Most Popular Privacy Law Blawgs Expanded View List View

Blogs 1 - 45 of 57
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Threat Level

Threat Level

Covers privacy, crime and security online. From Wired News.

http://www.wired.com/threatlevel
  • Apr 14

    Researchers Cracked Microsoft and Google’s Shortened URLs To Spy On People

    Researchers Cracked Microsoft and Google’s Shortened URLs To Spy On People
    They were even able to identify a young woman who'd sought Google Maps directions to a Planned Parenthood clinic. The post Researchers Cracked Microsoft and Google's Shortened URLs To Spy On People appeared first on WIRED.
  • Apr 14

    A Scheme to Encrypt the Entire Web Is Actually Working

    A Scheme to Encrypt the Entire Web Is Actually Working
    The non-profit certificate authority Let's Encrypt is enabling a sea change toward HTTPS encryption online. The post A Scheme to Encrypt the Entire Web Is Actually Working appeared first on WIRED.
  • Apr 13

    Matthew Keys Sentenced to Two Years for Aiding Anonymou

    Matthew Keys Sentenced to Two Years for Aiding Anonymou
    The former Tribune Company employee was convicted of giving Anonymous information that helped hackers access an LA Times server and alter a headline. The post Matthew Keys Sentenced to Two Years for Aiding Anonymous appeared first on WIRED.
Rank this Week: 35

Privacy & Information Security…

Privacy & Information Security Law Blog

Provides global privacy and information security law updates and analysis. By Hunton & Williams.

https://www.huntonprivacyblog.com/
  • Feb 13

    CIPL to Hold Next GDPR Implementation Workshop in Madrid

    CIPL to Hold Next GDPR Implementation Workshop in Madrid
    On March 6 and 7, 2017, the Centre for Information Policy Leadership at Hunton & Williams LLP and over 100 public and private sector participants in CIPL’s GDPR Implementation Project will convene in Madrid, Spain, for CIPL’s…
  • Feb 9

    DPA of Argentina Issues Draft Data Protection Bill

    DPA of Argentina Issues Draft Data Protection Bill
    Pablo Palazzi, from Buenos Aires law firm Allende & Brea, reports that earlier this month, the Argentine Data Protection Agency posted the first draft of a new data protection bill on its website. The Draft Bill is heavily based on the EU…
  • Feb 9

    House of Representatives Passes Email Privacy Act

    House of Representatives Passes Email Privacy Act
    On February 6, 2017, the House of Representatives suspended its rules and passed by voice vote H.R 387, the Email Privacy Act. The Email Privacy Act now moves to the Senate, where it will be considered by the Senate Judiciary Committee.…
Rank this Week: 81

Inforrm\'s Blog

Inforrm\'s Blog

Discusses issues of media law and responsibility with a special focus on libel and privacy law and the balance between the two.

https://inforrm.wordpress.com/
  • Feb 27

    Data Protection: Pre-publication claims and section 32(4), the case for disapplication – Hugh Tomlinson QC

    Data Protection: Pre-publication claims and section 32(4), the case for disapplication – Hugh Tomlinson QC
    Section 32 of the Data Protection Act 1998 (“the DPA”) contains a curious provision apparently designed to prevent “pre-publication” claims where unpublished journalistic, literary or artistic material is involved.…
  • Feb 27

    News: Mr Justice Warby to take charge of new QB “Media and Communications List”

    News: Mr Justice Warby to take charge of new QB “Media and Communications List”
    It has been announced that Mr Justice Warby will take charge of a new list within the Queen’s Bench Division of the High Court, to be known as the “Media and Communications List”. Mr Justice Warby will take primary…
  • Feb 26

    Law and Media Round Up – 27 February 2017

    Law and Media Round Up – 27 February 2017
    On Monday and Tuesday 27 and 28 February 2017, Warby J will hear the much anticipated trial in the case of Jack Monroe v Katie Hopkins.  We had a case preview.   The case concerns an allegedly defamatory tweet. Ms Hopkins, formerly…
Rank this Week: 194

Chronicle of Data Protection

Chronicle of Data Protection

Covers consumer privacy, data security, HIPAA, financial privacy and EU privacy. By Hogan Lovells.

http://www.hldataprotection.com
  • Feb 27

    Australia Introduces Mandatory Data Breach Notification Scheme

    Australia Introduces Mandatory Data Breach Notification Scheme
    On 13 February 2017, the Australian Senate passed into law the Privacy Amendment Bill 2016. This law amends the primary privacy and data protection legislation in Australia, Privacy Act 1988, to introduce the long-anticipated mandatory data…
  • Feb 24

    The “Final Final” is Here: NYDFS Cybersecurity Regulation

    The “Final Final” is Here: NYDFS Cybersecurity Regulation
    As Hogan Lovells previously reported, the New York State Department of Financial Services has launched a significant initiative to impose detailed cybersecurity requirements on covered financial institutions. On February 16, NYDFS issued its…
  • Feb 17

    Polish DPA Releases Data Privacy Inspection Plans – Targets Health, Shopping

    Polish DPA Releases Data Privacy Inspection Plans – Targets Health, Shopping
    The Polish Data Protection Authority has just released its inspection plans for 2017. This year, the GIODO has decided to target its review of compliance with data protection laws on the health services sector, as well as on the consumer…
Rank this Week: 264

Advertising Law Blog

Advertising Law Blog

Provides commentary and news on developing legal issues in advertising, promotional marketing, Internet, and privacy law. By Olshan Frome Wolosky LLP.

http://www.olshanlaw.com/blogs-Advertising-Law-Blog
Rank this Week: 539

Clancco: Art & Law

Clancco: Art & Law

Covers the relationship between art and law with a focus on intellectual property, nonprofit tax-exempt organizations, free speech, and contemporary art. By Sergio Muñoz Sarmiento.

http://clancco.com/wp
  • Feb 17

    Battle Over August Sander Estate?

    Battle Over August Sander Estate?
    Or is it merely a misunderstanding as to what an “estate” is, legally and colloquially?
  • Feb 9

    “The Left Has Shanghaied Copyright”

    “The Left Has Shanghaied Copyright”
    The Federalist’s Robin Ridless takes some clean power-punches at the “ivy-cloistered radicalism” of the “all-appropriation-is-fair-use” jihadists. Here’s one example, To read a sampling of current…
  • Feb 8

    Can the “artworld” Resist President Trump? Don’t Count On It.

    Can the “artworld” Resist President Trump? Don’t Count On It.
    The Washington Post’s Tom Rachman shoots several zingers and comedy and farce that “political art” has become. Example number one: “Today, ‘politicized artist’ is as likely to evoke a whiny, entitled,…
Rank this Week: 858

Inside Privacy

Inside Privacy

Covers global privacy and data security. By Covington & Burling LLP.

http://www.insideprivacy.com
Rank this Week: 596

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Feb 27

    Data Brokers: Don’t Let Your Data be Used For Human Rights Abuse

    Data Brokers: Don’t Let Your Data be Used For Human Rights Abuse
    EFF, Amnesty International, Color of Change, the Center for Democracy and Technology, and our other coalition partners are urging data brokers to take a stand against government surveillance and discrimination based on religion, national…
  • Feb 24

    Fair Use as Consumer Protection

    Fair Use as Consumer Protection
    Talking about fair use often means talking about your right to re-use existing copyrighted works in the process of making something new  - to make remixes and documentaries, parodies, or even to build novel Internet search tools. But now…
  • Feb 24

    Copyright Law Versus Internet Culture

    Copyright Law Versus Internet Culture
    Throughout human history, culture has been made by people telling one another stories, building on what has come before, and making it their own. Every generation, every storyteller puts their own spin on old tales to reflect their own values…
Rank this Week: 2350

Privacy & Security Matters

Privacy & Security Matters

By Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

http://www.privacyandsecuritymatters.com
  • Feb 27

    Data Breaches Will Cost Yahoo and Verizon Long After Sale

    Data Breaches Will Cost Yahoo and Verizon Long After Sale
    Five Things You (and Your M&A Diligence Team) Should Know Recently it was announced that Verizon would pay $350 million less than it had been prepared to pay previously for Yahoo as a result of data breaches that affected over 1.5…
  • Feb 22

    Failure of Audit Controls Can Cost $$$

    Failure of Audit Controls Can Cost $$$
    Last week, the HHS Office for Civil Rights (OCR) disclosed a $5.5 million settlement with Memorial Healthcare Systems (MHS) for HIPAA violations affecting the protected health information (PHI) of 115,143 individuals. The Resolution…
  • Feb 16

    The February 2017 Update – The Mintz Matrix

    The February 2017 Update – The Mintz Matrix
    As our readers know we maintain a summary of U.S. state data breach notification laws, which we refer to as the “Mintz Matrix.”   Our latest update is available here, and it should be part of your incident response…
Rank this Week: 4999

Privacy and Security Law Blog

Privacy and Security Law Blog

Covers biometrics, HIPAA, identity theft, PATRIOT Act, phishing and more. By Davis Wright Tremaine.

http://www.privsecblog.com/
  • Feb 27

    New FCC Chairman Moves to Roll Back Privacy Rules for Internet Service Provider

    New FCC Chairman Moves to Roll Back Privacy Rules for Internet Service Provider
    Ever since the presidential election and the replacement of former Obama administration FCC Chairman Tom Wheeler with former Republican commissioner and now Chairman Ajit Pai, communications industry and privacy policy observers of all…
  • Feb 21

    Comments Sought of FCC Privacy Regime

    Comments Sought of FCC Privacy Regime
    On Friday, the Federal Register published the FCC’s January 17th Public Notice of the fact that eleven Petitions for Reconsideration were filed in the Broadband Privacy proceeding (WC Docket No. 16-106).  The Petitions challenge…
  • Feb 17

    42 C.F.R. Part 2 Final Rule Is Officially Delayed … Can Comments to HHS and OMB Fix It?

    42 C.F.R. Part 2 Final Rule Is Officially Delayed … Can Comments to HHS and OMB Fix It?
    On January 18, 2017, the U.S. Department of Health and Human Services (HHS) published a final rule amending the Confidentiality of Substance Use Disorder Patient Records rule at 42 C.F.R. Part 2. Yesterday, HHS delayed the effective date of…
Rank this Week: 2777

Security, Privacy and The Law

Security, Privacy and The Law

Covers information security and privacy issues. By Foley Hoag LLP.

http://www.securityprivacyandthelaw.com
  • Feb 27

    Cybersecurity Executive Order? – A Few Thoughts on Leaked “Drafts.”

    Cybersecurity Executive Order? – A Few Thoughts on Leaked “Drafts.”
    More than two weeks ago, the President postponed issuing an executive order on cybersecurity. Since then, we’ve had no word from the White House on when he intends to sign it. However, two purported drafts of the order have wound up on…
  • Feb 22

    Friend or Foe? State Attorneys General Start to Change Their Tune on Industry & Cybersecurity

    Friend or Foe? State Attorneys General Start to Change Their Tune on Industry & Cybersecurity
    Should businesses be thought of as victims or bad actors when it comes to data breaches?  State attorneys general are embracing the idea that businesses are not necessarily adversaries in the struggle to protect sensitive consumer…
  • Feb 18

    Want to Know Why Memorial Healthcare Systems Is Paying HHS OCR $5.5 Million?

    Want to Know Why Memorial Healthcare Systems Is Paying HHS OCR $5.5 Million?
    On February 16, 2017, HHS OCR announced that Memorial Healthcare Systems (MHS) had paid the U.S. Department of Health and Human Services (HHS) $5.5 million to settle potential violations of HIPAA’s Privacy and Security Rules and agreed…
Rank this Week: 3335

Copyright, Intellectual Property,…

Copyright, Intellectual Property, Computer, Internet, e-Commerce Law

Covers IP/IT law, with a strong focus on copyright and internet law. By Barry Sookman.

http://www.barrysookman.com
Rank this Week: 2969

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 2227

North Carolina Journal of Law &…

North Carolina Journal of Law & Technology

Features legal scholarship in law and technology topics, including intellectual property law, cyberspace law, environmental law, criminal law, health law, and privacy law.

http://ncjolt.org/
  • Feb 24

    Treatment of Women in the Tech Industry Cannot Be Ignored

    Treatment of Women in the Tech Industry Cannot Be Ignored
    Technology companies, especially start-ups, have long been a beacon for the quirky yet talented to produce great products that make early investors and creators rich. Somewhere around 90% of startups will ultimately fail and with the speed in…
  • Feb 23

    Microsoft is Fighting to Protect Your Secret

    Microsoft is Fighting to Protect Your Secret
    It seems the United States Government cannot stop secretly spying on its citizens, but Microsoft, and other service providers, may be paving the way to at least remove some of the secrecy. U.S. District Court Judge James Robart—recently…
  • Feb 22

    Helping Astronauts Go to the Bathroom in Space

    Helping Astronauts Go to the Bathroom in Space
    Imagine that moment of trying to unlock your front door when you desperately need to use the bathroom. You finally jiggle the key into the lock, burst into the room, drop everything you’re holding, and sprint to the bathroom. Relief.…
Rank this Week: 4547

Socially Aware Blog

Socially Aware Blog

Covers the law and business of social media. By Morrison Foerster.

http://www.sociallyawareblog.com/
Rank this Week: 3788

techblawg

techblawg

Focuses primarily on issues involving the intersection of law, technology and finance. By David Ma.

http://david-ma.ca/
  • Feb 23

    weekly tweet roundup

    weekly tweet roundup
    why carefully defined licensing metrics matter: diageo may be liable to sap for extra $68 million in licensing fees. https://t.co/Nk4hqHSoCA 2017-02-20 [Click on title above to read the full post]
  • Feb 16

    weekly tweet roundup

    weekly tweet roundup
    internet backbone provider cogent cuts off the pirate bay and other pirate sites. first step on the slippery slope? https://t.co/a6ANe6HKBS 2017-02-13 interesting (but long) piece on the most successful ticket scalper in the us and the ticket…
  • Feb 9

    weekly tweet roundup

    weekly tweet roundup
    an interesting peek at the poker ai that bested humans. https://t.co/HJPK8SNjdE 2017-02-03 why ups trucks don't turn left. quite interesting. https://t.co/tqswHI0CzD 2017-02-08 goldman has replaced 600 traders with 200 engineers since 2000…
Rank this Week: 3228

Broadband Law Advisor

Broadband Law Advisor

Provides insight and information on the FCC's National Broadband Plan. By Davis Wright Tremaine LLP.

http://www.broadbandlawadvisor.com/
  • Feb 23

    FCC Announces Details for Mobility Fund Phase II

    FCC Announces Details for Mobility Fund Phase II
    The FCC adopted an order today that establishes Phase II of the Mobility Fund.  As we have previously reported, the FCC established the Mobility Fund to provide universal service subsidies to help expand and preserve 4G LTE mobile…
  • Feb 23

    FCC Finalizes Criteria for CAF Phase II Auction

    FCC Finalizes Criteria for CAF Phase II Auction
    Today the FCC approved an order that moves the nearly two billion dollar Connect America Fund (CAF) Phase II Auction competitive bidding process forward.   As we have previously reported, the Phase II auction will provide support…
  • Feb 23

    FCC Approves ILEC Shift to GAAP Accounting, Mitigates Pole Rate Impact

    FCC Approves ILEC Shift to GAAP Accounting, Mitigates Pole Rate Impact
    At today’s open meeting the FCC adopted a Report and Order that streamlines and eliminates Part 32 accounting requirements governing price-cap carriers, allowing them instead to rely on GAAP accounting methods and thus eliminate the…
Rank this Week: 3139

HIPAA Blog

HIPAA Blog

Features a discussion of medical privacy. By Jeffrey P. Drummond.

http://hipaablog.blogspot.com/
  • Feb 23

    Interesting Question: HIPAA lawyer Adam…

    Interesting Question: HIPAA lawyer Adam Greene was interviewed at HIMSS, and noted that HHS is close to publishing the regulations implementing the HITECH revisions that allow affected individuals to get a share of the fines levied by OCR.…
  • Feb 22

    2 Healthcare Data Breaches up 40%, Affect…

    2 Healthcare Data Breaches up 40%, Affect 25% of Consumers: According to the Identity Theft Research Center, Healthcare represents one third of all data breaches, and the number of reported breaches has risen from 780 in 2015 to 1093 last…
  • Feb 17

    Another Day, Another Monster Fine: This…

    Another Day, Another Monster Fine: This time it's Memorial Healthcare System (Florida), with a $5.5 million fine for not following access controls and allowing terminated employees to continue accessing medical records after being terminated.…
Rank this Week: 2638

New Media & Technology Law Blog

New Media & Technology Law Blog

Covers intellectual property, data security, online marketing and online commerce. By Proskauer.

http://newmedialaw.proskauer.com
Rank this Week: 3437

Data Privacy Monitor

Data Privacy Monitor

Covers data privacy, security and social media subjects. By Baker Hostetler.

http://www.dataprivacymonitor.com/
  • Feb 23

    Finalized New York Department of Financial Services Cybersecurity Regulation to Take Effect March 1

    Finalized New York Department of Financial Services Cybersecurity Regulation to Take Effect March 1
    On February 16, 2017, the New York Department of Financial Services (NYDFS) announced the release of its finalized Cybersecurity Requirements for Financial Services Companies (“Cybersecurity Regulation”), which will take effect on…
  • Jan 27

    Will the proposed “Countering Russian Hostilities Act” stop Russian cyberattacks?

    Will the proposed “Countering Russian Hostilities Act” stop Russian cyberattacks?
    On Jan. 10, 2017, a bipartisan group of five Republican and five Democratic senators announced their support for the Countering Russian Hostilities Act of 2017. Lindsey Graham, one of the senators who announced the proposed legislation, told…
  • Jan 26

    FINRA Seeks Comment on Blockchain

    FINRA Seeks Comment on Blockchain
    On Jan. 18, 2017, the Financial Industry Regulatory Authority (FINRA) became the latest organization to weigh in on distributed ledger technology (DLT), also known as blockchain. Recognizing the growing interest and potential benefits…
Rank this Week: 4048

Cyberinsurance Law Blog

Cyberinsurance Law Blog

News and comments on Business Law. By Dilworth Paxson L.L.P.

http://www.databreachninja.com/
  • Feb 23

    “3 Tips for Public Pension Funds”

    “3 Tips for Public Pension Funds”
    On Tuesday, I was privileged to be part of a panel discussing cyberinsurance for public pension funds at Kessler Topaz’s Evolving Fiduciary Obligations for Institutional Investors conference, joining Victoria Hale, General Counsel of…
  • Feb 2

    “Unfortunately, This Will Get Physical”

    “Unfortunately, This Will Get Physical”
    There have been relatively few confirmed cyber attacks resulting in substantial physical harm to property (other than computer hardware) and people.  The first known event involved the 2008-2010 infiltration of a computer virus called…
  • Jan 19

    “Carriers and Brokers Filling the Coverage Gaps”

    “Carriers and Brokers Filling the Coverage Gaps”
    Stand-alone cyberinsurance is a critical component of enterprise risk management.  But even companies with traditional and cyber coverage may, and usually do, have gaps in coverage created by what I’ve referred to as the ‘hot…
Rank this Week: 3032

Data Protection Report

Data Protection Report

Covers global privacy, data protection and cybersecurity regulatory and litigation environment. By Norton Rose Fulbright.

http://www.dataprotectionreport.com/
  • Feb 23

    US Government Contractors Now Required to Train Employees on Privacy

    US Government Contractors Now Required to Train Employees on Privacy
    Effective January 19, 2017,  an update to the Federal Acquisition Regulation (FAR) will require certain contractors that provide services to the federal government to train their employees on privacy.  New contracts into which the…
  • Feb 19

    UK Court of Appeal Rules that Exemptions to Access Rights are Construed Narrowly

    UK Court of Appeal Rules that Exemptions to Access Rights are Construed Narrowly
    Under the UK Data Protection Act 1998 (“DPA“), data subjects have rights to obtain copies of their personal information through a data subject access request (“DSAR“). Data subjects frequently use DSARs to obtain…
  • Feb 7

    Settlement of Target Data Breach Consumer Class Action Is Derailed On Appeal

    Settlement of Target Data Breach Consumer Class Action Is Derailed On Appeal
    The Eighth Circuit Court of Appeals last week reversed the district court’s approval of a settlement and settlement class in the consolidated consumer class action arising from Target Corporation’s 2013 security incident. …
Rank this Week: 1926

Workplace Privacy, Data Management…

Workplace Privacy, Data Management & Security Report

Covers data security, HIPAA, identity theft and workplace privacy. By Jackson Lewis.

http://www.workplaceprivacyreport.com
  • Feb 21

    $3.2M Fine for Failure to Protect Electronic Record

    $3.2M Fine for Failure to Protect Electronic Record
    The Department of Health and Human Services Office of Civil Rights (“OCR”) fined a Texas hospital $3.2 million for its impermissible disclosure of unsecured electronic protected health information (ePHI) and non-compliance over…
  • Feb 14

    Expert Insights on Developing a Physical Security Program

    Expert Insights on Developing a Physical Security Program
    In today’s digital age, security tends to be thought about in terms of firewalls, malware, encryption and other safeguards for electronic systems. But the security of those systems, as well as an organization’s…
  • Feb 12

    GPS Tracking and Smartphone Apps – Get Consent!

    GPS Tracking and Smartphone Apps – Get Consent!
    With the proliferation of satellite navigation systems and smart phones, many employers have contemplated using GPS tracking to increase efficiency, and frankly, to keep a better eye on their employees during the work day. The use of GPS…
Rank this Week: 4789

Privacy and IP Law Blog

Privacy and IP Law Blog

Addresses recent events in trademark, copyright, computer and privacy law. By Christina Frangiosa.

http://privacyandiplawblog.com/
  • Feb 20

    USPTO Requests Comment on Draft Examination Guide for Matter “Incapable” of Registration

    USPTO Requests Comment on Draft Examination Guide for Matter “Incapable” of Registration
    This post examines the USPTO's draft Examination Guide on Incapable Informational Matter - essentially matter that is not capable of federal trademark registration because it cannot function as a trademark. The Draft Guide focused on three…
  • Nov 28

    Common Questions – Can I Copyright My Formula?

    Common Questions – Can I Copyright My Formula?
    Probably not. No matter how new a formula (a.k.a. recipe) may be, if it simply comprises a combination of ingredients mixed together to form a new and unique dish, it is not likely to be copyrightable. And, once published, even if the recipe…
  • Nov 17

    Common Questions: What’s the Difference Between a Trademark and a Service Mark?

    Common Questions: What’s the Difference Between a Trademark and a Service Mark?
    This is actually a trick question – the answer is, “not much”. Generally, trademarks refer to source-identifying marks used in connection with goods (products) and service marks are used for the same purpose, but in…
Rank this Week: 4644

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
  • Feb 20

    Trends in behavioral advertising: What you need to know about cross-device tracking

    Trends in behavioral advertising: What you need to know about cross-device tracking
    The Federal Trade Commission (FTC) recently issued a staff report (available here) on the trend to link consumers’ online behavior across multiple devices. Among other recommendations, the FTC suggests that companies not track sensitive…
  • Feb 13

    Supreme Court to consider international patent exhaustion

    Supreme Court to consider international patent exhaustion
    Four years after fully embracing international copyright exhaustion in Kirtsaeng v. John Wiley & Sons, Inc., the U.S. Supreme Court has finally taken up the issue of patent exhaustion. In Impression Products, Inc. v. Lexmark International…
  • Jan 31

    Why HIPAA Compliance Matters: How a “small” breach can yield a large fine

    Why HIPAA Compliance Matters: How a “small” breach can yield a large fine
    The new year continues as the old ended, with HIPAA enforcement actions. On Jan. 11, 2017, MAPFRE Life Insurance Company of Puerto Rico (MAPFRE Life) entered into a Resolution Agreement with the United States Department of Health and Human…
Rank this Week: 2914

Privacy Law Blog

Privacy Law Blog

Covers data privacy, identity theft, invasion of privacy, and national security legal issues. By Proskauer Rose LLP.

http://privacylaw.proskauer.com/
  • Feb 16

    Kingdom in the Cloud: Saudi Arabia’s Draft Cloud Computing Regulation

    Kingdom in the Cloud: Saudi Arabia’s Draft Cloud Computing Regulation
    Courtney M. Bowman Proskauer litigation associate Courtney Bowman and Jonathan Reardon, head of the Al Khobar, Saudi Arabia office of the Middle East-based firm Al Tamini & Co., recently co-authored an article published by Bloomberg about…
  • Jan 30

    Qatar’s New Personal Data Privacy Law

    Qatar’s New Personal Data Privacy Law
    Courtney M. Bowman At the end of last year, Qatar became the first Gulf state to enact a comprehensive privacy law. Until now, the many companies that market to consumers or have employees based in Gulf Cooperation Council (GCC) countries…
  • Jan 25

    Draft Privacy and Electronic Communications Regulation published by European Commission

    Draft Privacy and Electronic Communications Regulation published by European Commission
    Kelly McMullon The European Commission has released proposals for new legislation that seeks to create stronger privacy in electronic communications. The draft Privacy and Electronic Communications Regulation (the “Regulation”) is…
Rank this Week: 4609

Information Technology Law Blog

Information Technology Law Blog

Covers social media, e-discovery, privacy, and intellectual property. By Foster Swift Collins & Smith PC.

http://www.michiganitlaw.com/
  • Feb 15

    Fiduciary Rule update: the beginning of the end?

    Fiduciary Rule update: the beginning of the end?
    Shortly after our first article on the DOL Fiduciary Rule the White House issued an Executive Order that requires the Department of Labor (the "DOL") to revisit the Fiduciary Rule (the "Fiduciary Rule" or the "Rule") and the Prohibited…
  • Feb 7

    5 Tips for Investigating and Purchasing Cyber Insurance

    5 Tips for Investigating and Purchasing Cyber Insurance
    In 2016 Lansing, MI's Board of Water and Light fell victim to a cyber-attack that resulted in $2.4 million in costs, including a $25,000 ransom paid to the perpetrators. In the aftermath of the breach, BWL announced that it was filing for a…
  • Jan 31

    The New Fiduciary Rule and its Future

    The New Fiduciary Rule and its Future
    With a sea of political change in Washington this year, many are speculating on what regulatory reforms the Trump administration and a Republican Congress will make in 2017. One reform in particular is commonly mentioned: a repeal, delay, or…
Rank this Week: 3623

Global Regulatory Enforcement Law…

Global Regulatory Enforcement Law Blog

Covers antitrust, privacy, international trade, and white color criminal defense. By Reed Smith.

http://www.globalregulatoryenforcementlawblog.com
  • Feb 10

    Private Equity Firm Held Responsible for Portfolio Company’s Antitrust Violation

    Private Equity Firm Held Responsible for Portfolio Company’s Antitrust Violation
    In January of 2017 a private equity firm, Bencis, was found liable for a portfolio company’s involvement as one of 14 cartelists producing flour in the Netherlands, Belgium, and Germany. The Authority for Consumers and Markets (ACM)…
  • Feb 10

    2017 Expectations of the U.S. CFTC Enforcement Agenda

    2017 Expectations of the U.S. CFTC Enforcement Agenda
    The U.S. Commodity Futures Trading Commission is undergoing a transformation with the new Trump administration while staying on course with its statutory mission of protecting US commodities and derivatives markets.  Some of CFTC’s…
  • Feb 10

    Iran Missile Test Leads to New Sanction

    Iran Missile Test Leads to New Sanction
    On February 2nd the Office of Foreign Assets Control (“OFAC”) imposed new sanctions on 13 individuals and 12 entities that were believed to be “involved in procuring technology and/or materials to support Iran’s…
Rank this Week: 3182

Information Law Group

Information Law Group

Covers advertising law, privacy, information security and intellectual property.

http://www.infolawgroup.com/
  • Feb 9

    InfoLawGroup Launches CPO on Demand™ Service

    InfoLawGroup Launches CPO on Demand™ Service
    InfoLawGroup announces the launch of CPO on Demand™, a service through which we serve as outside Chief Privacy Officers, Privacy Counsel, and DPOs as required under EU regulation. CPO on Demand™ brings the depth and breadth of our…
  • Feb 7

    FTC and NJ AG Reach $2.2 Million Settlement to Resolve Vizio Video Privacy Matter

    FTC and NJ AG Reach $2.2 Million Settlement to Resolve Vizio Video Privacy Matter
    On Monday, February 6, 2017, the Federal Trade Commission (“FTC”) and New Jersey Attorney General (“NJAG”) announced a settlement agreement to resolve their joint enforcement action against Vizio. The regulators…
  • Feb 2

    NJ TCCWNA Claim Thwarted by CA Choice-of-Law Provision

    NJ TCCWNA Claim Thwarted by CA Choice-of-Law Provision
    As we have previously written about, 2016 saw a wave of litigation brought under New Jersey’s Truth-in-Consumer Contracting, Warranty, and Notice Act (“TCCWNA”) regarding website Terms of Use.  While service…
Rank this Week: 3579

Cybersecurity Lawyer Forum

Cybersecurity Lawyer Forum

Covers business and privacy law. By Jeffer Mangels Butler & Mitchell LLP.

http://cybersecurity.jmbm.com/
  • Feb 8

    Cybersecurity and Ransomware – It can get ugly when a hacker takes control of your smart building

    Cybersecurity and Ransomware – It can get ugly when a hacker takes control of your smart building
    Cyber risk affects businesses of every size and industry. A data breach can lead to negative publicity, loss of customer confidence and potential lawsuits. There can be a variety of unanticipated – and costly – business…
  • Dec 28

    Risk Assessment – the Key to Risk Management

    Risk Assessment – the Key to Risk Management
    One of the great frustrations in contemplating a data security program is that there is no such thing as a one-size-fits-all solution.  There is no law or regulation that specifies the exact steps a company needs to take in order achieve…
  • Dec 12

    Cybersecurity Law in 2017 – Predictions and Prognostication

    Cybersecurity Law in 2017 – Predictions and Prognostication
    December is the month for predictions.  During this month, commentators of all sorts and in all areas predict the trends and actions that will impact us during the coming year.  While speculating the future is a questionable…
Rank this Week: 1715

Fair Competition Law Blog

Fair Competition Law Blog

Covers trade secrets, noncompetes, privacy and security, the Computer Fraud and Abuse Act, trademarks, copyrights, and business torts. By Russell Beck.

http://faircompetitionlaw.com
  • Feb 4

    Trade Secrets Laws and the UTSA – A 50 State and Federal Law Survey Chart (revised)

    Trade Secrets Laws and the UTSA – A 50 State and Federal Law Survey Chart (revised)
    Every state but Massachusetts and New York has adopted the Uniform Trade Secrets Act (the UTSA) in one form or another – though some may quibble with whether Alabama or North Carolina actually adopted it. (The Uniform Law…
  • Feb 4

    BRR 50-State Noncompete Chart (Updated Today)

    BRR 50-State Noncompete Chart (Updated Today)
    The BRR 50 State Noncompete Chart has been updated to reflect a few developments and to make a few tweaks since the last draft. Most significantly, Georgia surprised many (me included) with its decision that the 2011…
  • Feb 1

    Trade Secret and Noncompete Survey – National Case Graph 2017

    Trade Secret and Noncompete Survey – National Case Graph 2017
    As regular readers of this blog know, several years ago, I became curious to see how many reported trade secret / noncompete decisions were issued each year in all federal and state courts around the country. So, I did a “back of the…
Rank this Week: 3470

Hunton Retail Law Resource Blog

Hunton Retail Law Resource Blog

Analysis and Insight in Retail Law

https://www.huntonretailindustryblog.com/
  • Feb 1

    FTC Issues Report on Cross-Device Tracking

    FTC Issues Report on Cross-Device Tracking
    On January 23, 2017, the FTC released a Staff Report on cross-device tracking technology that can link multiple Internet-connected devices to the same person and track that person’s activity across those devices. The Report follows a…
  • Jan 31

    Consumer Protection in Retail: Weekly Roundup

    Consumer Protection in Retail: Weekly Roundup
    This past week, several consumer actions made headlines that affect the retail industry. Continue reading for our weekly roundup. … Continue Reading
  • Jan 26

    Why Lawyers Can’t Give Straight Answers About Product Regulatory and Recall Risk (Part 3)

    Why Lawyers Can’t Give Straight Answers About Product Regulatory and Recall Risk (Part 3)
    Kelly Faglioni, a partner in Hunton’s Product Liability group, authored an article identifying and discussing approaches for managing risk that arises from complexity and ambiguity in product regulatory schemes including approaches to…
Rank this Week: 1771

sobre privacidad y protección de…

sobre privacidad y protección de datos

Spanish language blog about privacy and data protection. By Daniel A. Lopez Carballo.

http://www.dlcarballo.com/
Rank this Week: 3750

LegalTXTS

LegalTXTS

Covers law and technology, with an emphasis on legal issues regarding digital media, privacy and data security, and information management. By Elijah Yip.

http://www.legaltxts.com/
  • Jan 25

    The Tax Scams Cometh

    The Tax Scams Cometh
    Tax season is miserable for many because it means having to cut a check to the IRS.  But it’s not just Uncle Sam who’s interested in your money.  Scammers are also looking to get paid, and they’ll do it by stealing…
  • Oct 26

    Police officer suspended for controversial Facebook posts allowed to go to trial on First Amendment retaliation claim

    Police officer suspended for controversial Facebook posts allowed to go to trial on First Amendment retaliation claim
    It’s generally a good practice to set standards of online employee conduct to prevent the social media activity of employees from disrupting the workplace or tarnishing your organization’s reputation.  But the mere fact that…
  • Sep 21

    Six Years Later, NLRB’s Social Media Guidelines Still Confound

    Six Years Later, NLRB’s Social Media Guidelines Still Confound
    Six years ago, the National Labor Relations Board (NLRB) became one of the first governmental agencies to regulate social media use in the workplace.  In 2010 and 2011, the NLRB issued a series of guidance memos and decisions sketching…
Rank this Week: 1983

Privacy and Data Security Law

Privacy and Data Security Law

Covers the creation, collection, use, destruction and security of data. By Dentons.

http://www.privacyanddatasecuritylaw.com/
  • Dec 21

    Private Right of Action under CASL coming July 2017

    Private Right of Action under CASL coming July 2017
    Canada’s Anti-Spam Law came into force on July 1, 2014.  Since then, all eyes have been on the Canadian Radio-television and Telecommunications Commission (CRTC) for decisions concerning CASL violations. …
  • Dec 3

    HHS Issues Warning About Phishing Campaign Disguised As Official Communication

    HHS Issues Warning About Phishing Campaign Disguised As Official Communication
    As part of its efforts to assess compliance with the HIPAA Privacy, Security and Breach Notification Rules, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) engages in audits of covered entities and their…
  • Nov 23

    FTC Announces New Guidance on Ransomware

    FTC Announces New Guidance on Ransomware
    On November 10, 2016, the U.S. Federal Trade Commission (FTC) released new guidance for businesses and consumers on the impact of, and how to respond to ransomware.  Ransomware is a form of malicious software that infiltrates computer…
Rank this Week: 1501

Data Security Law Journal

Data Security Law Journal

Covers data security, cloud computing, data privacy and anything E. By Al Saikali.

http://www.datasecuritylawjournal.com/
  • Dec 11

    Law Firm Data Security: The First Class Action

    Law Firm Data Security: The First Class Action
    Earlier this year, Bloomberg Law reported that Edelson PC, a leading plaintiffs’ firm in privacy and data security law, filed a class action lawsuit against a regional law firm that had vulnerabilities in its information security…
  • Jun 22

    The SEC Makes Clear There is No Room For Error in Cybersecurity

    The SEC Makes Clear There is No Room For Error in Cybersecurity
    The SEC recently agreed to a $1,000,000 settlement of an enforcement action against Morgan Stanley for its failure to have sufficient data security policies and procedures to protect customer data. The settlement was significant for its…
  • Mar 9

    Understanding EMV Payment Card Technology

    Understanding EMV Payment Card Technology
    A significant change is happening to payment card technology. Any company that accepts credit cards as a form of payment needs to know about it if they intend to continue accepting payment cards in the future. The technology is called…
Rank this Week: 4293

Data Breach Lawyer Blog

Data Breach Lawyer Blog

Covers intellectual property law. By Raines Feldman.

http://www.databreachlawyerblog.com/
  • Oct 24

    Trade Secrets and Internet Scraping

    Trade Secrets and Internet Scraping
    Recently, our cyber liability team discussed the impact internet data scraping has had upon trade secrets litigation.  Trade secrets cases are tough to win as plaintiffs.  The availability of competitive data online presents…
  • Oct 24

    Trade Secrets and Internet Scraping

    Trade Secrets and Internet Scraping
    Recently, our cyber liability team discussed the impact internet data scraping has had upon trade secrets litigation.  Trade secrets cases are tough to win as plaintiffs.  The availability of competitive data online presents…
  • Aug 30

    Be Mindful of Statute of Limitations for Internet Defamation

    Be Mindful of Statute of Limitations for Internet Defamation
    Often, data breaches are associated with internet defamation or other torts like impersonation.  Many times we come across strong defamation cases that cannot proceed because the potential client has waited too long to take action.…
Rank this Week: 2999

German IT Law

German IT Law

Provides updates and analysis on German and European IP/IT, technology, media and (open source) software law. By JBB Rechtsanwälte.

http://germanitlaw.com/
Rank this Week: 1966

SullivanLawNet

SullivanLawNet

Legal news and analysis, with an emphasis on international and domestic intellectual property developments. By Shawn Sullivan.

http://sullivanlaw.net/
  • Jun 20

    EU Court: 3-D Toothbrush Shape not Registrable as Trademark

    EU Court: 3-D Toothbrush Shape not Registrable as Trademark
    In Loops, LLC v EUIPO, Case T‑385/15 (14 June 2016), the General Court of the European Union held that held that the three dimensional shape of a toothbrush lacked any distinctive character and could not be registered as an EU ……
  • May 31

    Court Refuses Interim Order in Strawberry Licensing Case

    Court Refuses Interim Order in Strawberry Licensing Case
    A U.S. district judge has refused to enter a temporary restraining order (TRO) against the University of California, Davis in litigation contesting the university’s alleged refusal to transfer or license strawberry germplasm developed…
  • May 12

    Prison Term for PVP Infringement by Alleged Wheat Bandit

    Prison Term for PVP Infringement by Alleged Wheat Bandit
    On 14 April 2016, a criminal court in the Spanish city of Segovia sentenced an individual to a six month prison term for infringing the plant variety protection (PVP) rights of Limagrain Europe SA in the soft wheat variety known as…
Rank this Week: 3011

Trials and Tribulations

Trials and Tribulations

Covers the Elvey v. TDAmeritrade case concerning information security, spam and identity theft.

http://caringaboutsecurity.wordpress.com
  • May 6

    Looking back

    Looking back
    This is a response to DataLossDB blog post Legal Sub-Project – Elvey v. TD Ameritrade by jkouns on June 14, 2009 You ask some tough questions, and I have answers!  This is Elvey.  I filed the case. I was not aware of this post…
  • Jul 3

    Advice for TD Ameritrade from Tim Devaney and Tom Stein

    Advice for TD Ameritrade from Tim Devaney and Tom Stein
    TD Ameritrade’s PR flacks think this is bad advice on how to handle haters, I guess.Filed under: Settlement Component
  • Jun 13

    Settlement Valuation

    Settlement Valuation
    Judge Walker repeatedly asked the former class counsel to place a value on the benefits the rejected settlement offered to the class. I think it’s doable, and no one has truly done so, so I’m going to give it a shot. The audit…
Rank this Week: 4234

Beyond Telecom Law Blog

Beyond Telecom Law Blog

Covers telecom policy, services agreements and data security/privacy. By Keller and Heckman LLP.

http://www.beyondtelecomlawblog.com
  • Apr 25

    "Section 6409 vs. Reality"-- A Panel Discussion at the Wireless West Conference

    "Section 6409 vs. Reality"-- A Panel Discussion at the Wireless West Conference
    I had the pleasure of speaking at the first annual Wireless West Conference in Anaheim, CA on April 20. Wireless West was organized and managed by five state wireless associations—Arizona, California, Colorado, Nevada, and Northwest…
  • Apr 18

    The Industrial Internet - Legal Issues and Procurement Implications--A Series; Part 1--Overview

    The Industrial Internet - Legal Issues and Procurement Implications--A Series; Part 1--Overview
    This is the first entry in a series on the “Industrial Internet,” focusing on the basic elements, legal issues and procurement implications, principally from the perspective of the end user. The term is used to distinguish…
  • Apr 4

    Another FirstNet Milestone

    Another FirstNet Milestone
      Another marker passed on the FirstNet roadmap last week as Capability Statements from bidders interested in building, operating and maintaining the Nationwide Public Safety Broadband Network were submitted March 31, 2016. Final bids…
Rank this Week: 3101

Dot Indicia

Dot Indicia

Covers information, privacy and security from a Canadian perspective. By Michael Power.

http://michaelpower.ca
  • Feb 22

    Corporate Activism In the Protection of Privacy

    Corporate Activism In the Protection of Privacy
    Just how far is business supposed to go in protecting privacy? In the United States, one can starkly see an example with Apple and the retrieval of encrypted iPhone data. But a recent Canadian case also shines a spotlight on the role of the…
  • Jan 27

    Another New Privacy Tort for Ontario

    Another New Privacy Tort for Ontario
    Last week saw a rather striking decision issued by the Ontario Superior Court of Justice. 2102 saw the tort of “intrusion upon seclusion” recognized; in 2016, we now have the tort of “public disclosure of private…
  • Jan 19

    New Privacy Tort Empowers “Revenge Porn” Victim

    New Privacy Tort Empowers “Revenge Porn” Victim
    Manitoba’s Intimate Image Protection Act came into force on 15 January 2016. The statute does something that I think is especially noteworthy – it creates a new privacy tort concerning the “non-consensual distribution of…
Rank this Week: 3340

CyberLaw Currents

CyberLaw Currents

Covers technology news headlines, statutes, and case law developments related to e-commerce, privacy, advertising, and intellectual property. Edited by Glen K. Westerback.

http://www.cyberlawcurrents.com
Rank this Week: 3474

Georgia Internet Law

Georgia Internet Law

Provides information and commentary regarding Internet law, e-commerce and technology law, World Wide Web regulation, and intellectual property. By Richardson Sixth, LLC.

http://georgiainternetlaw.com/
  • Nov 28

    Bitcoin and Consumer Protection Measures in Digital Currency

    Bitcoin and Consumer Protection Measures in Digital Currency
    This is another in a series of posts focused on the first state regulation of cryptocurrency businesses.  Ostensibly, depending on one’s opinion, the New York BitLicense regulation of bitcoin (and digital currency businesses…
  • Nov 2

    The Bitcoin Business State License Requirement: BitLicense

    The Bitcoin Business State License Requirement: BitLicense
    The last post in this series by Atlanta Bitcoin attorney Mark Richardson VI familiarized the reader with the regulatory vernacular of the New York BitLicense law now in effect.  Let’s now examine to whom exactly that license…
  • Oct 19

    BitLicense Legal Regulations: What are We Talking About?

    BitLicense Legal Regulations: What are We Talking About?
    Here’s the first installment of a Crypto-Counsel ℠ series on the New York State Department of Financial Services (“NYDFS“) “BitLicense” regulations applicable to digital currency businesses (the…
Rank this Week: 3786

Business Litigation Info

Business Litigation Info

Covers business litigation, intellectual property, data security, and advertising and media. By Faruki Ireland & Cox P.L.L.

http://www.businesslitigationinfo.com/
  • Nov 24

    NOVEMBER 2015 FI&C WEBSITE NEWSLETTER

    NOVEMBER 2015 FI&C WEBSITE NEWSLETTER
    *     On September 17, 2015, Jeff Ireland and Jade Smarda, obtained a temporary restraining order on behalf of a local financial services firm in a trade secrets case. *     Jeff Sharkey and…
  • Nov 20

    Be Cautious When Social Networking is All “Atwitter “at Your Workplace

    Be Cautious When Social Networking is All “Atwitter “at Your Workplace
    We use social media all the time. Make it a point during the day to notice how often you see a friend or colleague checking a Facebook update or sending a tweet (or giving you a three-star rating on the new Peeple app).  People are on…
  • Nov 16

    Cybersecurity Information Sharing Act: The Devil Lurks and the Road to His House Appears Well Paved

    Cybersecurity Information Sharing Act: The Devil Lurks and the Road to His House Appears Well Paved
    Best Laid Plans. They say the devil is in the details. One might say that is most certainly the case with the recently advanced version of the Cybersecurity Information Sharing Act (“CISA”) that recently passed the U.S. Senate by…
Rank this Week: 3834