer: Privacy...?

Peter Fleischer: Privacy...?

Covers privacy law and corporate privacy policy. By Peter Fleischer, Global Privacy Counsel for Google.

http://peterfleischer.blogspot.com/
  • May 14

    Harvard Nostalgia

    Harvard Nostalgia
    The older I get, the more I think back to Harvard with nostalgia.  I was very young at Harvard.  I went to college straight out of the 10th grade, and I graduated at the age of 19.  That officially makes me a high school…
  • Apr 6

    From pool to pool

    From pool to pool
    I love my pools.    In Paris, my pool is in a fancy private club, in the Bois de Boulogne, on the edge of Paris.  It's a gorgeous 50-meter pool, open year-round outdoors, framed by views of the Eiffel Tower. My pool nurtured…
  • Mar 12

    A Science Fiction Novel

    A Science Fiction Novel
    I'd like to crowd-source the plot for a science fiction novel.  Would this make a good story?:In a not-too-distant future, say 20 years from now, humanity lives through the biggest change in its history.  It doesn't happen…
Rank this Week: 1406

Politics of Privacy Blog

Politics of Privacy Blog

Covers privacy, liberty, security, economy and their interaction. By Andreas Busch.

http://politicsofprivacy.blogspot.com/
  • Jan 18

    Again: loss of personal data by public officials in the UK

    Again: loss of personal data by public officials in the UK
    Less than two months after the loss of the personal details of 25 million people by the UK's tax authorities (see this blog entry), another substantial loss of personal data has occurred in Britain. As the BBC website writes, a laptop…
  • Jan 7

    Jeremy Clarkson and identity theft

    Jeremy Clarkson and identity theft
    Well, first of all, a happy new year to my readers! And I am glad to be able to report that page visits to this blog more than doubled in 2007 over 2006, to well over 5000 pageviews. I am very happy about this and will take it as a reminder…
  • Nov 20

    British tax authorities lose personal details of 25 million people

    British tax authorities lose personal details of 25 million people
    A crass case of neglect and breach of data protection legislation has led to the loss of discs containing the names, addresses, dates of birth, bank account details and National Insurance numbers of 25 million people in the United Kingdom, it…
Rank this Week: 1417

Primary Opinion

Primary Opinion

Covers corporate, employment, IP and privacy news.

http://primaryopinion.com/
  • Nov 27

    Social media marketing for lawyers and law firm

    Social media marketing for lawyers and law firm
    Law firms of all sizes are now embracing social media as a means to showcase expertise and reach new customers. But, opening a Twitter, LinkedIn or Google+ account is only the first part of the process. Here are five pointers for realising…
  • Oct 13

    Legal opinion round up: CJEU’s ruling on registering 3D object trademark

    Legal opinion round up: CJEU’s ruling on registering 3D object trademark
    3D shape marks took another battering at the end of September with the European Court of Justice (CJEU) ruling that such trademarks can be declared invalid if the shape can be linked ‘essentially’ or ‘substantially’ to…
  • Oct 7

    Meet our independent blogger

    Meet our independent blogger
    Our new content portal www.primaryopinion.com draws together the best of the IP industry’s news, commentary and knowledge, so that IP professionals, in-house counsel and business heads can access it on one up-to-date platform. That…
Rank this Week: 1894

Privacy & Security Matters

Privacy & Security Matters

By Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

http://www.privacyandsecuritymatters.com
  • Feb 22

    Failure of Audit Controls Can Cost $$$

    Failure of Audit Controls Can Cost $$$
    Last week, the HHS Office for Civil Rights (OCR) disclosed a $5.5 million settlement with Memorial Healthcare Systems (MHS) for HIPAA violations affecting the protected health information (PHI) of 115,143 individuals. The Resolution…
  • Feb 16

    The February 2017 Update – The Mintz Matrix

    The February 2017 Update – The Mintz Matrix
    As our readers know we maintain a summary of U.S. state data breach notification laws, which we refer to as the “Mintz Matrix.”   Our latest update is available here, and it should be part of your incident response…
  • Feb 14

    WEBINAR – Access, Correction, Erasure and Portability under the GDPR: How to Minimize the Burden

    WEBINAR – Access, Correction, Erasure and Portability under the GDPR: How to Minimize the Burden
    Since September, the Mintz Levin Privacy Webinar Series has focused on the upcoming EU General Data Protection Regulation (GDPR) to help businesses understand the reach and scope of the GDPR and prepare for the potentially game-changing…
Rank this Week: 3909

Privacy & Security Source

Privacy & Security Source

Covers anonymous subpoenas, behavioral advertising, employee monitoring, geolocation and information security. By Foley & Lardner LLP.

http://www.privacysecuritysource.com
Rank this Week: 4038

Privacy & Information Security…

Privacy & Information Security Law Blog

Provides global privacy and information security law updates and analysis. By Hunton & Williams.

https://www.huntonprivacyblog.com/
  • Feb 13

    CIPL to Hold Next GDPR Implementation Workshop in Madrid

    CIPL to Hold Next GDPR Implementation Workshop in Madrid
    On March 6 and 7, 2017, the Centre for Information Policy Leadership at Hunton & Williams LLP and over 100 public and private sector participants in CIPL’s GDPR Implementation Project will convene in Madrid, Spain, for CIPL’s…
  • Feb 9

    DPA of Argentina Issues Draft Data Protection Bill

    DPA of Argentina Issues Draft Data Protection Bill
    Pablo Palazzi, from Buenos Aires law firm Allende & Brea, reports that earlier this month, the Argentine Data Protection Agency posted the first draft of a new data protection bill on its website. The Draft Bill is heavily based on the EU…
  • Feb 9

    House of Representatives Passes Email Privacy Act

    House of Representatives Passes Email Privacy Act
    On February 6, 2017, the House of Representatives suspended its rules and passed by voice vote H.R 387, the Email Privacy Act. The Email Privacy Act now moves to the Senate, where it will be considered by the Senate Judiciary Committee.…
Rank this Week: 136

Privacy and Data Security Law

Privacy and Data Security Law

Covers the creation, collection, use, destruction and security of data. By Dentons.

http://www.privacyanddatasecuritylaw.com/
  • Dec 21

    Private Right of Action under CASL coming July 2017

    Private Right of Action under CASL coming July 2017
    Canada’s Anti-Spam Law came into force on July 1, 2014.  Since then, all eyes have been on the Canadian Radio-television and Telecommunications Commission (CRTC) for decisions concerning CASL violations. …
  • Dec 3

    HHS Issues Warning About Phishing Campaign Disguised As Official Communication

    HHS Issues Warning About Phishing Campaign Disguised As Official Communication
    As part of its efforts to assess compliance with the HIPAA Privacy, Security and Breach Notification Rules, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) engages in audits of covered entities and their…
  • Nov 23

    FTC Announces New Guidance on Ransomware

    FTC Announces New Guidance on Ransomware
    On November 10, 2016, the U.S. Federal Trade Commission (FTC) released new guidance for businesses and consumers on the impact of, and how to respond to ransomware.  Ransomware is a form of malicious software that infiltrates computer…
Rank this Week: 3720

Privacy and IP Law Blog

Privacy and IP Law Blog

Addresses recent events in trademark, copyright, computer and privacy law. By Christina Frangiosa.

http://privacyandiplawblog.com/
  • Feb 20

    USPTO Requests Comment on Draft Examination Guide for Matter “Incapable” of Registration

    USPTO Requests Comment on Draft Examination Guide for Matter “Incapable” of Registration
    This post examines the USPTO's draft Examination Guide on Incapable Informational Matter - essentially matter that is not capable of federal trademark registration because it cannot function as a trademark. The Draft Guide focused on three…
  • Nov 28

    Common Questions – Can I Copyright My Formula?

    Common Questions – Can I Copyright My Formula?
    Probably not. No matter how new a formula (a.k.a. recipe) may be, if it simply comprises a combination of ingredients mixed together to form a new and unique dish, it is not likely to be copyrightable. And, once published, even if the recipe…
  • Nov 17

    Common Questions: What’s the Difference Between a Trademark and a Service Mark?

    Common Questions: What’s the Difference Between a Trademark and a Service Mark?
    This is actually a trick question – the answer is, “not much”. Generally, trademarks refer to source-identifying marks used in connection with goods (products) and service marks are used for the same purpose, but in…
Rank this Week: 4888

Privacy and Security Law Blog

Privacy and Security Law Blog

Covers biometrics, HIPAA, identity theft, PATRIOT Act, phishing and more. By Davis Wright Tremaine.

http://www.privsecblog.com/
  • Feb 21

    Comments Sought of FCC Privacy Regime

    Comments Sought of FCC Privacy Regime
    On Friday, the Federal Register published the FCC’s January 17th Public Notice of the fact that eleven Petitions for Reconsideration were filed in the Broadband Privacy proceeding (WC Docket No. 16-106).  The Petitions challenge…
  • Feb 17

    42 C.F.R. Part 2 Final Rule Is Officially Delayed … Can Comments to HHS and OMB Fix It?

    42 C.F.R. Part 2 Final Rule Is Officially Delayed … Can Comments to HHS and OMB Fix It?
    On January 18, 2017, the U.S. Department of Health and Human Services (HHS) published a final rule amending the Confidentiality of Substance Use Disorder Patient Records rule at 42 C.F.R. Part 2. Yesterday, HHS delayed the effective date of…
  • Feb 13

    To Settle or Not to Settle – That Is the Question Raised by Recent HIPAA CMP

    To Settle or Not to Settle – That Is the Question Raised by Recent HIPAA CMP
    On February 1, 2017, the Department of Health and Human Services, Office for Civil Rights (“OCR”) announced that the Children’s Medical Center of Dallas (“Children’s”) has paid a civil monetary penalty…
Rank this Week: 2628

Privacy Law Blog

Privacy Law Blog

Covers data privacy, identity theft, invasion of privacy, and national security legal issues. By Proskauer Rose LLP.

http://privacylaw.proskauer.com/
  • Feb 16

    Kingdom in the Cloud: Saudi Arabia’s Draft Cloud Computing Regulation

    Kingdom in the Cloud: Saudi Arabia’s Draft Cloud Computing Regulation
    Courtney M. Bowman Proskauer litigation associate Courtney Bowman and Jonathan Reardon, head of the Al Khobar, Saudi Arabia office of the Middle East-based firm Al Tamini & Co., recently co-authored an article published by Bloomberg about…
  • Jan 30

    Qatar’s New Personal Data Privacy Law

    Qatar’s New Personal Data Privacy Law
    Courtney M. Bowman At the end of last year, Qatar became the first Gulf state to enact a comprehensive privacy law. Until now, the many companies that market to consumers or have employees based in Gulf Cooperation Council (GCC) countries…
  • Jan 25

    Draft Privacy and Electronic Communications Regulation published by European Commission

    Draft Privacy and Electronic Communications Regulation published by European Commission
    Kelly McMullon The European Commission has released proposals for new legislation that seeks to create stronger privacy in electronic communications. The draft Privacy and Electronic Communications Regulation (the “Regulation”) is…
Rank this Week: 4434

Reasonable Expectation

Reasonable Expectation

Focuses on privacy and data security. By M. Scott Koller.

http://www.reasonableexpectation.com
  • Jun 30

    Are Data Breach Investigations Privileged?

    Are Data Breach Investigations Privileged?
    #150654797 / gettyimages.com Are Data Breach Investigations Privileged? Originally Published on the InfoLaw Group Blog: Over the past year, the number of data breaches has skyrocketed and, as a result, companies are facing increased risk of…
  • Mar 20

    FTC Seeks Public Comment on iKeepSafe’s Proposed Safe Harbor Program Under the Children’s Online Privacy Protection Rule

    FTC Seeks Public Comment on iKeepSafe’s Proposed Safe Harbor Program Under the Children’s Online Privacy Protection Rule
    Internet Keep Safe Coalition (iKeep Safe) has submitted a proposed safe harbor program to the Federal Trade Commission under the the agency’s Children’s Online Privacy Protection Rule. Under 16 C.F.R. 312.11, COPPA safe…
  • Feb 28

    Obama’s new cybersecurity plan a good start

    Obama’s new cybersecurity plan a good start
    I recently authored an article for the Daily Journal on the new cybersecurity framework.  You can read about it by visiting the Daily Journal.  
Rank this Week: 4839

Security, Privacy and The Law

Security, Privacy and The Law

Covers information security and privacy issues. By Foley Hoag LLP.

http://www.securityprivacyandthelaw.com
Rank this Week: 4005

sobre privacidad y protección de…

sobre privacidad y protección de datos

Spanish language blog about privacy and data protection. By Daniel A. Lopez Carballo.

http://www.dlcarballo.com/
Rank this Week: 3787