Most Popular Privacy Law Blawgs Expanded View List View

Blogs 1 - 45 of 55
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Inforrm's Blog

Inforrm's Blog

Discusses issues of media law and responsibility with a special focus on libel and privacy law and the balance between the two.

http://inforrm.wordpress.com
Rank this Week: 129

Privacy & Information Security…

Privacy & Information Security Law Blog

Provides global privacy and information security law updates and analysis. By Hunton & Williams.

http://www.huntonprivacyblog.com/
Rank this Week: 358

Clancco: Art & Law

Clancco: Art & Law

Covers the relationship between art and law with a focus on intellectual property, nonprofit tax-exempt organizations, free speech, and contemporary art. By Sergio Muñoz Sarmiento.

http://clancco.com/wp
  • Apr 16

    California Royalties Law May Looks Dead in the Water

    California Royalties Law May Looks Dead in the Water
    Donn Zaretsky agrees. One of the judges even asked, “Aren’t there harmful effects to the state’s art market?” The art market. The Art Market! Oh where, oh where are our little Marxists when we need them?  
  • Apr 16

    Can You Have an Art Exhibition Without Art? Triple Candie Under Oath

    Can You Have an Art Exhibition Without Art? Triple Candie Under Oath
    Saturday, April 19, 2014. Museum of Contemporary Art, Detroit 1 – 3pm Admission: Free (Suggested $5 museum donation) Who, or what, is Triple Candie? What does it do, and why does it exist? How can it curate art exhibitions without…
  • Apr 10

    Guggenheim Bilbao Censors “Offensive” Paul McCarthy and Mike Bouchet Public Artwork

    Guggenheim Bilbao Censors “Offensive” Paul McCarthy and Mike Bouchet Public Artwork
    According to Artnet, the Guggenheim Bilbao is forcing the removal of a provocative and controversial Paul McCarthy and Mike Bouchet 2,000 square foot mural installation on the side of a building in Bilbao. The billboard is an…
Rank this Week: 256

Inside Privacy

Inside Privacy

Covers global privacy and data security. By Covington & Burling LLP.

http://www.insideprivacy.com
  • Apr 14

    Kentucky Enacts Data Breach Notification Law

    Kentucky Enacts Data Breach Notification Law
    Last week, Kentucky governor Steve Beshear signed H.B. 232 into law, making Kentucky the 47th state to enact data breach notification legislation.  The law requires companies that suffer a data breach to provide notice of the…
  • Apr 14

    Breaking Down the Court's Decision in FTC v. Wyndham Worldwide Corp.

    Breaking Down the Court's Decision in FTC v. Wyndham Worldwide Corp.
    Last week, a federal judge in the District of New Jersey denied Wyndham Hotels and Resorts' motion to dismiss the FTC's complaint alleging Wyndham violated the FTC Act by failing to provide reasonable security for its customers' personal…
  • Apr 11

    DOJ and FTC Issue Antitrust Policy Statement on Sharing of Cybersecurity Information

    DOJ and FTC Issue Antitrust Policy Statement on Sharing of Cybersecurity Information
    On April 10, 2014, the U.S. Department of Justice (“DOJ”) and the Federal Trade Commission (“FTC”) issued a joint “Antitrust Policy Statement on Sharing of Cybersecurity Information.” Information sharing…
Rank this Week: 236

US Law Watch

US Law Watch

Provides US legal and regulatory information. By BNA International.

http://www.uslawwatch.com
Rank this Week: 235

HIPAA Blog

HIPAA Blog

Features a discussion of medical privacy. By Jeffrey P. Drummond.

http://hipaablog.blogspot.com/
Rank this Week: 754

Global Regulatory Enforcement Law…

Global Regulatory Enforcement Law Blog

Covers antitrust, privacy, international trade, and white color criminal defense. By Reed Smith.

http://www.globalregulatoryenforcementlawblog.com
  • Apr 17

    Federal Circuit Decision Settles GAO/COFC Split on Agency's Use of Cooperative Agreement

    Federal Circuit Decision Settles GAO/COFC Split on Agency's Use of Cooperative Agreement
    This post was written by Carlos A. Valdivia and Gunjan Talati. In March, the Federal Circuit settled a split between the Government Accountability Office ("GAO") and the Court of Federal Claims that focused on the gray area between…
  • Apr 16

    DC Circuit Invalidates Conflict Mineral Reporting Regulation

    DC Circuit Invalidates Conflict Mineral Reporting Regulation
    This post was written by Jeffrey Orenstein. This week the U.S. Court of Appeals for the D.C. Circuit held that the Security and Exchange Commission’s (“SEC”) final rule concerning “conflict mineral” disclosures…
  • Apr 15

    Ridiculous and Complicated: Proposed Changes to Support Documents for EAR License

    Ridiculous and Complicated: Proposed Changes to Support Documents for EAR License
    This post was written by Leigh T. Hansson, Carlos A. Valdivia, and Joelle E.K. Laszlo. On April 9th, the Bureau of Industry and Security (“BIS”) proposed a rule that would remove certain documentation requirements in…
Rank this Week: 930

Advertising Law Blog

Advertising Law Blog

Provides commentary and news on developing legal issues in advertising, promotional marketing, Internet, and privacy law. By Olshan Frome Wolosky LLP.

http://www.olshanlaw.com/blogs-Advertising-Law-Blog
Rank this Week: 795

SullivanLawNet

SullivanLawNet

Legal news and analysis, with an emphasis on international and domestic intellectual property developments. By Shawn Sullivan.

http://sullivanlaw.net/
  • Mar 31

    Unintended Consequences of Open Access Publishing Policie

    Unintended Consequences of Open Access Publishing Policie
    Rick Anderson at The Scholarly Kitchen has a thought-provoking article regarding the pressure on authors to publish their academic articles under the most permissive open access licenses available. See Rick Anderson, CC-BY, Copyright, and…
  • Mar 31

    “Twilight” Trademark Infringement Claims Cleared for Trial

    “Twilight” Trademark Infringement Claims Cleared for Trial
    The U.S. District Court for the Southern District of New York ruled that the entertainment company responsible for the “Twilight” film series is entitled to a trial on claims that its trademarks were infringed by a cosmetics…
  • Mar 28

    DC Circuit Upholds USDA Country-of-Origin Rule for Meat Label

    DC Circuit Upholds USDA Country-of-Origin Rule for Meat Label
    In American Meat Institute, Inc. v. United States Department of Agriculture, No. 13-5281 (D.C. Cir. Mar. 28, 2014), the U.S. Court of Appeals for the District of Columbia Circuit rejected industry challenges to a U.S. Department of…
Rank this Week: 715

Fair Competition Law Blog

Fair Competition Law Blog

Covers trade secrets, noncompetes, privacy and security, the Computer Fraud and Abuse Act, trademarks, copyrights, and business torts. By Russell Beck.

http://faircompetitionlaw.com
  • Feb 26

    New Trade Secrets Study by PwC and CREATEe.org

    New Trade Secrets Study by PwC and CREATEe.org
    For those interested in the economics and policies behind trade secrets, PricewaterhouseCoopers and The Center for Responsible Enterprise & Trade (CREATe.org) have issued a detailed report on the economic impact of trade secret…
  • Jan 11

    Trade Secrets and Noncompetes – Year in Review 2013

    Trade Secrets and Noncompetes – Year in Review 2013
    This past week, the Boston Bar Association held its 14th annual Intellectual Property Year in Review. I covered trade secrets (including related restrictive covenants). Below is a summary of those developments. (If you would like a complete…
  • Jan 7

    Trade Secret and Noncompete Survey – National Case Graph 2014 [Preliminary Data]

    Trade Secret and Noncompete Survey – National Case Graph 2014 [Preliminary Data]
    A few years ago, I became curious to see how many reported trade secret / noncompete decisions were issued each year in all federal and state courts around the country. So, I did a “back of the envelope” calculation. I have…
Rank this Week: 596

Information Law Group

Information Law Group

Covers advertising law, privacy, information security and intellectual property.

http://www.infolawgroup.com/
Rank this Week: 1047

Privacy and Security Law Blog

Privacy and Security Law Blog

Covers biometrics, HIPAA, identity theft, PATRIOT Act, phishing and more. By Davis Wright Tremaine.

http://www.privsecblog.com/
Rank this Week: 2539

Socially Aware Blog

Socially Aware Blog

Covers the law and business of social media. By Morrison Foerster.

http://www.sociallyawareblog.com/
Rank this Week: 4345

Privacy & Security Matters

Privacy & Security Matters

By Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

http://www.privacyandsecuritymatters.com
Rank this Week: 1990

Copyright, Intellectual Property,…

Copyright, Intellectual Property, Computer, Internet, e-Commerce Law

Covers IP/IT law, with a strong focus on copyright and internet law. By Barry Sookman.

http://www.barrysookman.com
  • Apr 17

    Computer and Internet Law Updates for 2014-04-16

    Computer and Internet Law Updates for 2014-04-16
    Premier League drops copyright infringement case against YouTube http://t.co/ZXQqZOGLz1 -> All sent and received e-mails in Gmail will be analyzed, says Google http://t.co/hG71XrEZmI -> Do Patents Truly Promote Innovation?…
  • Apr 16

    Computer and Internet Law Updates for 2014-04-15

    Computer and Internet Law Updates for 2014-04-15
    What is use of a trade mark in the internet context? McMillan LLP v http://t.co/Qg3hLmt1TO, Inc, 2014 TMOB 51 http://t.co/1sks1olqKI -> 1 in 5 U.S. internet users have had sensitive data stolen http://t.co/2750asDQaF -> Illegal download…
  • Apr 15

    Computer and Internet Law Updates for 2014-04-14

    Computer and Internet Law Updates for 2014-04-14
    Heartbleed bug highlights banks’ severe cyber security headaches http://t.co/UuCGS1l241 -> Companies tune up for musical battle http://t.co/Z7NrGUFcVg -> Appeals court reverses hacker/troll “weev” conviction and…
Rank this Week: 2801

Data Privacy Monitor

Data Privacy Monitor

Covers data privacy, security and social media subjects. By Baker Hostetler.

http://www.dataprivacymonitor.com/
  • Apr 16

    Iowa Breach Notification Law Now Requires AG Notification, Applies to Paper Record

    Iowa Breach Notification Law Now Requires AG Notification, Applies to Paper Record
    Iowa recently joined an increasing number of states that require notification of state regulatory authorities following a breach, as well as a handful of states in which paper records can trigger notification obligations.  On April 3,…
  • Apr 14

    Kentucky Enacts Data Breach Notification Statute

    Kentucky Enacts Data Breach Notification Statute
    On April 10, 2014, Kentucky Governor Steve Beshear signed H.B. 232 into law, making Kentucky the 47th state to enact data breach notification legislation.  Prior to H.B. 232, Kentucky was one of only four states—including Alabama,…
  • Apr 14

    With OpenSSL Compromised by Heartbleed, an Opportunity for Companies to Diversify Cyber Security Effort

    With OpenSSL Compromised by Heartbleed, an Opportunity for Companies to Diversify Cyber Security Effort
    The recent discovery of the “Heartbleed” online bug has sent shockwaves through the internet, causing companies and individuals alike to question very basic assumptions about cyber security. The bug has allegedly existed for…
Rank this Week: 3671

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Apr 16

    Armenian Bill Threatens Online Anonymity

    Armenian Bill Threatens Online Anonymity
    In Armenia, online anonymity could be a luxury of the past if a bill that is currently before the Armenian parliament is passed.  The bill would make it illegal for media outlets to publish defamatory content by anonymous or fake…
  • Apr 16

    In the One-sided Foreign Intelligence Surveillance Court, It's Hard to Get The Whole Story

    In the One-sided Foreign Intelligence Surveillance Court, It's Hard to Get The Whole Story
    While most courts in the United States are adversarial—each party presents its side and a jury, or occasionally a judge, makes a decision—in the Foreign Intelligence Surveillance Court (FISC), only the government presents its case…
  • Apr 15

    Dear Web Developers: EFF Needs Your Help

    Dear Web Developers: EFF Needs Your Help
    Donate a Few Hours to Help Us Create a Free Software Backend for Contacting Congress, Make the World a Better Place for Digital Rights For years, EFF has been helping concerned technology users contact Congress. The EFF community stopped…
Rank this Week: 2030

Broadband Law Advisor

Broadband Law Advisor

Provides insight and information on the FCC's National Broadband Plan. By Davis Wright Tremaine LLP.

http://www.broadbandlawadvisor.com/
  • Apr 16

    Louisiana PSC Issues Proposed Rules in Multi-Year Pole Attachment Rulemaking

    Louisiana PSC Issues Proposed Rules in Multi-Year Pole Attachment Rulemaking
    On April 9, staff of the Louisiana Public Service Commission (“Commission”) sent stakeholders involved in a pole attachment rulemaking a draft set of proposed pole attachment rules.  The proposed rules are the result of a…
  • Apr 9

    FCC Seeks Comments On Pole Attachment Agreement Indemnity Clause

    FCC Seeks Comments On Pole Attachment Agreement Indemnity Clause
    Yesterday, the Federal Communications Commission (“FCC”) released a public notice seeking comment on a Petition for Declaratory Ruling that was filed by Mediacom Communications Corporation (“Mediacom”) on February 19,…
  • Apr 8

    Telephone Pole Owners File Cost Data with FCC

    Telephone Pole Owners File Cost Data with FCC
    April 1 was the deadline for telephone companies to file annual Automated Reporting Management Information System (“ARMIS”) reports, which are used to calculate telephone company pole owners’ maximum lawful pole…
Rank this Week: 3056

Information Technology Law Blog

Information Technology Law Blog

Covers social media, e-discovery, privacy, and intellectual property. By Foster Swift Collins & Smith PC.

http://www.michiganitlaw.com/
  • Apr 16

    The Importance of IT Contract Review

    The Importance of IT Contract Review
    Technology is increasingly becoming an essential component of all industries. This is especially true for the health care industry. As health care providers continue to increase their use of technology, they are asked more and more frequently…
  • Apr 9

    Provisional Patent Application

    Provisional Patent Application
    I get a lot of questions from clients about “provisional patents." Let me just start this blog by clarifying once and for all that there is no such thing as a “provisional patent” anywhere in the Patent Act. However, since…
  • Apr 2

    Bitcoin Update

    Bitcoin Update
    The IRS has warned that virtual currencies, such as Bitcoin, are to be treated as property and not as currency for tax purposes. Read this latest Bitcoin update on our tax blog. Want to learn more about Bitcoin? Check out this blog post from…
Rank this Week: 3576

Workplace Privacy, Data Management…

Workplace Privacy, Data Management & Security Report

Covers data security, HIPAA, identity theft and workplace privacy. By Jackson Lewis.

http://www.workplaceprivacyreport.com
Rank this Week: 2612

Privacy and IP Law Blog

Privacy and IP Law Blog

Addresses recent events in trademark, copyright, computer and privacy law. By Christina Frangiosa.

http://privacyandip.blogspot.com/
  • Apr 15

    Recent Presentations and Article

    Recent Presentations and Article
    More articles on IP and privacy issues will be posted here soon, but in the meantime, here are several recent articles that have published in other media:·        Participated in a panel discussion on…
  • Jan 28

    Today is Data Privacy Day!

    Today is Data Privacy Day!
    January 28 is “Data Privacy Day.”  In honor of the day, below are several links relating to efforts to protect the privacy of personal data and some tools for small businesses:Council of Europe’s explanation of the…
  • Jan 27

    New “Personal Information Privacy” Legislation Introduced

    New “Personal Information Privacy” Legislation Introduced
    On January 8, 2014, Sen. Patrick Leahy (D-Vt) re-introduced a personal privacy protection bill intended “to prevent and mitigate identity theft, to ensure privacy, to provide notice of security breaches, and to enhance criminal…
Rank this Week: 4989

Business Litigation Info

Business Litigation Info

Covers business litigation, intellectual property, data security, and advertising and media. By Faruki Ireland & Cox P.L.L.

http://www.businesslitigationinfo.com/
Rank this Week: 4153

Security, Privacy and The Law

Security, Privacy and The Law

Covers information security and privacy issues. By Foley Hoag LLP.

http://www.securityprivacyandthelaw.com
  • Apr 15

    Does Wyndham Confirm the FTC’s Role as Federal Privacy Enforcer?

    Does Wyndham Confirm the FTC’s Role as Federal Privacy Enforcer?
    by Chris Hart Data breach law in the United States might have just become a lot less patchy, but a little more uncertain.  On April 7, 2014, the District Court of New Jersey decided FTC v. Wyndham Worldwide Corp., et al., No.…
  • Apr 11

    FTC Provides Guidance on Heartbleed

    FTC Provides Guidance on Heartbleed
    I usually do not re-post directly from the FTC, but given the timeliness of the subject, the wide impact of the problem and the technical nature of the issue, I thought it was warranted to re-post the FTC’s guidance on…
  • Apr 11

    SEC Hosts Cybersecurity Roundtable

    SEC Hosts Cybersecurity Roundtable
    By Catherine Anderson Cybersecurity remains a hot topic for regulators, including the Securities and Exchange Commission (SEC).  On March 26, 2014, the SEC hosted a roundtable to discuss cybersecurity and the issues and challenges…
Rank this Week: 1248

Chronicle of Data Protection

Chronicle of Data Protection

Covers consumer privacy, data security, HIPAA, financial privacy and EU privacy. By Hogan Lovells.

http://www.hldataprotection.com
  • Apr 14

    HHS Releases Security Risk Assessment Tool

    HHS Releases Security Risk Assessment Tool
    The U.S. Department of Health and Human Services (HHS) recently released a security risk assessment (SRA) tool as a resource to assist health care providers in complying with the Health Insurance Portability and Accountability Act (HIPAA)…
  • Apr 9

    ECJ Declares Data Retention Directive Invalid

    ECJ Declares Data Retention Directive Invalid
    In a decision rendered on 8 April 2014, the European Court of Justice (ECJ) declared the Data Retention Directive invalid. The Court's decision was grounded on its conclusion that, by requiring the retention of the data falling within the…
  • Apr 8

    Federal Judge Upholds FTC’s Authority to Regulate Commercial Data Security Practice

    Federal Judge Upholds FTC’s Authority to Regulate Commercial Data Security Practice
    A New Jersey federal judge yesterday issued the much-anticipated opinion in Federal Trade Commission v. Wyndham Worldwide Corp., denying Wyndham’s challenge to the FTC’s authority to regulate data security under Section 5 of the…
Rank this Week: 2701

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
Rank this Week: 1972

LegalTXTS

LegalTXTS

Covers law and technology, with an emphasis on legal issues regarding digital media, privacy and data security, and information management. By Elijah Yip.

http://www.legaltxts.com/
Rank this Week: 1683

North Carolina Journal of Law &…

North Carolina Journal of Law & Technology

Features legal scholarship in law and technology topics, including intellectual property law, cyberspace law, environmental law, criminal law, health law, and privacy law.

http://ncjolt.org/
  • Apr 10

    Cryptocontracts: Automating Payment for Digital Consumption

    Cryptocontracts: Automating Payment for Digital Consumption
    The proliferation of digital currencies, following the lead of Bitcoin, has been outpaced only by the companies forming to bet their futures on widespread acceptance of the new technology. A few companies are focusing on self-enforcing…
  • Apr 10

    How Should Bitcoin Be Taxed? IRS Provides Short Answer

    How Should Bitcoin Be Taxed? IRS Provides Short Answer
    With “Tax Day” looming for many Americans, it seems the perfect time to talk about the Internal Revenue Service (“IRS”). Bitcoin is a relatively novel form of currency that was first introduced in 2009. Unlike…
  • Apr 8

    Stop Being a Jerk: FTC Charges Jerk.com with Deceiving Consumer

    Stop Being a Jerk: FTC Charges Jerk.com with Deceiving Consumer
    On Monday, April 7, 2014, the FTC alleged that Jerk broke federal laws and deceived consumers. The Massachusetts-based company created the social media site, Jerk.com which was active from 2009 until 2013. It also operated under jerk.be and…
Rank this Week: 1687

Center for Democracy & Technology

Center for Democracy & Technology

Cover privacy, digital copyright, security and open government.

https://www.cdt.org/blog
Rank this Week: 2252

The D: Drive | E-Discovery,…

The D: Drive | E-Discovery, Privacy and All Things Data

Covers privacy, e-discovery, data security, and cloud computing. By Davis LLP.

http://www.davis.ca/en/blog/d-drive/
  • Apr 7

    Compliance is Just the Beginning: CASL and Business Transaction

    Compliance is Just the Beginning: CASL and Business Transaction
    Many businesses are taking steps to comply with Canada’s new anti-spam legislation (“CASL”), which is coming into force on July 1, 2014. However, CASL compliance should not be the end of the story for businesses or their…
  • Mar 27

    When is an E-mail a Business Record?

    When is an E-mail a Business Record?
    Following my previous post, “E-mail Use Policies Must Be Meaningful,” it was pointed out to me, quite rightly, that a difficult part of implementing an e-mail use policy is defining what is a “business record.”…
  • Mar 24

    Email Use Policies Must Be Meaningful

    Email Use Policies Must Be Meaningful
    Coming up in the elevator this morning, I was reading the “Elevator News Network” (I am on the 60th floor, so it is hard not to stare at something!). It contained a bit of advice about Email Use Policies. The advice: Do not allow…
Rank this Week: 2282

Web Tech Law

Web Tech Law

Covers intellectual property, privacy, and social media in South Africa.

http://webtechlaw.com/our-insights
  • Apr 7

    How to deal with stalkers taking photos of you

    How to deal with stalkers taking photos of you
    I spoke to Kieno Kammies on 567 CapeTalk radio this morning about a troubling trend. As you can hear from the segment, below, the concern is partly about people being photographed in suspicious ways in public. One example is a person…
  • Mar 31

    Why you may want to reconsider that co.za domain name

    Why you may want to reconsider that co.za domain name
    If you are thinking about registering a co.za domain name, you may want to consider your possible liability to ZA Central Registry NPC (formerly called Uniforum), the organisation which administers the co.za namespace. It could be…
  • Mar 27

    Your email providers don't require a warrant to read your email

    Your email providers don't require a warrant to read your email
    Our email providers give themselves much more convenient access to your data through their terms of service or privacy policies. On one hand, this is level of access may be necessary to prevent disruptions and limit liability but, on the…
Rank this Week: 2250

Peter Fleischer: Privacy...?

Peter Fleischer: Privacy...?

Covers privacy law and corporate privacy policy. By Peter Fleischer, Global Privacy Counsel for Google.

http://peterfleischer.blogspot.com/
  • Apr 6

    From pool to pool

    From pool to pool
    I love my pools.    In Paris, my pool is in a fancy private club, in the Bois de Boulogne, on the edge of Paris.  It's a gorgeous 50-meter pool, open year-round outdoors, framed by views of the Eiffel Tower. My pool nurtured…
  • Mar 12

    A Science Fiction Novel

    A Science Fiction Novel
    I'd like to crowd-source the plot for a science fiction novel.  Would this make a good story?:In a not-too-distant future, say 20 years from now, humanity lives through the biggest change in its history.  It doesn't happen…
  • Jan 29

    Hokey Pokey in Sochi

    Hokey Pokey in Sochi
    Czar Vladimir is not your average oligarch who can blow 50 billion to throw himself a party.  But even that much money can't buy you love, with the terrorists plotting to get in, and people with a conscience staying away.…
Rank this Week: 1853

Beyond Telecom Law Blog

Beyond Telecom Law Blog

Covers telecom policy, services agreements and data security/privacy. By Keller and Heckman LLP.

http://www.beyondtelecomlawblog.com
Rank this Week: 1175

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
  • Apr 1

    ICANN Reader: IANA Transition Away from U.S. Draws Widespread Concern

    ICANN Reader: IANA Transition Away from U.S. Draws Widespread Concern
    Three things can happen when you pass the football, and two of them are bad. A roundup of reaction to the news that the U.S. Department of Commerce will be transferring its oversight role for key functions in the domain name system to an…
  • Feb 6

    The Latest on ICANN's New gTLD Program: Business Opportunities and Legal Risk

    The Latest on ICANN's New gTLD Program: Business Opportunities and Legal Risk
    On March 5, Bloomberg BNA is putting on a free webinar, "The Latest on ICANN's gTLD Program: Today’s Business Opportunities and Legal Risks." This webinar promises to be well worth the time of anyone with a business or law practice…
  • Feb 6

    Cyberlaw Review 2014: Electronic Surveillance, Emerging Payment Technologie

    Cyberlaw Review 2014: Electronic Surveillance, Emerging Payment Technologie
    Legal experts and policy officials comment on significant developments, and likely 2014 hotspots, for electronic surveillance and emerging payment technologies.
Rank this Week: 2135

Cybersecurity Lawyer Blog

Cybersecurity Lawyer Blog

Covers technology and privacy law. By Samuelson Law Offices, LLC.

http://www.cybersecuritylawyerblog.com/
  • Mar 31

    Indemnity Boilerplate Can Come-Back to Bite in Unexpected Way

    Indemnity Boilerplate Can Come-Back to Bite in Unexpected Way
         Organizers, managing members, officers and directors (collectively, “Insiders”) often demand broad indemnity agreements, from the company, to protect themselves against third-party claims.  However,…
  • Feb 19

    Drafting LLC Agreement

    Drafting LLC Agreement
    When drafting a LLC agreement, you should consider numerous issues, including the respective capital and sweat equity contributions, retained ownership of intellectual property, voting control, sharing of compensation, the effects of any…
  • Sep 30

    Teaming Agreement Held Unenforceable

    Teaming Agreement Held Unenforceable
    Teaming agreements in tech are often like letters of intent in commercial real estate, but with one important difference - whether they are assumed to be binding. Commercial real estate letters of intent are rarely intended to be binding,…
Rank this Week: 2036

Workplace Privacy Counsel

Workplace Privacy Counsel

Covers employment related privacy issues. Published by Philip Gordon of Littler Mendelson's Privacy and Data Protection Practice Group.

http://www.littler.com/blog/workplace-privacy-counsel
Rank this Week: 1555

The Privacy Law Site

The Privacy Law Site

Covers privacy laws and regulations.

http://privacy-law.blogspot.com/
  • Mar 25

    White House to Propose End to Bulk Collection

    White House to Propose End to Bulk Collection
    According to the The New York Times, President Obama plans to propose legislation that would end bulk collection of phone records under Sec. 215 of the Patriot Act, keep the records in the hands of the phone companies, and require…
  • Jun 29

    26 Senators Seek Details on Information Collection from NSA

    26 Senators Seek Details on Information Collection from NSA
    26 Senators have sent a letter to DNI James Clapper seeking examples of how bulk collection of phone records information from provided unique intelligence.The AP reports the story here.
  • Jun 29

    COPPA Limits on Collection of Children's Information Applies to Apps as of July 1, 2013

    COPPA Limits on Collection of Children's Information Applies to Apps as of July 1, 2013
    Congress amended COPPA in 2012 to cover online services such as apps. As was previously the case, the law only applies to apps "directed at" children under the age of 13, or have actual knowledge of collection of personal information from…
Rank this Week: 1226

Reasonable Expectation

Reasonable Expectation

Focuses on privacy and data security. By M. Scott Koller.

http://www.reasonableexpectation.com
Rank this Week: 3447

New Media & Technology Law Blog

New Media & Technology Law Blog

Covers intellectual property, data security, online marketing and online commerce. By Proskauer.

http://newmedialaw.proskauer.com
  • Mar 12

    FINRA Issues Investor Alert Concerning Bitcoin Trading and Speculation

    FINRA Issues Investor Alert Concerning Bitcoin Trading and Speculation
    Bitcoin remains fixed on the front pages of the business and technology news for both the salacious and the positive. Much attention has been paid to the collapse of the former top bitcoin exchange, Mt. Gox, stemming from the purported theft…
  • Nov 19

    Bitcoins: A New Form of Currency?

    Bitcoins: A New Form of Currency?
    Yesterday, the Senate Committee On Homeland Security and Governmental Affairs held the first of two days of hearings on Bitcoin and digital currencies — “Beyond Silk Road: Potential Risks, Threats, and Promises of Virtual…
  • Nov 13

    No Expansion of CFAA Liability for Monetary Exploit of Software Bug

    No Expansion of CFAA Liability for Monetary Exploit of Software Bug
    In the game Monopoly, lucky players landing on Community Chest might turn over the highly desirable “Bank Error in Your Favor, Collect $200″ card.  By the next turn, the proceeds are usually invested in properties and houses,…
Rank this Week: 1207

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • Mar 10

    Independent Creation Paper Trail To Fend Off Copyright Suit

    Independent Creation Paper Trail To Fend Off Copyright Suit
    Keeping adequate record of your software creation efforts can be very helpful to stave off copyright infringement claimsThe post Independent Creation Paper Trail To Fend Off Copyright Suits appeared first on .
  • Feb 20

    Oracle’s Copyright Victory: An Ephemeral Win

    Oracle’s Copyright Victory: An Ephemeral Win
    Despite Oracle’s efforts to utilize copyright law to asphyxiate Rimini’s business model, Rimini’s support services appear to have bright days aheadThe post Oracle’s Copyright Victory: An Ephemeral Win appeared first…
  • Feb 14

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”
    After former employer declined to invest in Defendant’s new business, Defendant turned cybersquatterThe post Retaliatory Cybersquatter Used Domain Name To “Get Leverage” appeared first on .
Rank this Week: 2234

Dot Indicia

Dot Indicia

Covers information, privacy and security from a Canadian perspective. By Michael Power.

http://michaelpower.ca
  • Feb 27

    Toronto Hydro Surveillance?

    Toronto Hydro Surveillance?
    I can’t help but think there’s a movie in this somewhere. Love, devotion and allegations of betrayal are all present. Mix in smart meters and privacy and it becomes obvious why I’m blogging about this. It’s quite a…
  • Feb 19

    Health Privacy: Is PHIPA the only game in town?

    Health Privacy: Is PHIPA the only game in town?
    There is a new and interesting decision out of Peterborough that raises but doesn’t answer a lot of questions. These questions revolve around the intersection of PHIPA, class action law and tort law. This is not something you see…
  • Feb 12

    FATCA: Charter Challenge?

    FATCA: Charter Challenge?
    The federal government has now solved a major problem for Canada’s banks by entering into an intergovernmental agreement concerning FATCA with the United States. The details about the privacy implications of FATCA can be found in…
Rank this Week: 3303

Data Governance Law

Data Governance Law

Covers anti-spam, privacy, records retention and e-commerce as related to data governance. By FMC Law.

http://www.datagovernancelaw.com/
  • Feb 24

    Copyright v. Privacy: Voltage Pictures LLC v. John Doe and Jane Doe

    Copyright v. Privacy: Voltage Pictures LLC v. John Doe and Jane Doe
      The recent Federal Court of Canada decision in Voltage Pictures LLC v. John Doe and Jane Doe (2014 FC 161) has already received considerable attention for its approach to deterring so-called “copyright trolls”: plaintiffs…
  • Feb 22

    UK Information Commissioner Reappointed

    UK Information Commissioner Reappointed
    Christopher Graham, the UK Informaton Commissioner, has been reappointed for another two years. This follows from the end of his current term on 28 June 2014. It means he will have served 7 years in total. How time flies! The news came out on…
  • Feb 18

    FTC steps up enforcement action

    FTC steps up enforcement action
    Last week, the FTC announced that it had settled with a gaming company that falsely claimed to be certified under the US Safe Harbor.  The Safe Harbor agreement is a self-certification arrangement under which you can transfer personal…
Rank this Week: 937

Privacy Law Blog

Privacy Law Blog

Covers data privacy, identity theft, invasion of privacy, and national security legal issues. By Proskauer Rose LLP.

http://privacylaw.proskauer.com/
Rank this Week: 1467

Tsibouris Privacy + Technology Law…

Tsibouris Privacy + Technology Law Blog

Focuses on privacy, security, data protection, technology, and financial services issues affecting corporations, governments, and individuals. By Tsibouris & Associates.

http://blog.tsibouris.com/
  • Jan 23

    US-EU Safe Harbor: FTC Proposed Consent Orders with 12 companies for false claims.

    US-EU Safe Harbor: FTC Proposed Consent Orders with 12 companies for false claims.
    Yesterday the FTC announced proposed consent orders with twelve companies that falsely claimed compliance with the Safe Harbor framework.  Interestingly it involved a broad range of companies, including collection agencies and NFL…
  • Jun 7

    PRISM and NSA-Verizon Disclosures May Hurt EU Data Protection Regulation Effort

    PRISM and NSA-Verizon Disclosures May Hurt EU Data Protection Regulation Effort
    By Mehmet MunurRecent disclosures relating to PRISMand Verizon-NSAwiretapping may hurt efforts to make the EU General Data Protection Regulation less prescriptive and more business friendly for American companies. These programs will give…
  • Jan 25

    Appeals Court Vacates Obama Recess Appointment

    Appeals Court Vacates Obama Recess Appointment
    By Mehmet MunurThe U.S. Court of Appeals for the D.C. Circuit ruledtoday that President Obama’s appointments to the National Labor Relations Board were unconstitutional and the Board’s actions were unenforceable.  The court…
Rank this Week: 4796

Spam Notes

Spam Notes

Covers Internet law, electronic communications law, privacy, ID theft, data protection, adware, spyware and more. Published by Seattle lawyer Venkat Balasubramani.

http://spamnotes.com
  • Dec 31

    The Marble and the Sculptor

    The Marble and the Sculptor
    A few months* ago, Keith Lee, who blogs at Associate's Mind, was kind enough to send me a review copy of his book titled "The Marble and the Sculptor". The book is a survival guide of sorts for newly minted lawyers, tackling a wide range…
  • Jul 19

    The Problem With the Sharknado Reference

    The Problem With the Sharknado Reference
    Judge Mills throws in a reference to Sharknado in Faulkner v. Woody Allen. (h/t @ericgoldman) The problem with the reference is this: five years from now, no one will know or recall what Sharknado was. Even today, many people reading the…
  • Jan 19

    Just Who Are the Change Agents in Law?

    Just Who Are the Change Agents in Law?
    Scott Greenfield has an interesting post up today with an equally interesting response from Keith Lee. Both posts nudge me in the direction of a "Godin-esque" question that's been percolating in my mind for a long long time now:  the…
Rank this Week: 4323

Data Security Law Journal

Data Security Law Journal

Covers data security, cloud computing, data privacy and anything E. By Al Saikali.

http://www.datasecuritylawjournal.com/
  • Dec 30

    The Target Data Breach Lawsuits: Why Every Company Should Care

    The Target Data Breach Lawsuits: Why Every Company Should Care
    Plaintiffs’ lawyers were falling over themselves last week in a race to the courthouse to sue Target as a result of its recent data breach.  By at least one report, over 40 lawsuits have already been filed against Target, the first…
  • Nov 21

    What’s The Next Wave of Privacy Litigation? “Failure to Match”

    What’s The Next Wave of Privacy Litigation? “Failure to Match”
    A client recently asked me to identify the next wave of data privacy litigation.  I said that with so much attention on lawsuits arising from data breaches, particularly in light of some recent... [[ This is a content summary only. Visit…
  • Oct 30

    Yet Another Potential Multimillion-Dollar Data Breach Settlement . . .

    Yet Another Potential Multimillion-Dollar Data Breach Settlement . . .
    Just when you thought it might be safe to go back into the water, another significant data breach lawsuit may be settling.  Last week, I wrote about the proposed settlement in the AvMed lawsuit.  The motion for a preliminary…
Rank this Week: 2333