Most Popular Privacy Law Blawgs Expanded View List View

Blogs 1 - 45 of 57
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Threat Level

Threat Level

Covers privacy, crime and security online. From Wired News.

http://www.wired.com/threatlevel
  • Apr 14

    Researchers Cracked Microsoft and Google’s Shortened URLs To Spy On People

    Researchers Cracked Microsoft and Google’s Shortened URLs To Spy On People
    They were even able to identify a young woman who'd sought Google Maps directions to a Planned Parenthood clinic. The post Researchers Cracked Microsoft and Google's Shortened URLs To Spy On People appeared first on WIRED.
  • Apr 14

    A Scheme to Encrypt the Entire Web Is Actually Working

    A Scheme to Encrypt the Entire Web Is Actually Working
    The non-profit certificate authority Let's Encrypt is enabling a sea change toward HTTPS encryption online. The post A Scheme to Encrypt the Entire Web Is Actually Working appeared first on WIRED.
  • Apr 13

    Matthew Keys Sentenced to Two Years for Aiding Anonymou

    Matthew Keys Sentenced to Two Years for Aiding Anonymou
    The former Tribune Company employee was convicted of giving Anonymous information that helped hackers access an LA Times server and alter a headline. The post Matthew Keys Sentenced to Two Years for Aiding Anonymous appeared first on WIRED.
Rank this Week: 17

Privacy & Information Security…

Privacy & Information Security Law Blog

Provides global privacy and information security law updates and analysis. By Hunton & Williams.

https://www.huntonprivacyblog.com/
  • Mar 24

    Webinar Recording Available on China’s New Cybersecurity Law

    Webinar Recording Available on China’s New Cybersecurity Law
    On March 7, 2017, Hunton & Williams LLP hosted a webinar with Beijing partner Bing Maisog on China’s new Cybersecurity Law. China’s new Cybersecurity Law will impose new restrictions on information flows from operators of key…
  • Mar 23

    NY Attorney General Announces Record Number of Data Breach Notices in 2016

    NY Attorney General Announces Record Number of Data Breach Notices in 2016
    On March 21, 2017, New York Attorney General Eric Schneiderman announced that the New York Office of the Attorney General received over 1,300 data breach notifications in 2016, a 60 percent increase from 2015. … Continue Reading
  • Mar 22

    FTC Announces Settlement Over Alleged Consent Order Violation

    FTC Announces Settlement Over Alleged Consent Order Violation
    On March 17, 2017, the Federal Trade Commission announced that Upromise, Inc., agreed to pay 500,000 dollars to settle allegations that it violated the terms of a 2012 consent order that required Upromise to provide notice to consumers…
Rank this Week: 93

Inforrm\'s Blog

Inforrm\'s Blog

Discusses issues of media law and responsibility with a special focus on libel and privacy law and the balance between the two.

https://inforrm.wordpress.com/
Rank this Week: 163

Clancco: Art & Law

Clancco: Art & Law

Covers the relationship between art and law with a focus on intellectual property, nonprofit tax-exempt organizations, free speech, and contemporary art. By Sergio Muñoz Sarmiento.

http://clancco.com/wp
  • Mar 26

    In Cheerleading-Copyright Scuffle, US Supreme Court Cites Duchamp

    In Cheerleading-Copyright Scuffle, US Supreme Court Cites Duchamp
    In a 6-2 decision, the U.S. Supreme Court held last week that designs on cheerleading uniforms were protected by U.S. Copyright law. You can read the opinion and Justice Breyer and Justice Kennedy’s dissent here. Art law nerds might…
  • Mar 26

    Should Organic Artworks Be Excluded From Copyright Protection?

    Should Organic Artworks Be Excluded From Copyright Protection?
    Zahr Said has just posted his 2015 law review article on copyright’s fixation requirement and conceptual art on SSRN. Via his abstract, Said argues, This Essay argues that copyright illogically excludes conceptual art from protection on…
  • Mar 26

    Should Writers Be Granted Moral Rights?

    Should Writers Be Granted Moral Rights?
    Here are eight reasons why they should. Not saying we necessarily agree. Keep in mind that in the U.S., only visual artists currently get moral rights protection, and only for certain types of art works.
Rank this Week: 660

Advertising Law Blog

Advertising Law Blog

Provides commentary and news on developing legal issues in advertising, promotional marketing, Internet, and privacy law. By Olshan Frome Wolosky LLP.

http://www.olshanlaw.com/blogs-Advertising-Law-Blog
  • Mar 16

    Germany Considers Fining Social Media Platform’s Failure to Remove Illegal Content

    Germany Considers Fining Social Media Platform’s Failure to Remove Illegal Content
    In the wake of recent public dialogue about whether or not social media plays a role in the outcome of public events, this week, German Justice Minister, Heiko Maas, has proposed a law that would see social media sites face fines of up to 50…
  • Mar 16

    FDA Steps Up Enforcement on Unapproved Dietary Supplement Claim

    FDA Steps Up Enforcement on Unapproved Dietary Supplement Claim
    FDA regulations prohibit making drug claims for dietary supplement products even if such claims are supported by scientific evidence. A recent FDA enforcement action involving dietary supplement products promoted to address high cholesterol,…
  • Mar 16

    FDA Seeks to Redefine what “Healthy” Actually Mean

    FDA Seeks to Redefine what “Healthy” Actually Mean
    What the FDA considers “healthy” remains a major source of contention. The FDA has started a public process to redefine the “healthy” claim on food labeling to update existing food choices which will hopefully bring…
Rank this Week: 761

Privacy Law Blog

Privacy Law Blog

Covers data privacy, identity theft, invasion of privacy, and national security legal issues. By Proskauer Rose LLP.

http://privacylaw.proskauer.com/
  • Mar 29

    Part 1: Data Breach 101 – Data Breach Notification Law

    Part 1: Data Breach 101 – Data Breach Notification Law
    Courtney M. Bowman In 2017, there are few words that make companies – and their counsel – shudder more than “data breach.” Recent high-profile breaches and the resulting litigation have shown that breaches can be…
  • Mar 15

    Consumer Review Fairness Act Taking Effect

    Consumer Review Fairness Act Taking Effect
    Ava Childers The Consumer Review Fairness Act (CRFA) began to take effect yesterday, March 14, 2017. One aim of the CRFA is to protect consumers’ ability to publicly review services and vendors without being subject to restrictions or…
  • Mar 1

    New York Department of Financial Services Finalizes Cybersecurity Proposal

    New York Department of Financial Services Finalizes Cybersecurity Proposal
    Tiffany Quach On February 16, 2017, the New York Department of Financial Services (the “DFS”) released a final version (the “Final Regulation”) of its proposed regulation, previously released in an earlier revised form…
Rank this Week: 1030

Copyright, Intellectual Property,…

Copyright, Intellectual Property, Computer, Internet, e-Commerce Law

Covers IP/IT law, with a strong focus on copyright and internet law. By Barry Sookman.

http://www.barrysookman.com
Rank this Week: 957

North Carolina Journal of Law &…

North Carolina Journal of Law & Technology

Features legal scholarship in law and technology topics, including intellectual property law, cyberspace law, environmental law, criminal law, health law, and privacy law.

http://ncjolt.org/
  • Mar 28

    Only Talk to Humans Again: FCC Proposal to End Robocall Scam

    Only Talk to Humans Again: FCC Proposal to End Robocall Scam
    For most people, the perks of caller ID and voicemail has allowed them to not answer phone calls that we do not know or prefer to avoid. This practice has definitely reduced the effectiveness of solicitations and especially robocalls to some…
  • Mar 28

    FBI Doesn’t Have to Release Its Rules for Secretly Collecting Information About Journalist

    FBI Doesn’t Have to Release Its Rules for Secretly Collecting Information About Journalist
    A district court judge in the Northern District of California recently sided with the Department of Justice in a case against the Freedom of the Press Foundation, who sued the DOJ over its refusal to disclose FBI procedures for issuing…
  • Mar 23

    Forced Decryption and the Fifth Amendment

    Forced Decryption and the Fifth Amendment
    While the general population infamously understands very little about the Constitution or court system, most everyone has an understanding of the Fifth Amendment’s the right to remain silent. The protection against self-incrimination…
Rank this Week: 1032

HIPAA Blog

HIPAA Blog

Features a discussion of medical privacy. By Jeffrey P. Drummond.

http://hipaablog.blogspot.com/
  • Mar 20

    Well, this is embarrassing: Cybersecurity…

    Well, this is embarrassing: Cybersecurity contractor hit by W2 phishing scam.  
  • Feb 23

    Interesting Question: HIPAA lawyer Adam…

    Interesting Question: HIPAA lawyer Adam Greene was interviewed at HIMSS, and noted that HHS is close to publishing the regulations implementing the HITECH revisions that allow affected individuals to get a share of the fines levied by OCR.…
  • Feb 22

    2 Healthcare Data Breaches up 40%, Affect…

    2 Healthcare Data Breaches up 40%, Affect 25% of Consumers: According to the Identity Theft Research Center, Healthcare represents one third of all data breaches, and the number of reported breaches has risen from 780 in 2015 to 1093 last…
Rank this Week: 1006

techblawg

techblawg

Focuses primarily on issues involving the intersection of law, technology and finance. By David Ma.

http://david-ma.ca/
  • Mar 23

    weekly tweet roundup

    weekly tweet roundup
    in case you were wondering, msft services were down earlier today. https://t.co/dfs1LL9dvc 2017-03-21 google announces new features coming to android o. https://t.co/679iz8jaWh 2017-03-22 us farmers turn to hacking tractors in order to repair…
  • Mar 16

    weekly tweet roundup

    weekly tweet roundup
    the next time you hear a story about lawyers arguing over a comma, read this. https://t.co/JGjE9l2e2k 2017-03-16 vc plans to raise fund using digital tokens. https://t.co/EpMgayZSxX 2017-03-16 [Click on title above to read the full post]
  • Mar 9

    weekly tweet roundup

    weekly tweet roundup
    nintendo awarded $13 million in first major canadian tpm anti-circumvention ruling. https://t.co/kywbBFdSnW 2017-03-03 uk proposes new law on insurance for self-driving vehicles. insurance companies would be liable by default.…
Rank this Week: 1358

Inside Privacy

Inside Privacy

Covers global privacy and data security. By Covington & Burling LLP.

http://www.insideprivacy.com
Rank this Week: 1284

Privacy & Security Matters

Privacy & Security Matters

By Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

http://www.privacyandsecuritymatters.com
  • Mar 29

    A New FBI Warning for Healthcare Provider

    A New FBI Warning for Healthcare Provider
    The FBI has issued new guidance specifically applicable to medical and dental facilities regarding the cybersecurity risk of File Transfer Protocol (“FTP”) servers operating in “anonymous” mode. …
  • Mar 28

    March Fadness: Wearable Tech in the Workplace and Privacy

    March Fadness: Wearable Tech in the Workplace and Privacy
    Wearable technology continues to do a full court press on the marketplace and in the process, the step counters of the world and health apps tied to devices capable of tracking real-time biostatistics, are revolutionizing the way companies…
  • Mar 22

    EU General Data Protection Regulation Webinar Serie

    EU General Data Protection Regulation Webinar Serie
    Since September, the Mintz Levin Privacy Webinar Series has focused on the upcoming EU General Data Protection Regulation (GDPR) to help businesses understand the reach and scope of the GDPR and prepare for the potentially game-changing…
Rank this Week: 1468

Socially Aware Blog

Socially Aware Blog

Covers the law and business of social media. By Morrison Foerster.

http://www.sociallyawareblog.com/
  • Mar 29

    Supreme Court Rules Cheerleading Uniform Designs Are Copyrightable

    Supreme Court Rules Cheerleading Uniform Designs Are Copyrightable
    On March 22, 2017, the Supreme Court held in Star Athletica, LLC v. Varsity Brands that design elements of cheerleading uniforms may be protected under the Copyright Act. The 6-2 decision, written by Justice Thomas, clarified the scope…
  • Mar 28

    Delaware Paves the Way for Blockchain Technology

    Delaware Paves the Way for Blockchain Technology
    Blockchain has been a hot buzzword in tech circles for some time, and, increasingly, we’re seeing companies—even Fortune 500 companies—announce blockchain-related initiatives. One particular area of interest to corporations…
  • Mar 17

    Overview of Emerging Cybersecurity Issue

    Overview of Emerging Cybersecurity Issue
    In the most recent edition of his CyberSide Chat series, Socially Aware contributor Andy Serwin discusses emerging cybersecurity issues including: The need to strike a balance between the efficiencies of the Internet of Things and the…
Rank this Week: 1648

Privacy and Security Law Blog

Privacy and Security Law Blog

Covers biometrics, HIPAA, identity theft, PATRIOT Act, phishing and more. By Davis Wright Tremaine.

http://www.privsecblog.com/
  • Mar 28

    FCC Proposes Rules to Allow Carriers to Block Illegal “Robocalls”

    FCC Proposes Rules to Allow Carriers to Block Illegal “Robocalls”
    The Federal Communications Commission has issued a notice of proposed rulemaking (“NPRM”) and Notice of Inquiry (“NOI”) opening a new docket, Advanced Methods to Target and Eliminate Unlawful Robocalls, which proposes…
  • Mar 16

    DWT Releases Latest Health Care Breach Chart

    DWT Releases Latest Health Care Breach Chart
    Following the HITECH Act, the U.S. Department of Health and Human Services, Office for Civil Rights (OCR) issued regulations requiring HIPAA covered entities to provide certain notifications for breaches of unsecured protected health…
  • Mar 3

    New FCC Stays ISP Data Security Rules from Wheeler Era

    New FCC Stays ISP Data Security Rules from Wheeler Era
    On Wednesday, the Chairman Pai-led FCC adopted an Order granting a stay of the data security rules that were adopted as part of the Commission’s 2016 Privacy Order spearheaded by former FCC Chairman Wheeler. The stay will maintain the…
Rank this Week: 1851

Security, Privacy and The Law

Security, Privacy and The Law

Covers information security and privacy issues. By Foley Hoag LLP.

http://www.securityprivacyandthelaw.com
  • Mar 28

    U.S. Steel ITC Case Alleging Chinese Government Hacked Its Network and Stole Its Secret Formulas May Be Revived

    U.S. Steel ITC Case Alleging Chinese Government Hacked Its Network and Stole Its Secret Formulas May Be Revived
    First, a little background for those unfamiliar with the wonderful world of the International Trade Commission (ITC).  Section 337 of the Tariff Act of 1930 (19 U.S.C. § 1337) prohibits “unfair methods of competition and…
  • Mar 22

    Marijuana and Privacy: A Primer

    Marijuana and Privacy: A Primer
    Legal marijuana is America’s fastest-growing industry. According to ArcView Market Research, cannabis revenue is expected to exceed $22 billion by 2020—nearly double that of the NFL. This past year, Colorado saw its sales reach…
  • Mar 20

    New Mexico, One of the Last Holdouts, Sends Data Breach Notification Law to Governor

    New Mexico, One of the Last Holdouts, Sends Data Breach Notification Law to Governor
    New Mexico is one of the few remaining states to not have a law requiring companies to notify consumers when their information is part of a data breach.  This, however, might change very soon.  Last Wednesday, the New Mexico…
Rank this Week: 1411

Data Protection Report

Data Protection Report

Covers global privacy, data protection and cybersecurity regulatory and litigation environment. By Norton Rose Fulbright.

http://www.dataprotectionreport.com/
  • Mar 24

    Singapore cybersecurity – new amendments introduce four key change

    Singapore cybersecurity – new amendments introduce four key change
    Singapore’s Ministry of Home Affairs has announced amendments to the Republic’s cybersecurity laws, i.e. the Computer Misuse and Cybersecurity Act (CMCA), after a series of high-profile cyberattacks in recent years. The Computer…
  • Mar 24

    Event: Cybersecurity Updates in the Financial Services Sector – April 6, 2017

    Event: Cybersecurity Updates in the Financial Services Sector – April 6, 2017
    Please join us for a 40-minute briefing on the latest developments in cybersecurity and what the financial services sector needs to know in order to comply. There are new regulatory initiatives at the international, US national and…
  • Mar 20

    The Long Arm of Canadian Privacy Law

    The Long Arm of Canadian Privacy Law
    Earlier this year, a Canadian trial court ruled that Canada’s Personal Information Protection and Electronic Documents Act (“PIPEDA”) has extra-territorial application and restricts the dissemination of personal information…
Rank this Week: 1799

sobre privacidad y protección de…

sobre privacidad y protección de datos

Spanish language blog about privacy and data protection. By Daniel A. Lopez Carballo.

http://www.dlcarballo.com/
Rank this Week: 1580

LegalTXTS

LegalTXTS

Covers law and technology, with an emphasis on legal issues regarding digital media, privacy and data security, and information management. By Elijah Yip.

http://www.legaltxts.com/
  • Jan 25

    The Tax Scams Cometh

    The Tax Scams Cometh
    Tax season is miserable for many because it means having to cut a check to the IRS.  But it’s not just Uncle Sam who’s interested in your money.  Scammers are also looking to get paid, and they’ll do it by stealing…
  • Oct 26

    Police officer suspended for controversial Facebook posts allowed to go to trial on First Amendment retaliation claim

    Police officer suspended for controversial Facebook posts allowed to go to trial on First Amendment retaliation claim
    It’s generally a good practice to set standards of online employee conduct to prevent the social media activity of employees from disrupting the workplace or tarnishing your organization’s reputation.  But the mere fact that…
  • Sep 21

    Six Years Later, NLRB’s Social Media Guidelines Still Confound

    Six Years Later, NLRB’s Social Media Guidelines Still Confound
    Six years ago, the National Labor Relations Board (NLRB) became one of the first governmental agencies to regulate social media use in the workplace.  In 2010 and 2011, the NLRB issued a series of guidance memos and decisions sketching…
Rank this Week: 1893

German IT Law

German IT Law

Provides updates and analysis on German and European IP/IT, technology, media and (open source) software law. By JBB Rechtsanwälte.

http://germanitlaw.com/
Rank this Week: 1904

Tsibouris Privacy + Technology Law…

Tsibouris Privacy + Technology Law Blog

Focuses on privacy, security, data protection, technology, and financial services issues affecting corporations, governments, and individuals. By Tsibouris & Associates.

http://blog.tsibouris.com/
  • Jan 23

    US-EU Safe Harbor: FTC Proposed Consent Orders with 12 companies for false claims.

    US-EU Safe Harbor: FTC Proposed Consent Orders with 12 companies for false claims.
    Yesterday the FTC announced proposed consent orders with twelve companies that falsely claimed compliance with the Safe Harbor framework.  Interestingly it involved a broad range of companies, including collection agencies and NFL…
  • Jun 7

    PRISM and NSA-Verizon Disclosures May Hurt EU Data Protection Regulation Effort

    PRISM and NSA-Verizon Disclosures May Hurt EU Data Protection Regulation Effort
    By Mehmet MunurRecent disclosures relating to PRISMand Verizon-NSAwiretapping may hurt efforts to make the EU General Data Protection Regulation less prescriptive and more business friendly for American companies. These programs will give…
  • Jan 25

    Appeals Court Vacates Obama Recess Appointment

    Appeals Court Vacates Obama Recess Appointment
    By Mehmet MunurThe U.S. Court of Appeals for the D.C. Circuit ruledtoday that President Obama’s appointments to the National Labor Relations Board were unconstitutional and the Board’s actions were unenforceable.  The court…
Rank this Week: 1404

Chronicle of Data Protection

Chronicle of Data Protection

Covers consumer privacy, data security, HIPAA, financial privacy and EU privacy. By Hogan Lovells.

http://www.hldataprotection.com
  • Mar 29

    When Did You Last See Your Filing Cabinets? UK ICO Fine for Discarded Data Shows Accountability in Action

    When Did You Last See Your Filing Cabinets? UK ICO Fine for Discarded Data Shows Accountability in Action
    If you care enough about privacy issues to be a regular reader of this blog, you probably know that one of the Big Changes under GDPR will be the introduction of "accountability" as a legal obligation, i.e. it will now be a requirement that a…
  • Mar 28

    ICO Issues Fine for Marketing Emails Disguised as Service Message

    ICO Issues Fine for Marketing Emails Disguised as Service Message
    The Information Commissioner's Office has issued a £70,000 fine against Flybe and a £13,000 fine against Honda Motor Europe Ltd for breaching Regulation 22 of the Privacy and Electronic Communications Regulations by sending emails…
  • Mar 22

    FTC and NHTSA to Explore Vehicle Privacy and Security Issue

    FTC and NHTSA to Explore Vehicle Privacy and Security Issue
    The Federal Trade Commission and National Highway Traffic Safety Administration are co-hosting a workshop on June 28, 2017, to explore the privacy and security issues raised by automated and connected vehicle technologies. The agencies are…
Rank this Week: 2230

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Mar 29

    The Most Powerful Single Click in Your Facebook Privacy Setting

    The Most Powerful Single Click in Your Facebook Privacy Setting
    Getting a new job, recovering from an abusive relationship, engaging in new kinds of activism, moving to a different country—these are all examples of reasons one might decide to start using Facebook in a more private way. While it is…
  • Mar 28

    Repealing Broadband Privacy Rules, Congress Sides with the Cable and Telephone Industry

    Repealing Broadband Privacy Rules, Congress Sides with the Cable and Telephone Industry
    Putting the interests of Internet providers over Internet users, Congress today voted to erase landmark broadband privacy protections. If the bill is signed into law, companies like Cox, Comcast, Time Warner, AT&T, and Verizon will have…
  • Mar 28

    Privacy By Practice, Not Just By Policy: A System Administrator Advocating for Student Privacy

    Privacy By Practice, Not Just By Policy: A System Administrator Advocating for Student Privacy
    When Matt L. started to raise the alarm about educational technology in his school district, he knew it would ruffle some feathers. As a system administrator (or sysadmin), Matt has had a front-row seat to the increasing use of technology in…
Rank this Week: 3047

Broadband Law Advisor

Broadband Law Advisor

Provides insight and information on the FCC's National Broadband Plan. By Davis Wright Tremaine LLP.

http://www.broadbandlawadvisor.com/
  • Mar 15

    Texas Hold ‘Em: Long-Lasting Pole Attachment Dispute Ends (For Now)

    Texas Hold ‘Em: Long-Lasting Pole Attachment Dispute Ends (For Now)
    In late February, the Texas Court of Appeals issued an opinion resolving an eight-year dispute concerning municipal pole attachment fees charged to AT&T and Time Warner Cable (TWC) by CPS Energy (CPS), an electric utility owned by the…
  • Feb 23

    FCC Announces Details for Mobility Fund Phase II

    FCC Announces Details for Mobility Fund Phase II
    The FCC adopted an order today that establishes Phase II of the Mobility Fund.  As we have previously reported, the FCC established the Mobility Fund to provide universal service subsidies to help expand and preserve 4G LTE mobile…
  • Feb 23

    FCC Finalizes Criteria for CAF Phase II Auction

    FCC Finalizes Criteria for CAF Phase II Auction
    Today the FCC approved an order that moves the nearly two billion dollar Connect America Fund (CAF) Phase II Auction competitive bidding process forward.   As we have previously reported, the Phase II auction will provide support…
Rank this Week: 2803

New Media & Technology Law Blog

New Media & Technology Law Blog

Covers intellectual property, data security, online marketing and online commerce. By Proskauer.

http://newmedialaw.proskauer.com
  • Mar 15

    The Cross-Industry Promise of Blockchain

    The Cross-Industry Promise of Blockchain
    The blockchain protocol (a form of a ‘distributed ledger system’) was originally designed as a platform to process Bitcoin transactions.  The protocol enables peer-to-peer transactions and eliminates the need for a trusted…
  • Mar 2

    Court Refuses to Dismiss Biometric Privacy Action over Facial Recognition Technology Used by Google Photo

    Court Refuses to Dismiss Biometric Privacy Action over Facial Recognition Technology Used by Google Photo
    We’ve closely followed the numerous biometric privacy disputes and legislative developments surrounding the Illinois Biometric Information Privacy Act (BIPA), which precludes the unauthorized collection and storing of some types of…
  • Feb 23

    A Host of Biometric Privacy/Facial Recognition Bills Currently Circulating in State Legislature

    A Host of Biometric Privacy/Facial Recognition Bills Currently Circulating in State Legislature
    We’ve written extensively about the numerous lawsuits, dismissals and settlements surrounding the Illinois Biometric Information Privacy Act (BIPA). The statute, generally speaking, prohibits an entity from collecting, capturing,…
Rank this Week: 2437

Data Security Law Journal

Data Security Law Journal

Covers data security, cloud computing, data privacy and anything E. By Al Saikali.

http://www.datasecuritylawjournal.com/
  • Mar 5

    Incident Response: The Increasing Risks to Corporate Legal Department

    Incident Response: The Increasing Risks to Corporate Legal Department
    The consequences of a data breach reached new heights last week when Yahoo announced the resignation of its General Counsel in response to a series of security incidents the company suffered.  A more fulsome explanation of the security…
  • Dec 11

    Law Firm Data Security: The First Class Action

    Law Firm Data Security: The First Class Action
    Earlier this year, Bloomberg Law reported that Edelson PC, a leading plaintiffs’ firm in privacy and data security law, filed a class action lawsuit against a regional law firm that had vulnerabilities in its information security…
  • Jun 22

    The SEC Makes Clear There is No Room For Error in Cybersecurity

    The SEC Makes Clear There is No Room For Error in Cybersecurity
    The SEC recently agreed to a $1,000,000 settlement of an enforcement action against Morgan Stanley for its failure to have sufficient data security policies and procedures to protect customer data. The settlement was significant for its…
Rank this Week: 1988

Global Regulatory Enforcement Law…

Global Regulatory Enforcement Law Blog

Covers antitrust, privacy, international trade, and white color criminal defense. By Reed Smith.

http://www.globalregulatoryenforcementlawblog.com
  • Mar 2

    Independent Health Care Providers Beware – FTC Actions Against Group Contracting Efforts Continue

    Independent Health Care Providers Beware – FTC Actions Against Group Contracting Efforts Continue
    The Federal Trade Commission (“FTC”) recently charged a Puerto Rico ophthalmologist cooperative with organizing a group boycott of a health plan in violation of section 5 of the FTC Act.  This action demonstrates the need for…
  • Feb 10

    Private Equity Firm Held Responsible for Portfolio Company’s Antitrust Violation

    Private Equity Firm Held Responsible for Portfolio Company’s Antitrust Violation
    In January of 2017 a private equity firm, Bencis, was found liable for a portfolio company’s involvement as one of 14 cartelists producing flour in the Netherlands, Belgium, and Germany. The Authority for Consumers and Markets (ACM)…
  • Feb 10

    2017 Expectations of the U.S. CFTC Enforcement Agenda

    2017 Expectations of the U.S. CFTC Enforcement Agenda
    The U.S. Commodity Futures Trading Commission is undergoing a transformation with the new Trump administration while staying on course with its statutory mission of protecting US commodities and derivatives markets.  Some of CFTC’s…
Rank this Week: 2359

Privacy and IP Law Blog

Privacy and IP Law Blog

Addresses recent events in trademark, copyright, computer and privacy law. By Christina Frangiosa.

http://privacyandiplawblog.com/
  • Feb 20

    USPTO Requests Comment on Draft Examination Guide for Matter “Incapable” of Registration

    USPTO Requests Comment on Draft Examination Guide for Matter “Incapable” of Registration
    This post examines the USPTO's draft Examination Guide on Incapable Informational Matter - essentially matter that is not capable of federal trademark registration because it cannot function as a trademark. The Draft Guide focused on three…
  • Nov 28

    Common Questions – Can I Copyright My Formula?

    Common Questions – Can I Copyright My Formula?
    Probably not. No matter how new a formula (a.k.a. recipe) may be, if it simply comprises a combination of ingredients mixed together to form a new and unique dish, it is not likely to be copyrightable. And, once published, even if the recipe…
  • Nov 17

    Common Questions: What’s the Difference Between a Trademark and a Service Mark?

    Common Questions: What’s the Difference Between a Trademark and a Service Mark?
    This is actually a trick question – the answer is, “not much”. Generally, trademarks refer to source-identifying marks used in connection with goods (products) and service marks are used for the same purpose, but in…
Rank this Week: 2624

Fair Competition Law Blog

Fair Competition Law Blog

Covers trade secrets, noncompetes, privacy and security, the Computer Fraud and Abuse Act, trademarks, copyrights, and business torts. By Russell Beck.

http://faircompetitionlaw.com
  • Feb 4

    Trade Secrets Laws and the UTSA – A 50 State and Federal Law Survey Chart (revised)

    Trade Secrets Laws and the UTSA – A 50 State and Federal Law Survey Chart (revised)
    Every state but Massachusetts and New York has adopted the Uniform Trade Secrets Act (the UTSA) in one form or another – though some may quibble with whether Alabama or North Carolina actually adopted it. (The Uniform Law…
  • Feb 4

    BRR 50-State Noncompete Chart (Updated Today)

    BRR 50-State Noncompete Chart (Updated Today)
    The BRR 50 State Noncompete Chart has been updated to reflect a few developments and to make a few tweaks since the last draft. Most significantly, Georgia surprised many (me included) with its decision that the 2011…
  • Feb 1

    Trade Secret and Noncompete Survey – National Case Graph 2017

    Trade Secret and Noncompete Survey – National Case Graph 2017
    As regular readers of this blog know, several years ago, I became curious to see how many reported trade secret / noncompete decisions were issued each year in all federal and state courts around the country. So, I did a “back of the…
Rank this Week: 2831

Beyond Telecom Law Blog

Beyond Telecom Law Blog

Covers telecom policy, services agreements and data security/privacy. By Keller and Heckman LLP.

http://www.beyondtelecomlawblog.com
  • Apr 25

    "Section 6409 vs. Reality"-- A Panel Discussion at the Wireless West Conference

    "Section 6409 vs. Reality"-- A Panel Discussion at the Wireless West Conference
    I had the pleasure of speaking at the first annual Wireless West Conference in Anaheim, CA on April 20. Wireless West was organized and managed by five state wireless associations—Arizona, California, Colorado, Nevada, and Northwest…
  • Apr 18

    The Industrial Internet - Legal Issues and Procurement Implications--A Series; Part 1--Overview

    The Industrial Internet - Legal Issues and Procurement Implications--A Series; Part 1--Overview
    This is the first entry in a series on the “Industrial Internet,” focusing on the basic elements, legal issues and procurement implications, principally from the perspective of the end user. The term is used to distinguish…
  • Apr 4

    Another FirstNet Milestone

    Another FirstNet Milestone
      Another marker passed on the FirstNet roadmap last week as Capability Statements from bidders interested in building, operating and maintaining the Nationwide Public Safety Broadband Network were submitted March 31, 2016. Final bids…
Rank this Week: 2349

CyberLaw Currents

CyberLaw Currents

Covers technology news headlines, statutes, and case law developments related to e-commerce, privacy, advertising, and intellectual property. Edited by Glen K. Westerback.

http://www.cyberlawcurrents.com
Rank this Week: 2833

Business Litigation Info

Business Litigation Info

Covers business litigation, intellectual property, data security, and advertising and media. By Faruki Ireland & Cox P.L.L.

http://www.businesslitigationinfo.com/
  • Nov 24

    NOVEMBER 2015 FI&C WEBSITE NEWSLETTER

    NOVEMBER 2015 FI&C WEBSITE NEWSLETTER
    *     On September 17, 2015, Jeff Ireland and Jade Smarda, obtained a temporary restraining order on behalf of a local financial services firm in a trade secrets case. *     Jeff Sharkey and…
  • Nov 20

    Be Cautious When Social Networking is All “Atwitter “at Your Workplace

    Be Cautious When Social Networking is All “Atwitter “at Your Workplace
    We use social media all the time. Make it a point during the day to notice how often you see a friend or colleague checking a Facebook update or sending a tweet (or giving you a three-star rating on the new Peeple app).  People are on…
  • Nov 16

    Cybersecurity Information Sharing Act: The Devil Lurks and the Road to His House Appears Well Paved

    Cybersecurity Information Sharing Act: The Devil Lurks and the Road to His House Appears Well Paved
    Best Laid Plans. They say the devil is in the details. One might say that is most certainly the case with the recently advanced version of the Cybersecurity Information Sharing Act (“CISA”) that recently passed the U.S. Senate by…
Rank this Week: 2892

Primary Opinion

Primary Opinion

Covers corporate, employment, IP and privacy news.

http://primaryopinion.com/
  • Nov 27

    Social media marketing for lawyers and law firm

    Social media marketing for lawyers and law firm
    Law firms of all sizes are now embracing social media as a means to showcase expertise and reach new customers. But, opening a Twitter, LinkedIn or Google+ account is only the first part of the process. Here are five pointers for realising…
  • Oct 13

    Legal opinion round up: CJEU’s ruling on registering 3D object trademark

    Legal opinion round up: CJEU’s ruling on registering 3D object trademark
    3D shape marks took another battering at the end of September with the European Court of Justice (CJEU) ruling that such trademarks can be declared invalid if the shape can be linked ‘essentially’ or ‘substantially’ to…
  • Oct 7

    Meet our independent blogger

    Meet our independent blogger
    Our new content portal www.primaryopinion.com draws together the best of the IP industry’s news, commentary and knowledge, so that IP professionals, in-house counsel and business heads can access it on one up-to-date platform. That…
Rank this Week: 2677

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
Rank this Week: 3757

Cybersecurity Lawyer Forum

Cybersecurity Lawyer Forum

Covers business and privacy law. By Jeffer Mangels Butler & Mitchell LLP.

http://cybersecurity.jmbm.com/
  • Mar 28

    Cybersecurity Programs and the FTC – Staying out of Harm’s Way

    Cybersecurity Programs and the FTC – Staying out of Harm’s Way
    While there is no nationwide cybersecurity program, the Federal Trade Commission has brought more than 50 actions claiming that the cybersecurity practices of a variety of companies in a variety of industries. While these actions have…
  • Mar 21

    Professional Service Firms Ignore Cybersecurity at Their Peril

    Professional Service Firms Ignore Cybersecurity at Their Peril
    Cybersecurity horror stories tend to focus on government agencies, retail outlets, health care institutions, and other companies serving consumers. But business professionals such as lawyers, accountants and business managers are increasingly…
  • Mar 1

    Engaging Cybersecurity Counsel Early – It’s the Right Choice

    Engaging Cybersecurity Counsel Early – It’s the Right Choice
    Last year, SEC Chair Mary Jo White named cybersecurity as the biggest risk facing financial markets. But the risk isn’t limited to the financial industry – even a casual review of breach reports in the mainstream press shows that…
Rank this Week: 3308

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 3698

Privacy and Data Security Law

Privacy and Data Security Law

Covers the creation, collection, use, destruction and security of data. By Dentons.

http://www.privacyanddatasecuritylaw.com/
  • Mar 27

    New Guidance on Disclosure Exceptions for Investigations and Fraud

    New Guidance on Disclosure Exceptions for Investigations and Fraud
    On March 17, 2017, the  Office of the Privacy Commissioner of Canada (OPC) published guidance on two new exceptions in PIPEDA permitting disclosure without consent. The guidance is very helpful to interpreting these new provisions and…
  • Dec 21

    Private Right of Action under CASL coming July 2017

    Private Right of Action under CASL coming July 2017
    Canada’s Anti-Spam Law came into force on July 1, 2014.  Since then, all eyes have been on the Canadian Radio-television and Telecommunications Commission (CRTC) for decisions concerning CASL violations. …
  • Dec 3

    HHS Issues Warning About Phishing Campaign Disguised As Official Communication

    HHS Issues Warning About Phishing Campaign Disguised As Official Communication
    As part of its efforts to assess compliance with the HIPAA Privacy, Security and Breach Notification Rules, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) engages in audits of covered entities and their…
Rank this Week: 4290

Information Technology Law Blog

Information Technology Law Blog

Covers social media, e-discovery, privacy, and intellectual property. By Foster Swift Collins & Smith PC.

http://www.michiganitlaw.com/
  • Mar 23

    Common Legal Mistakes of Start-Up

    Common Legal Mistakes of Start-Up
    The list below highlights some of the frequent legal mistakes made by start-ups. Blunders and mistakes are certainly a part of life and starting a business. But, we hope that the advice below will help you avoid a few.…
  • Mar 15

    Big Hollywood Studios Win Injunction Against Streamer VidAngel in Copyright Infringement Case

    Big Hollywood Studios Win Injunction Against Streamer VidAngel in Copyright Infringement Case
    A big legal battle has been brewing between upstart video streamer VidAngel and Hollywood heavyweights Disney, Warner Bros., and 20th Century Fox. So far, the studios have scored a clean knockdown, if not a knockout.VidAngel describes…
  • Mar 7

    Border Searches May Compromise the Privacy and Security of Company Technology

    Border Searches May Compromise the Privacy and Security of Company Technology
    Recently, international travelers have noticed US Customs and Border Protection agents with increased interest in searching cell phones, laptops, and other portable technology. Employers should be aware that this trend increases the risk that…
Rank this Week: 3883

Hunton Retail Law Resource Blog

Hunton Retail Law Resource Blog

Analysis and Insight in Retail Law

https://www.huntonretailindustryblog.com/
  • Mar 23

    Heightened Audit Risk for Users of mySAP ERP and Other SAP Product

    Heightened Audit Risk for Users of mySAP ERP and Other SAP Product
    Emboldened by its recent victory in SAP v. Diageo, SAP may become even more opportunistic when it comes to auditing its customers’ use of various SAP products. Now is the time for SAP customers to review their existing contracts with…
  • Mar 22

    The Hague Securities Convention Affecting Securities Held in Securities Account

    The Hague Securities Convention Affecting Securities Held in Securities Account
    On April 1, 2017, the Hague Convention on the Law Applicable to Certain Rights in Respect of Securities Held with an Intermediary will become effective in the United States. The Convention will, as federal law of the U.S., apply to determine…
  • Mar 22

    Neiman Marcus Agrees to Settlement in Data Breach Class Action

    Neiman Marcus Agrees to Settlement in Data Breach Class Action
    On March 17, 2017, retailer Neiman Marcus agreed to pay $1.6 million as part of a proposed settlement (the “Settlement”) to a consumer class action lawsuit stemming from a 2013 data breach that allegedly compromised the credit…
Rank this Week: 3138

Workplace Privacy, Data Management…

Workplace Privacy, Data Management & Security Report

Covers data security, HIPAA, identity theft and workplace privacy. By Jackson Lewis.

http://www.workplaceprivacyreport.com
  • Mar 21

    Companies May Soon Have a New Defense Against Cyber-Attack

    Companies May Soon Have a New Defense Against Cyber-Attack
    The Active Cyber Defense Certainty Act is a new bill that is gaining positive bipartisan support and significant interest from business communities, lawmakers and academics. The proposed bill amends the Computer Fraud and Abuse Act which does…
  • Mar 20

    At Last, the Final DFS Cybersecurity Regulations….

    At Last, the Final DFS Cybersecurity Regulations….
    We wanted to keep you informed on the progress of the DFS cybersecurity regulations, as they complete their journey through the approval process. DFS has been working on the regulations since its 2013-2014 studies on cybersecurity risks to…
  • Mar 14

    Employer Denied Access to Employee GPS Data

    Employer Denied Access to Employee GPS Data
    A federal district court in Indiana recently denied an employer’s motion to compel discovery of employee GPS data in defense of an action brought under the Fair Labor Standards Act (FLSA).   Crabtree v. Angie’s List,…
Rank this Week: 4475

Data Privacy Monitor

Data Privacy Monitor

Covers data privacy, security and social media subjects. By Baker Hostetler.

http://www.dataprivacymonitor.com/
  • Mar 20

    New Mexico passes data breach notification and protection bill

    New Mexico passes data breach notification and protection bill
    Then there were two. On March 16, 2017, the New Mexico state legislature passed a bill requiring that New Mexico residents be notified if their “personal identifying information” was affected by a breach of electronic data. Upon…
  • Mar 15

    Unexpected Consumer Data Collection Concerns FTC

    Unexpected Consumer Data Collection Concerns FTC
    The Federal Trade Commission (FTC) has been turning its attention to consumer data collection and use that consumers may not expect, such as tracking of TV viewing by smart TVs, and use of cross-device technologies and techniques to try to…
  • Mar 7

    Australia’s New Breach Notification Law Set to Take Effect February 2018

    Australia’s New Breach Notification Law Set to Take Effect February 2018
    On February 13, 2017, the Australian Senate passed a bill establishing a mandatory requirement to notify the Privacy Commissioner and affected individuals of “eligible” data breaches. The Privacy Amendment (Notifiable Data…
Rank this Week: 3927

Information Law Group

Information Law Group

Covers advertising law, privacy, information security and intellectual property.

http://www.infolawgroup.com/
  • Mar 14

    New Litigation Against National Clothing Retailer for Use of “Up To % Off” Messaging

    New Litigation Against National Clothing Retailer for Use of “Up To % Off” Messaging
    What Have Retailers Been “Up To” In New Jersey? The last few years have been quite interesting for retailers, with a number of different pricing and advertising related legal issues coming to the forefront. Recently, another new…
  • Mar 6

    BYOB: Be Your Own Broadcaster (and Studio) –What to watch out for in content creation and distribution

    BYOB: Be Your Own Broadcaster (and Studio) –What to watch out for in content creation and distribution
    2017 is starting to look like the year of DIY content creation and distribution. Companies are becoming their own studios and broadcasters at a seemingly record pace. If your organization doesn’t already have its own channel or stream,…
  • Feb 28

    Eric J. Anderson Joins InfoLawGroup LLP As Partner

    Eric J. Anderson Joins InfoLawGroup LLP As Partner
    InfoLawGroup is pleased to announce that Eric J. Anderson has joined the firm as a Partner. Prior to joining InfoLawGroup, Mr. Anderson served for several years as head marketing and advertising counsel for Sears Holdings Corporation.…
Rank this Week: 4460

Cyberinsurance Law Blog

Cyberinsurance Law Blog

News and comments on Business Law. By Dilworth Paxson L.L.P.

http://www.databreachninja.com/
  • Feb 23

    “3 Tips for Public Pension Funds”

    “3 Tips for Public Pension Funds”
    On Tuesday, I was privileged to be part of a panel discussing cyberinsurance for public pension funds at Kessler Topaz’s Evolving Fiduciary Obligations for Institutional Investors conference, joining Victoria Hale, General Counsel of…
  • Feb 2

    “Unfortunately, This Will Get Physical”

    “Unfortunately, This Will Get Physical”
    There have been relatively few confirmed cyber attacks resulting in substantial physical harm to property (other than computer hardware) and people.  The first known event involved the 2008-2010 infiltration of a computer virus called…
  • Jan 19

    “Carriers and Brokers Filling the Coverage Gaps”

    “Carriers and Brokers Filling the Coverage Gaps”
    Stand-alone cyberinsurance is a critical component of enterprise risk management.  But even companies with traditional and cyber coverage may, and usually do, have gaps in coverage created by what I’ve referred to as the ‘hot…
Rank this Week: 3229

Data Breach Lawyer Blog

Data Breach Lawyer Blog

Covers intellectual property law. By Raines Feldman.

http://www.databreachlawyerblog.com/
  • Oct 24

    Trade Secrets and Internet Scraping

    Trade Secrets and Internet Scraping
    Recently, our cyber liability team discussed the impact internet data scraping has had upon trade secrets litigation.  Trade secrets cases are tough to win as plaintiffs.  The availability of competitive data online presents…
  • Oct 24

    Trade Secrets and Internet Scraping

    Trade Secrets and Internet Scraping
    Recently, our cyber liability team discussed the impact internet data scraping has had upon trade secrets litigation.  Trade secrets cases are tough to win as plaintiffs.  The availability of competitive data online presents…
  • Aug 30

    Be Mindful of Statute of Limitations for Internet Defamation

    Be Mindful of Statute of Limitations for Internet Defamation
    Often, data breaches are associated with internet defamation or other torts like impersonation.  Many times we come across strong defamation cases that cannot proceed because the potential client has waited too long to take action.…
Rank this Week: 3578

SullivanLawNet

SullivanLawNet

Legal news and analysis, with an emphasis on international and domestic intellectual property developments. By Shawn Sullivan.

http://sullivanlaw.net/
  • Jun 20

    EU Court: 3-D Toothbrush Shape not Registrable as Trademark

    EU Court: 3-D Toothbrush Shape not Registrable as Trademark
    In Loops, LLC v EUIPO, Case T‑385/15 (14 June 2016), the General Court of the European Union held that held that the three dimensional shape of a toothbrush lacked any distinctive character and could not be registered as an EU ……
  • May 31

    Court Refuses Interim Order in Strawberry Licensing Case

    Court Refuses Interim Order in Strawberry Licensing Case
    A U.S. district judge has refused to enter a temporary restraining order (TRO) against the University of California, Davis in litigation contesting the university’s alleged refusal to transfer or license strawberry germplasm developed…
  • May 12

    Prison Term for PVP Infringement by Alleged Wheat Bandit

    Prison Term for PVP Infringement by Alleged Wheat Bandit
    On 14 April 2016, a criminal court in the Spanish city of Segovia sentenced an individual to a six month prison term for infringing the plant variety protection (PVP) rights of Limagrain Europe SA in the soft wheat variety known as…
Rank this Week: 3441

Trials and Tribulations

Trials and Tribulations

Covers the Elvey v. TDAmeritrade case concerning information security, spam and identity theft.

http://caringaboutsecurity.wordpress.com
  • May 6

    Looking back

    Looking back
    This is a response to DataLossDB blog post Legal Sub-Project – Elvey v. TD Ameritrade by jkouns on June 14, 2009 You ask some tough questions, and I have answers!  This is Elvey.  I filed the case. I was not aware of this post…
  • Jul 3

    Advice for TD Ameritrade from Tim Devaney and Tom Stein

    Advice for TD Ameritrade from Tim Devaney and Tom Stein
    TD Ameritrade’s PR flacks think this is bad advice on how to handle haters, I guess.Filed under: Settlement Component
  • Jun 13

    Settlement Valuation

    Settlement Valuation
    Judge Walker repeatedly asked the former class counsel to place a value on the benefits the rejected settlement offered to the class. I think it’s doable, and no one has truly done so, so I’m going to give it a shot. The audit…
Rank this Week: 4652