Most Popular Privacy Law Blawgs Expanded View List View

Blogs 1 - 45 of 52
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Privacy & Information Security…

Privacy & Information Security Law Blog

Provides global privacy and information security law updates and analysis. By Hunton & Williams.

https://www.huntonprivacyblog.com/
  • Jul 23

    Hunton Global Privacy Update – July 2014

    Hunton Global Privacy Update – July 2014
    On July 15, 2014, the Hunton and Williams Global Privacy and Cybersecurity practice group hosted the latest webcast in its Hunton Global Privacy Update series. This blog post provides a link to a recording of the session, and to previous…
  • Jul 22

    New Cybersecurity Center to Be Established in Belgium

    New Cybersecurity Center to Be Established in Belgium
    On July 17, 2014, the Belgian government announced that it has finalized a Royal Decree on the establishment of a national Cybersecurity Center to oversee cybersecurity issues in Belgium. The Cybersecurity Center is expected to be operational…
  • Jul 22

    FTC Updates COPPA FAQs on Obtaining Verifiable Parental Consent

    FTC Updates COPPA FAQs on Obtaining Verifiable Parental Consent
    On July 16, 2014, the Federal Trade Commission posted revisions to the Frequently Asked Questions it has issued to provide guidance on complying with the Children's Online Privacy Protection Rule.
Rank this Week: 66

Inforrm's Blog

Inforrm's Blog

Discusses issues of media law and responsibility with a special focus on libel and privacy law and the balance between the two.

http://inforrm.wordpress.com
Rank this Week: 100

Clancco: Art & Law

Clancco: Art & Law

Covers the relationship between art and law with a focus on intellectual property, nonprofit tax-exempt organizations, free speech, and contemporary art. By Sergio Muñoz Sarmiento.

http://clancco.com/wp
  • Jul 21

    Harvard Law Review Note Criticizes Second Circuit’s ‘Cariou’ Opinion

    Harvard Law Review Note Criticizes Second Circuit’s ‘Cariou’ Opinion
    File this under “Great Fucken Argument.” Here’s a Harvard Law Review note that applies a diplomatic but devastating critique to the Second Circuit Court of Appeals’ Cariou v. Prince opinion. I won’t bore you with…
  • Jul 21

    Should artists get future proceeds from previously sold artworks?

    Should artists get future proceeds from previously sold artworks?
    That’s the theme of the weekend. And all last week. Much as been written about this issue, mostly against passing such a bill, the American Royalties Too Act of 2014, which is currently pending in Congress and may get its day on the…
  • Jul 16

    Ex-dictator Noriega Sues ‘Call of Duty: Black Ops II’

    Ex-dictator Noriega Sues ‘Call of Duty: Black Ops II’
    Manuel Noriega: “Hey, I might have been ousted by the U.S. military for questionable governmental practices, but that doesn’t mean you can use my image and portray me like a lunatic criminal, let alone profit from it.” Or…
Rank this Week: 238

Privacy and Security Law Blog

Privacy and Security Law Blog

Covers biometrics, HIPAA, identity theft, PATRIOT Act, phishing and more. By Davis Wright Tremaine.

http://www.privsecblog.com/
Rank this Week: 427

Copyright, Intellectual Property,…

Copyright, Intellectual Property, Computer, Internet, e-Commerce Law

Covers IP/IT law, with a strong focus on copyright and internet law. By Barry Sookman.

http://www.barrysookman.com
  • Jul 24

    Computer and Internet Law Updates for 2014-07-23

    Computer and Internet Law Updates for 2014-07-23
    Can Aspirin treat breast cancer? We aren't finding out why because without IP rights there is no incentive to invest http://t.co/fzpIN8Lml1 -> Anti-spam law is a pain in the marketing plan http://t.co/nm7QsQjzVH -> QUOSA and Copyright…
  • Jul 23

    Google ordered by BC court to block websites: Equustek Solutions Inc. v. Jack (Updated)

    Google ordered by BC court to block websites: Equustek Solutions Inc. v. Jack (Updated)
    In an important decision rendered on June 13, 2014, a Canadian court ordered Google to block a website that was selling goods that violated the trade secrets of the plaintiffs. The plaintiffs obtained a default judgment against the…
  • Jul 23

    Computer and Internet Law Updates for 2014-07-22

    Computer and Internet Law Updates for 2014-07-22
    Android app pirates face charges in US http://t.co/HyEbKSe2R9 -> Why I gave the National Association of Broadcasters, DiMA and CCIA the Shirt off my Back during Congressional Panel http://t.co/TWhr6t7nOA -> Here's How Piracy Hurts Indie…
Rank this Week: 606

Advertising Law Blog

Advertising Law Blog

Provides commentary and news on developing legal issues in advertising, promotional marketing, Internet, and privacy law. By Olshan Frome Wolosky LLP.

http://www.olshanlaw.com/blogs-Advertising-Law-Blog
Rank this Week: 717

Fair Competition Law Blog

Fair Competition Law Blog

Covers trade secrets, noncompetes, privacy and security, the Computer Fraud and Abuse Act, trademarks, copyrights, and business torts. By Russell Beck.

http://faircompetitionlaw.com
Rank this Week: 814

US Law Watch

US Law Watch

Provides US legal and regulatory information. By BNA International.

http://www.uslawwatch.com
Rank this Week: 825

HIPAA Blog

HIPAA Blog

Features a discussion of medical privacy. By Jeffrey P. Drummond.

http://hipaablog.blogspot.com/
  • Jul 23

    Sutter Health Data Breach Update: No proof…

    Sutter Health Data Breach Update: No proof of harm, no statutory damages. As you know, someone threw a brick through a plate glass door and stole a desktop (!) computer from a Sutter Health location.  The desktop had protected health…
  • Jul 19

    Vendini Settlement: I got a stray email on…

    Vendini Settlement: I got a stray email on this, so thought someone might find it interesting.  Vendini, a ticketseller like Ticketmaster, apparently allowed a third party to view non-PHI personal information such as credit card data, and a…
  • Jul 17

    Big Data in Healthcare: here's an…

    Big Data in Healthcare: here's an interesting article.  This is all possible, but it's easy to see had this information could be used to the detriment of patients.  Privacy concerns obviously abound. Hat tip: Alan Goldberg
Rank this Week: 874

Global Regulatory Enforcement Law…

Global Regulatory Enforcement Law Blog

Covers antitrust, privacy, international trade, and white color criminal defense. By Reed Smith.

http://www.globalregulatoryenforcementlawblog.com
  • Jul 24

    Italian Data Protection Authority issues new EU guideline

    Italian Data Protection Authority issues new EU guideline
    This post was written by Cynthia O’Donoghue, Kate Brimsted, and Matthew N. Peters. In early May the Italian data protection authority (“Garante”) issued “Simplified Arrangements to Provide Information and…
  • Jul 23

    Foreign Investment in the United States: D.C. Circuit Reversal Could Lead to Increased Transparency for CFIUS

    Foreign Investment in the United States: D.C. Circuit Reversal Could Lead to Increased Transparency for CFIUS
    This post was written by Michael J. Lowell and Bethany R. Brown. On July 15, the D.C. Circuit held that a presidential order requiring Ralls Corporation to divest its interests in Oregon windfarms because of national security concerns…
  • Jul 23

    European Commission Releases Cloud Computing Service Level Agreement

    European Commission Releases Cloud Computing Service Level Agreement
    This post was written by Cynthia O’Donoghue and Kate Brimsted. Back in 2012, the European Commission (‘Commission’) adopted the Cloud Computing Strategy to promote the adoption of cloud computing and ultimately boost…
Rank this Week: 1066

Inside Privacy

Inside Privacy

Covers global privacy and data security. By Covington & Burling LLP.

http://www.insideprivacy.com
  • Jul 23

    Extending Cybersecurity Breach Notice Requirements to Intelligence Community Contractor

    Extending Cybersecurity Breach Notice Requirements to Intelligence Community Contractor
    By David Fagan, Susan Cassidy, and Catlin Meade As an indicator of the continuing focus of government authorities on cybersecurity breaches and potential notification requirements, certain contractors for the federal government may soon face…
  • Jul 22

    Covington at #SXSWV2V: Lean Privacy Bootcamp for Entrepreneur

    Covington at #SXSWV2V: Lean Privacy Bootcamp for Entrepreneur
    At last week’s second annual South by Southwest (“SXSW”) V2V conference, described as “an extension and re-imagining of the legendary SXSW experience with an emphasis on the creative spark that drives entrepreneurial…
  • Jul 17

    FTC Staff Updates COPPA FAQs on Verifiable Parental Consent Method

    FTC Staff Updates COPPA FAQs on Verifiable Parental Consent Method
    The FTC staff has posted revisions to three Frequently Asked Questions (“FAQs”) related to obtaining verifiable parental consent under its COPPA Rule. For a comparison of the old and new FAQs, click here. Although the changes…
Rank this Week: 1112

LegalTXTS

LegalTXTS

Covers law and technology, with an emphasis on legal issues regarding digital media, privacy and data security, and information management. By Elijah Yip.

http://www.legaltxts.com/
  • May 19

    Section 230 of the CDA: An Employer’s New Friend?

    Section 230 of the CDA: An Employer’s New Friend?
    Employees can get carried away on social media. US Airways learned this the hard way when its employee responded to a customer complaint on Twitter with an obscene picture of a woman and a toy jet. An apology and deletion of the tweet…
  • May 8

    Oh Snap! Lessons From the Snapchat Settlement With the FTC

    Oh Snap! Lessons From the Snapchat Settlement With the FTC
    The Federal Trade Commission (FTC) just announced that Snapchat agreed to settle charges that it deceived consumers about how its popular mobile message app worked and what personal data it collected from users. (Read the FTC’s press…
  • Apr 21

    NLRB Strikes Down Selective Enforcement of Work Email Policy

    NLRB Strikes Down Selective Enforcement of Work Email Policy
    Birth announcements. Girl Scout cookies fundraisers. Leftovers in the company lounge. We’ve all probably received an email at work on these or similar subjects. It’s uncommon for an employee be disciplined for sending an email of…
Rank this Week: 1093

Socially Aware Blog

Socially Aware Blog

Covers the law and business of social media. By Morrison Foerster.

http://www.sociallyawareblog.com/
  • Jul 23

    Status Update

    Status Update
    An Illinois woman was arrested on July 11 and charged with theft after she allegedly stole a dress from a boutique in West Frankfort, Illinois, then posted a selfie wearing the dress on her Facebook page. Police Chief Shawn Talluto noted,…
  • Jul 21

    Data for the Taking: Using the CFAA to Combat Web Scraping

    Data for the Taking: Using the CFAA to Combat Web Scraping
    “Web scraping” or “web harvesting”—the practice of extracting large amounts of data from publicly available websites using automated “bots” or “spiders”—accounted for 18% of site…
  • Jul 21

    Status Update

    Status Update
    According to a current study by Bank of America, Americans are very closely attached to their smartphones. Of those surveyed, 85 percent said they check their phone at least a few times a day and 35 percent say they check it constantly. 47…
Rank this Week: 1310

Privacy and IP Law Blog

Privacy and IP Law Blog

Addresses recent events in trademark, copyright, computer and privacy law. By Christina Frangiosa.

http://privacyandip.blogspot.com/
  • Jul 14

    ABA IPL Publishes White Paper on Online Piracy and Counterfeiting

    ABA IPL Publishes White Paper on Online Piracy and Counterfeiting
    On July 7, 2014, the ABA Intellectual Property Law (IPL) Section released its comprehensive white paper, outlining the results of its research and analysis of continuing concerns about online pirates and counterfeiters based overseas. …
  • Apr 15

    Recent Presentations and Article

    Recent Presentations and Article
    More articles on IP and privacy issues will be posted here soon, but in the meantime, here are several recent articles that have published in other media:·        Participated in a panel discussion on…
  • Jan 28

    Today is Data Privacy Day!

    Today is Data Privacy Day!
    January 28 is “Data Privacy Day.”  In honor of the day, below are several links relating to efforts to protect the privacy of personal data and some tools for small businesses:Council of Europe’s explanation of the…
Rank this Week: 1250

Tsibouris Privacy + Technology Law…

Tsibouris Privacy + Technology Law Blog

Focuses on privacy, security, data protection, technology, and financial services issues affecting corporations, governments, and individuals. By Tsibouris & Associates.

http://blog.tsibouris.com/
  • Jan 23

    US-EU Safe Harbor: FTC Proposed Consent Orders with 12 companies for false claims.

    US-EU Safe Harbor: FTC Proposed Consent Orders with 12 companies for false claims.
    Yesterday the FTC announced proposed consent orders with twelve companies that falsely claimed compliance with the Safe Harbor framework.  Interestingly it involved a broad range of companies, including collection agencies and NFL…
  • Jun 7

    PRISM and NSA-Verizon Disclosures May Hurt EU Data Protection Regulation Effort

    PRISM and NSA-Verizon Disclosures May Hurt EU Data Protection Regulation Effort
    By Mehmet MunurRecent disclosures relating to PRISMand Verizon-NSAwiretapping may hurt efforts to make the EU General Data Protection Regulation less prescriptive and more business friendly for American companies. These programs will give…
  • Jan 25

    Appeals Court Vacates Obama Recess Appointment

    Appeals Court Vacates Obama Recess Appointment
    By Mehmet MunurThe U.S. Court of Appeals for the D.C. Circuit ruledtoday that President Obama’s appointments to the National Labor Relations Board were unconstitutional and the Board’s actions were unenforceable.  The court…
Rank this Week: 1425

Information Law Group

Information Law Group

Covers advertising law, privacy, information security and intellectual property.

http://www.infolawgroup.com/
  • Jul 23

    New Connecticut Mini-TCPA Provides for Giant Penalties and Attorneys’ Fee

    New Connecticut Mini-TCPA Provides for Giant Penalties and Attorneys’ Fee
    Companies sending text messages or conducting voice telemarketing in Connecticut beware! Connecticut has substantially amended its telemarketing law (the “mini-TCPA”), which now may regulate even more conduct than the federal TCPA…
  • Jul 17

    Record Number of Data Breaches for New Yorkers in 2013

    Record Number of Data Breaches for New Yorkers in 2013
    Over the past eight years, the New York Attorney General’s office has been compiling statistics on data breaches pursuant to the state’s breach notification law.  Earlier this week, Attorney General Eric Schneiderman…
  • Jul 17

    New COPPA Options for Verifiable Consent

    New COPPA Options for Verifiable Consent
    Yesterday, the FTC gave its blessing to some new ways that covered organizations can obtain verifiable parental consent before collecting personal information from children under 13. The updated COPPA Rule FAQs offer expanded options to get…
Rank this Week: 1518

New Media & Technology Law Blog

New Media & Technology Law Blog

Covers intellectual property, data security, online marketing and online commerce. By Proskauer.

http://newmedialaw.proskauer.com
  • Jul 23

    Proposed “Bitlicense” Regulations Published to the New York Register

    Proposed “Bitlicense” Regulations Published to the New York Register
    Today’s New York State Register includes a Notice of Proposed Rule Making from the New York State Department of Financial Services (the “NYSDFS”) regarding the regulation of virtual currency (“Regulation of the Conduct…
  • Jun 16

    Sixth Circuit Reinforces CDA Immunity – Reverses Lower Court in Jones v. Dirty World

    Sixth Circuit Reinforces CDA Immunity – Reverses Lower Court in Jones v. Dirty World
    On June 16th, 2014, the Sixth Circuit reversed the lower court’s holding that the gossip site, TheDirty.com, was responsible for its users’ defamatory posts and could not rely on immunity under CDA Section 230.   The…
  • Jun 9

    Mobile Alphabet Soup…What Exactly Is an ATDS under the TCPA?

    Mobile Alphabet Soup…What Exactly Is an ATDS under the TCPA?
    An Important Issue for Text-Message Marketers There has been an uptick in litigation under the federal Telephone Consumer Protection Act (TCPA), 47 U.S.C. § 227 – likely due to the increased use of mobile marketing (not to mention…
Rank this Week: 1525

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Jul 23

    Colombian Student Faces Prison Charges for Sharing an Academic Article Online

    Colombian Student Faces Prison Charges for Sharing an Academic Article Online
    In many parts of the developing world, students face barriers to access academic materials. Libraries are often inadequate, and schools and universities are often unable to pay dues for expensive, specialized databases. For these students,…
  • Jul 22

    White House Website Includes Unique Non-Cookie Tracker, Conflicts With Privacy Policy

    White House Website Includes Unique Non-Cookie Tracker, Conflicts With Privacy Policy
    Yesterday, Pro Publica reported on new research by a team at KU Leuven and Princteon on canvas fingerprinting. One of the most intrusive users of the technology is a company called AddThis, who by are employing it in “shadowing visitors…
  • Jul 22

    Going to San Diego Comic-Con? Put On Your Mask for the Surveillance Camera Network

    Going to San Diego Comic-Con? Put On Your Mask for the Surveillance Camera Network
    In the TV series Person of Interest, two government artificial intelligence programs—one gone rogue—can access virtually every surveillance camera across New York City, including privately operated ones in places like parking…
Rank this Week: 1495

Data Privacy Monitor

Data Privacy Monitor

Covers data privacy, security and social media subjects. By Baker Hostetler.

http://www.dataprivacymonitor.com/
  • Jul 23

    What’s Old is New Again—Insecure Remote Acce

    What’s Old is New Again—Insecure Remote Acce
    When a merchant is suspected of being the victim of an account data compromise event, they are often required by the card brands to hire a Payment Card Industry Forensic Investigator (PFI). The PFI provides a report on the investigation to…
  • Jul 22

    Utilities, Oil and Gas Companies Feeling Drained by “Energetic Bear”

    Utilities, Oil and Gas Companies Feeling Drained by “Energetic Bear”
    The following was authored by Mary Guzman, Senior Vice President, InfoSec Practice Leader with McGriff, Seibels & Williams, Inc. There is much going on in the cyber world related to energy and utility companies.  As has long been…
  • Jul 21

    Industry Thought Leader Tanya Forsheit Joins BakerHostetler’s Nationally Renowned Privacy Team

    Industry Thought Leader Tanya Forsheit Joins BakerHostetler’s Nationally Renowned Privacy Team
    InfoLawGroup Founding Partner and IAPP Certified Information Privacy Professional is sixth major practice addition in 2014 LOS ANGELES, July 21, 2014—BakerHostetler is proud to announce that Partner Tanya Forsheit has joined the…
Rank this Week: 1775

Business Litigation Info

Business Litigation Info

Covers business litigation, intellectual property, data security, and advertising and media. By Faruki Ireland & Cox P.L.L.

http://www.businesslitigationinfo.com/
  • Jul 23

    HIPAA has a bite. What to know about the civil and criminal penalties for non-compliance

    HIPAA has a bite. What to know about the civil and criminal penalties for non-compliance
    I was asked to comment for a story about a recent case in Texas in which criminal charges were filed against an individual for the misuse of Protected Health Information (“PHI”). Criminal charges have been available under the…
  • Jul 8

    Starbucks is Sending Baristas to College…With a Non-Compete Clause.

    Starbucks is Sending Baristas to College…With a Non-Compete Clause.
    University of Starbucks? The recent announcement of college scholarships for Starbucks Baristas is a great “perk,” but is this one of the businesses that can take the non-compete and trade secret claims, so often seen as…
  • Jul 3

    Baseball’s Antitrust Exemption no Help to Small-Market Team

    Baseball’s Antitrust Exemption no Help to Small-Market Team
    Major League Baseball is called “America’s pastime.”  It is, however, quickly becoming America’s big-market pastime, and antitrust law limits the ability of small-market teams to stem this trend.  The…
Rank this Week: 1848

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
  • Jul 18

    Delegation slows this week but the gTLD program is still going steady

    Delegation slows this week but the gTLD program is still going steady
    By Melissa Barnett Three new gTLDs have been delegated to the root zone since our last post. The newest group of gTLDs to be delegated include: .gent .nrw .scb gTLDs in Sunrise period — update The following gTLDs are now added to the…
  • Jul 11

    ICANN continues to rapidly expand the Internet this summer — newest statistics released

    ICANN continues to rapidly expand the Internet this summer — newest statistics released
    By Melissa Barnett As of July 4, 2014 ICANN announced that out of the 1,930 applicants received in 2012, 1,146 have been invited to contracting. Contracting is the process through which ICANN will contact eligible applicants and engage with…
  • Jul 10

    Beware of the Antitrust Laws’ extraterritorial reach

    Beware of the Antitrust Laws’ extraterritorial reach
    By Donna Ruscitti Our colleagues Jay Levine and Jason Startling recently wrote an interesting post on Porter Wright’s FedSec Law Blog. Though the article covers some interesting international and antitrust issues, the case Jay and Jason…
Rank this Week: 1792

Privacy Law Blog

Privacy Law Blog

Covers data privacy, identity theft, invasion of privacy, and national security legal issues. By Proskauer Rose LLP.

http://privacylaw.proskauer.com/
Rank this Week: 1757

Privacy & Security Matters

Privacy & Security Matters

By Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

http://www.privacyandsecuritymatters.com
Rank this Week: 2247

Workplace Privacy Counsel

Workplace Privacy Counsel

Covers employment related privacy issues. Published by Philip Gordon of Littler Mendelson's Privacy and Data Protection Practice Group.

http://www.littler.com/blog/workplace-privacy-counsel
  • Jul 24

    Six Recent NLRB Cases Provide Further Insight on Structuring Employers' Social Media Policie

    Six Recent NLRB Cases Provide Further Insight on Structuring Employers' Social Media Policie
    Employers, struggling to regulate employees’ work-related social media postings, recently suffered a string of defeats in National Labor Relations Board (NLRB) cases challenging their social media and related communications…
  • Jul 21

    Illinois Enacts New Law Impacting Inquiries on Criminal Background Check

    Illinois Enacts New Law Impacting Inquiries on Criminal Background Check
    On July 19, 2014, 2014, Illinois Governor Pat Quinn signed into law the Job Opportunities for Qualified Applicants Act, which will go into effect on January 1, 2015.  The new law will restrict the timing of pre-employment inquiries by…
  • Jul 10

    Five Lessons for Employers from California v. Riley

    Five Lessons for Employers from California v. Riley
    In the waning days of its current term, the U.S. Supreme Court ruled unanimously in California v. Riley that police officers generally violate the Fourth Amendment's prohibition against unreasonable searches by conducting a warrantless search…
Rank this Week: 2046

Chronicle of Data Protection

Chronicle of Data Protection

Covers consumer privacy, data security, HIPAA, financial privacy and EU privacy. By Hogan Lovells.

http://www.hldataprotection.com
Rank this Week: 2240

Privacy and Data Security Law

Privacy and Data Security Law

Covers the creation, collection, use, destruction and security of data. By Dentons.

http://www.privacyanddatasecuritylaw.com/
  • Jul 22

    Update from UK Information Commissioner’s Office (ICO)

    Update from UK Information Commissioner’s Office (ICO)
    Christopher Graham spoke at the recent Privacy Laws & Business Conference in Cambridge, UK.  Here is an update of the main points: The new EU Regulation Will it happen? Well, “if it looks like a duck, swims like a duck and…
  • Jul 4

    Russia moves to ban exports of personal data

    Russia moves to ban exports of personal data
    The Russian Parliament has just passed new rules requiring personal data of Russians to be stored in Russia.  This could mean that the big US IT vendors and other businesses that service Russian consumers will have to invest in local IT…
  • Jul 2

    EU Data Protection Regulation: Update

    EU Data Protection Regulation: Update
    The EU Data Protection Regulation was discussed, yesterday, at the Privacy Laws & Business conference in Cambridge, UK. Here is the latest news: There has been a debate as to whether the new Regulation is actually going to happen. …
Rank this Week: 2184

SullivanLawNet

SullivanLawNet

Legal news and analysis, with an emphasis on international and domestic intellectual property developments. By Shawn Sullivan.

http://sullivanlaw.net/
  • May 18

    Increased Fines for Violations of North Carolina Seed Law

    Increased Fines for Violations of North Carolina Seed Law
    In 2013, the North Carolina legislature increased the maximum fine for violations of the state’s seed law from $500 to $10,000 per violation. See N.C. Session Law 2013-345, Senate Bill 455, An act to increase penalties for…
  • Mar 31

    Unintended Consequences of Open Access Publishing Policie

    Unintended Consequences of Open Access Publishing Policie
    Rick Anderson at The Scholarly Kitchen has a thought-provoking article regarding the pressure on authors to publish their academic articles under the most permissive open access licenses available. See Rick Anderson, CC-BY, Copyright, and…
  • Mar 31

    “Twilight” Trademark Infringement Claims Cleared for Trial

    “Twilight” Trademark Infringement Claims Cleared for Trial
    The U.S. District Court for the Southern District of New York ruled that the entertainment company responsible for the “Twilight” film series is entitled to a trial on claims that its trademarks were infringed by a cosmetics…
Rank this Week: 2145

Workplace Privacy, Data Management…

Workplace Privacy, Data Management & Security Report

Covers data security, HIPAA, identity theft and workplace privacy. By Jackson Lewis.

http://www.workplaceprivacyreport.com
Rank this Week: 2761

Broadband Law Advisor

Broadband Law Advisor

Provides insight and information on the FCC's National Broadband Plan. By Davis Wright Tremaine LLP.

http://www.broadbandlawadvisor.com/
Rank this Week: 2839

Information Technology Law Blog

Information Technology Law Blog

Covers social media, e-discovery, privacy, and intellectual property. By Foster Swift Collins & Smith PC.

http://www.michiganitlaw.com/
  • Jul 15

    Cincinnati Who-Dey Ruling is Big Deal for Internet Commerce: Website immune from Ex-Bengals Cheerleader’s Defamation Lawsuit

    Cincinnati Who-Dey Ruling is Big Deal for Internet Commerce: Website immune from Ex-Bengals Cheerleader’s Defamation Lawsuit
    The gossip website, thedirty.com, is immune from liability for online posts about an ex-Bengals Cheerleader’s sexual promiscuity and acquiring a sexually transmitted disease. In a closely followed decision from a case that…
  • Jul 1

    New Michigan Crowdfunding Website

    New Michigan Crowdfunding Website
    Since the passing of the Crowdfunding Act in December 2013, many questions concerning the applicability of the law have surfaced. This past month, the Michigan Municipal League launched CrowdfundingMI.com, a website pertaining to…
  • Jun 25

    Will the Government Force the Redskins to Change their Name?

    Will the Government Force the Redskins to Change their Name?
    On June 18, the United States Patent and Trademark Office ("USPTO") cancelled the Washington Redskins' trademark in its team name, concluding that the term "Redskin" was racially offensive and derogatory towards Native Americans. …
Rank this Week: 2702

Dot Indicia

Dot Indicia

Covers information, privacy and security from a Canadian perspective. By Michael Power.

http://michaelpower.ca
  • Jun 13

    Spencer, PIPEDA & Lawful Authority

    Spencer, PIPEDA & Lawful Authority
    A busy practice combined with a very bad shoulder injury will, regretfully, move blogging down the priority list. As we reach mid-2014 there have been a few interesting privacy law developments this year but, in my view, no real…
  • Feb 27

    Toronto Hydro Surveillance?

    Toronto Hydro Surveillance?
    I can’t help but think there’s a movie in this somewhere. Love, devotion and allegations of betrayal are all present. Mix in smart meters and privacy and it becomes obvious why I’m blogging about this. It’s quite a…
  • Feb 19

    Health Privacy: Is PHIPA the only game in town?

    Health Privacy: Is PHIPA the only game in town?
    There is a new and interesting decision out of Peterborough that raises but doesn’t answer a lot of questions. These questions revolve around the intersection of PHIPA, class action law and tort law. This is not something you see…
Rank this Week: 2848

techblawg

techblawg

Focuses primarily on issues involving the intersection of law, technology and finance. By David Ma.

http://david-ma.ca/
  • Jun 28

    Protected: bob’s stuff

    Protected: bob’s stuff
    There is no excerpt because this is a protected post. [Click on title above to read the full post]
  • Jun 8

    weekly tweet roundup

    weekly tweet roundup
    haswell – not much of a tock, is it? at least not for desktop. http://t.co/Z4WytI0cnO 2013-06-02 analysis of carbon footprint of a tesla s. not as green as i thought, but still pretty good. http://t.co/6fPPVFnNzA 2013-06-02 better…
  • Jun 1

    weekly tweet roundup

    weekly tweet roundup
    for the next time someone says you don't need project controls aren't because of agile. http://t.co/RhdKFAr58d 2013-05-27 quebec cracks down on airbnb. or rather those who rent out their home using airbnb. http://t.co/fU22acDtHs 2013-05-27…
Rank this Week: 2434

Privacy & Security Source

Privacy & Security Source

Covers anonymous subpoenas, behavioral advertising, employee monitoring, geolocation and information security. By Foley & Lardner LLP.

http://www.privacysecuritysource.com
Rank this Week: 2738

Security, Privacy and The Law

Security, Privacy and The Law

Covers information security and privacy issues. By Foley Hoag LLP.

http://www.securityprivacyandthelaw.com
  • Jul 21

    App Developers Should Note Revisions to COPPA FAQ

    App Developers Should Note Revisions to COPPA FAQ
    The FTC’s July 10, 2014 complaint filed against Amazon has left app developers with concerns about how to make apps that target kids and still comply with the law. The complaint, brought under Section 5(a) of the FTC Act, alleged that…
  • Jun 25

    In Riley v. California, Supreme Court Rules Police Must Obtain Warrant before Searching Cell Phone

    In Riley v. California, Supreme Court Rules Police Must Obtain Warrant before Searching Cell Phone
    In a unanimous decision issued today, the Supreme Court ruled that police cannot search the cell phones of arrested individuals without a warrant. In reaching its decision, the Court recognized that there is an immense amount of personal…
  • Jun 25

    In Riley v. California, Supreme Court Rules Police Must Obtain Warrant before Searching Cell Phone

    In Riley v. California, Supreme Court Rules Police Must Obtain Warrant before Searching Cell Phone
    In a unanimous decision issued today, the Supreme Court ruled that police cannot search the cell phones of arrested individuals without a warrant. In reaching its decision, the Court recognized that there is an immense amount of personal…
Rank this Week: 3311

Trials and Tribulations

Trials and Tribulations

Covers the Elvey v. TDAmeritrade case concerning information security, spam and identity theft.

http://caringaboutsecurity.wordpress.com
  • Jul 3

    Advice for TD Ameritrade from Tim Devaney and Tom Stein

    Advice for TD Ameritrade from Tim Devaney and Tom Stein
    TD Ameritrade’s PR flacks think this is bad advice on how to handle haters, I guess.Filed under: Settlement Component
  • Jun 13

    Settlement Valuation

    Settlement Valuation
    Judge Walker repeatedly asked the former class counsel to place a value on the benefits the rejected settlement offered to the class. I think it’s doable, and no one has truly done so, so I’m going to give it a shot. The audit…
  • Oct 30

    New SEC guidance on Cybersecurity

    New SEC guidance on Cybersecurity
    The SEC has a pathetic new regulation, its first on cybersecurity.  It’s another cog in a system designed to provide the appearance of Justice without actually meting it out to the very powerful or wealthy.  The SEC refused to act on…
Rank this Week: 3525

North Carolina Journal of Law &…

North Carolina Journal of Law & Technology

Features legal scholarship in law and technology topics, including intellectual property law, cyberspace law, environmental law, criminal law, health law, and privacy law.

http://ncjolt.org/
Rank this Week: 3369

Reasonable Expectation

Reasonable Expectation

Focuses on privacy and data security. By M. Scott Koller.

http://www.reasonableexpectation.com
  • Jun 30

    Are Data Breach Investigations Privileged?

    Are Data Breach Investigations Privileged?
    #150654797 / gettyimages.com Are Data Breach Investigations Privileged? Originally Published on the InfoLaw Group Blog: Over the past year, the number of data breaches has skyrocketed and, as a result, companies are facing increased risk of…
  • Mar 20

    FTC Seeks Public Comment on iKeepSafe’s Proposed Safe Harbor Program Under the Children’s Online Privacy Protection Rule

    FTC Seeks Public Comment on iKeepSafe’s Proposed Safe Harbor Program Under the Children’s Online Privacy Protection Rule
    Internet Keep Safe Coalition (iKeep Safe) has submitted a proposed safe harbor program to the Federal Trade Commission under the the agency’s Children’s Online Privacy Protection Rule. Under 16 C.F.R. 312.11, COPPA safe…
  • Feb 28

    Obama’s new cybersecurity plan a good start

    Obama’s new cybersecurity plan a good start
    I recently authored an article for the Daily Journal on the new cybersecurity framework.  You can read about it by visiting the Daily Journal.  
Rank this Week: 3624

The Privacy Law Site

The Privacy Law Site

Covers privacy laws and regulations.

http://privacy-law.blogspot.com/
  • Mar 25

    White House to Propose End to Bulk Collection

    White House to Propose End to Bulk Collection
    According to the The New York Times, President Obama plans to propose legislation that would end bulk collection of phone records under Sec. 215 of the Patriot Act, keep the records in the hands of the phone companies, and require…
  • Jun 29

    26 Senators Seek Details on Information Collection from NSA

    26 Senators Seek Details on Information Collection from NSA
    26 Senators have sent a letter to DNI James Clapper seeking examples of how bulk collection of phone records information from provided unique intelligence.The AP reports the story here.
  • Jun 29

    COPPA Limits on Collection of Children's Information Applies to Apps as of July 1, 2013

    COPPA Limits on Collection of Children's Information Applies to Apps as of July 1, 2013
    Congress amended COPPA in 2012 to cover online services such as apps. As was previously the case, the law only applies to apps "directed at" children under the age of 13, or have actual knowledge of collection of personal information from…
Rank this Week: 3104

Spam Notes

Spam Notes

Covers Internet law, electronic communications law, privacy, ID theft, data protection, adware, spyware and more. Published by Seattle lawyer Venkat Balasubramani.

http://spamnotes.com
  • Dec 31

    The Marble and the Sculptor

    The Marble and the Sculptor
    A few months* ago, Keith Lee, who blogs at Associate's Mind, was kind enough to send me a review copy of his book titled "The Marble and the Sculptor". The book is a survival guide of sorts for newly minted lawyers, tackling a wide range…
  • Jul 19

    The Problem With the Sharknado Reference

    The Problem With the Sharknado Reference
    Judge Mills throws in a reference to Sharknado in Faulkner v. Woody Allen. (h/t @ericgoldman) The problem with the reference is this: five years from now, no one will know or recall what Sharknado was. Even today, many people reading the…
  • Jan 19

    Just Who Are the Change Agents in Law?

    Just Who Are the Change Agents in Law?
    Scott Greenfield has an interesting post up today with an equally interesting response from Keith Lee. Both posts nudge me in the direction of a "Godin-esque" question that's been percolating in my mind for a long long time now:  the…
Rank this Week: 3535

sobre privacidad y protección de…

sobre privacidad y protección de datos

Spanish language blog about privacy and data protection. By Daniel A. Lopez Carballo.

http://www.dlcarballo.com/
  • May 8

    Primeras sanciones por violación del Habeas Data en Colombia

    Primeras sanciones por violación del Habeas Data en Colombia
    Según se hacia eco la Radio Nacional de Colombia, un total de 350 sanciones, por más de mil millones de pesos,  ha impuesto la Superintendencia de Industria y Comercio por violar la nueva ley de Habeas Data. El dato lo…
  • Apr 22

    Aprobado el proyecto de ley de protección de datos de República Dominicana

    Aprobado el proyecto de ley de protección de datos de República Dominicana
    Según se hacían eco diferentes medios de comunicación, el Senado de la República Dominicana aprobó en segunda lectura el proyecto de Ley Orgánica sobre Protección de Datos de Carácter…
  • Apr 14

    Presentación de la Declaración de Lima

    Presentación de la Declaración de Lima
    El pasado viernes 12 de abril de 2013, fue presentada, en la ciudad de Lima (Perú), en el transcurso del Seminario de Derecho Constitucional la primera Declaración emanada en el seno del Observatorio Iberoamericano de…
Rank this Week: 3208

Politics of Privacy Blog

Politics of Privacy Blog

Covers privacy, liberty, security, economy and their interaction. By Andreas Busch.

http://politicsofprivacy.blogspot.com/
  • Jan 18

    Again: loss of personal data by public officials in the UK

    Again: loss of personal data by public officials in the UK
    Less than two months after the loss of the personal details of 25 million people by the UK's tax authorities (see this blog entry), another substantial loss of personal data has occurred in Britain. As the BBC website writes, a laptop…
  • Jan 7

    Jeremy Clarkson and identity theft

    Jeremy Clarkson and identity theft
    Well, first of all, a happy new year to my readers! And I am glad to be able to report that page visits to this blog more than doubled in 2007 over 2006, to well over 5000 pageviews. I am very happy about this and will take it as a reminder…
  • Nov 20

    British tax authorities lose personal details of 25 million people

    British tax authorities lose personal details of 25 million people
    A crass case of neglect and breach of data protection legislation has led to the loss of discs containing the names, addresses, dates of birth, bank account details and National Insurance numbers of 25 million people in the United Kingdom, it…
Rank this Week: 3308

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 3940

The D: Drive | E-Discovery,…

The D: Drive | E-Discovery, Privacy and All Things Data

Covers privacy, e-discovery, data security, and cloud computing. By Davis LLP.

http://www.davis.ca/en/blog/d-drive/
  • Jul 22

    Why Your Lawyer Should Be the First Point of Contact after a Data Breach

    Why Your Lawyer Should Be the First Point of Contact after a Data Breach
    Securing corporate information assets against a data breach, and responding to a data breach when it occurs, is not just a technology problem. While information security certainly has a major technological component, it is also a public…
  • Jun 23

    Join the Dialogue: Sedona Canada Holds Working Group Meeting to Update E-Discovery Principle

    Join the Dialogue: Sedona Canada Holds Working Group Meeting to Update E-Discovery Principle
    The Sedona Conference’s Working Group 7 (Sedona Canada) strives to create forward-looking principles and best practice recommendations for lawyers, courts, businesses, and others who regularly confront eDiscovery issues in Canada. The…
  • Jun 3

    Minimizing Risks and Responding to Data Breache

    Minimizing Risks and Responding to Data Breache
    This article originally appeared on Canadian Lawyer InHouse Online and has been reproduced here with permission from the publisher. [More…]
Rank this Week: 4012

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
Rank this Week: 3766

Data Security Law Journal

Data Security Law Journal

Covers data security, cloud computing, data privacy and anything E. By Al Saikali.

http://www.datasecuritylawjournal.com/
  • May 26

    Why Every Business Should Care About Florida’s Information Protection Act

    Why Every Business Should Care About Florida’s Information Protection Act
    My last post described what the recently passed Florida Information Protection Act (FIPA) will do.  This post analyzes how FIPA differs from Florida’s existing breach notification law and explains why those differences will hurt or…
  • May 15

    Everything You Need To Know About Florida’s New Data Protection Law

    Everything You Need To Know About Florida’s New Data Protection Law
    The Florida Legislature recently passed the Florida Information Protection Act of 2014 (FIPA).  This post describes the FIPA and analyzes the advantages and disadvantages to businesses governed by the new law.  The FIPA must still…
  • Dec 30

    The Target Data Breach Lawsuits: Why Every Company Should Care

    The Target Data Breach Lawsuits: Why Every Company Should Care
    Plaintiffs’ lawyers were falling over themselves last week in a race to the courthouse to sue Target as a result of its recent data breach.  By at least one report, over 40 lawsuits have already been filed against Target, the first…
Rank this Week: 4622