Most Popular Privacy Law Blawgs Expanded View List View

Blogs 1 - 45 of 55
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Privacy & Information Security…

Privacy & Information Security Law Blog

Provides global privacy and information security law updates and analysis. By Hunton & Williams.

http://www.huntonprivacyblog.com/
Rank this Week: 99

Inforrm's Blog

Inforrm's Blog

Discusses issues of media law and responsibility with a special focus on libel and privacy law and the balance between the two.

http://inforrm.wordpress.com
Rank this Week: 229

Clancco: Art & Law

Clancco: Art & Law

Covers the relationship between art and law with a focus on intellectual property, nonprofit tax-exempt organizations, free speech, and contemporary art. By Sergio Muñoz Sarmiento.

http://clancco.com/wp
Rank this Week: 324

US Law Watch

US Law Watch

Provides US legal and regulatory information. By BNA International.

http://www.uslawwatch.com
Rank this Week: 387

Copyright, Intellectual Property,…

Copyright, Intellectual Property, Computer, Internet, e-Commerce Law

Covers IP/IT law, with a strong focus on copyright and internet law. By Barry Sookman.

http://www.barrysookman.com
  • Apr 18

    Computer and Internet Law Updates for 2014-04-17

    Computer and Internet Law Updates for 2014-04-17
    Conviction under DMCA for selling mod chips US v. SILVIUS, Court of Appeals, 6th Circuit 2014 http://t.co/qw8bs0GNAv -> Right to publish by electronic means includes ebooks HARPERCOLLINS v. OPEN ROAD INTEGRATED SD New York 2014…
  • Apr 17

    Computer and Internet Law Updates for 2014-04-16

    Computer and Internet Law Updates for 2014-04-16
    Premier League drops copyright infringement case against YouTube http://t.co/ZXQqZOGLz1 -> All sent and received e-mails in Gmail will be analyzed, says Google http://t.co/hG71XrEZmI -> Do Patents Truly Promote Innovation?…
  • Apr 16

    Computer and Internet Law Updates for 2014-04-15

    Computer and Internet Law Updates for 2014-04-15
    What is use of a trade mark in the internet context? McMillan LLP v http://t.co/Qg3hLmt1TO, Inc, 2014 TMOB 51 http://t.co/1sks1olqKI -> 1 in 5 U.S. internet users have had sensitive data stolen http://t.co/2750asDQaF -> Illegal download…
Rank this Week: 428

Privacy and Security Law Blog

Privacy and Security Law Blog

Covers biometrics, HIPAA, identity theft, PATRIOT Act, phishing and more. By Davis Wright Tremaine.

http://www.privsecblog.com/
Rank this Week: 526

Socially Aware Blog

Socially Aware Blog

Covers the law and business of social media. By Morrison Foerster.

http://www.sociallyawareblog.com/
Rank this Week: 488

Inside Privacy

Inside Privacy

Covers global privacy and data security. By Covington & Burling LLP.

http://www.insideprivacy.com
  • Apr 23

    European Regulators Set Out Data Anonymization Standard

    European Regulators Set Out Data Anonymization Standard
    By Kristof van Quathem and Dan Cooper On April 10, 2014, the Article 29 Working Party adopted an Opinion on anonymization techniques.  The Working Party accepts that anonymization techniques can help individuals and society reap the…
  • Apr 21

    Ten Things You Should Know About the SEC's New Cybersecurity Examination

    Ten Things You Should Know About the SEC's New Cybersecurity Examination
    Last week, the Securities and Exchange Commission announced that it will conduct more than 50 cybersecurity examinations to identify risks and ensure that broker-dealers and investment advisers are adequately protecting customer…
  • Apr 21

    FTC Seeking Additional Public Comment on Mobile Security

    FTC Seeking Additional Public Comment on Mobile Security
    Following up on a June 2013 forum on mobile security, the Federal Trade Commission (“FTC”) announced last week that it is seeking public comment to “expand the record on these issues with an eye towards [producing] a…
Rank this Week: 783

Information Law Group

Information Law Group

Covers advertising law, privacy, information security and intellectual property.

http://www.infolawgroup.com/
Rank this Week: 937

Advertising Law Blog

Advertising Law Blog

Provides commentary and news on developing legal issues in advertising, promotional marketing, Internet, and privacy law. By Olshan Frome Wolosky LLP.

http://www.olshanlaw.com/blogs-Advertising-Law-Blog
Rank this Week: 1085

Global Regulatory Enforcement Law…

Global Regulatory Enforcement Law Blog

Covers antitrust, privacy, international trade, and white color criminal defense. By Reed Smith.

http://www.globalregulatoryenforcementlawblog.com
  • Apr 23

    Domain Dispatches: NETmundial Is Right Around The Corner

    Domain Dispatches: NETmundial Is Right Around The Corner
    On Wednesday, April 23, 2014, Sao Paulo, Brazil will host NETmundial – the Global Multistakeholder Meeting on the Future of Internet Governance. Approximately 800 people will descend on Sao Paulo to spend two days and nights discussing,…
  • Apr 17

    Federal Circuit Decision Settles GAO/COFC Split on Agency's Use of Cooperative Agreement

    Federal Circuit Decision Settles GAO/COFC Split on Agency's Use of Cooperative Agreement
    This post was written by Carlos A. Valdivia and Gunjan Talati. In March, the Federal Circuit settled a split between the Government Accountability Office ("GAO") and the Court of Federal Claims that focused on the gray area between…
  • Apr 16

    DC Circuit Invalidates Conflict Mineral Reporting Regulation

    DC Circuit Invalidates Conflict Mineral Reporting Regulation
    This post was written by Jeffrey Orenstein. This week the U.S. Court of Appeals for the D.C. Circuit held that the Security and Exchange Commission’s (“SEC”) final rule concerning “conflict mineral” disclosures…
Rank this Week: 1525

HIPAA Blog

HIPAA Blog

Features a discussion of medical privacy. By Jeffrey P. Drummond.

http://hipaablog.blogspot.com/
Rank this Week: 1485

Fair Competition Law Blog

Fair Competition Law Blog

Covers trade secrets, noncompetes, privacy and security, the Computer Fraud and Abuse Act, trademarks, copyrights, and business torts. By Russell Beck.

http://faircompetitionlaw.com
  • Apr 21

    What to do if noncompetes are eliminated in Massachusett

    What to do if noncompetes are eliminated in Massachusett
    As you likely have seen (here for example), the Patrick Administration has spent a great deal of time putting together comprehensive proposed legislation designed to promote growth and opportunity in Massachusetts. Of particular note has…
  • Feb 26

    New Trade Secrets Study by PwC and CREATEe.org

    New Trade Secrets Study by PwC and CREATEe.org
    For those interested in the economics and policies behind trade secrets, PricewaterhouseCoopers and The Center for Responsible Enterprise & Trade (CREATe.org) have issued a detailed report on the economic impact of trade secret…
  • Jan 11

    Trade Secrets and Noncompetes – Year in Review 2013

    Trade Secrets and Noncompetes – Year in Review 2013
    This past week, the Boston Bar Association held its 14th annual Intellectual Property Year in Review. I covered trade secrets (including related restrictive covenants). Below is a summary of those developments. (If you would like a complete…
Rank this Week: 1334

Workplace Privacy, Data Management…

Workplace Privacy, Data Management & Security Report

Covers data security, HIPAA, identity theft and workplace privacy. By Jackson Lewis.

http://www.workplaceprivacyreport.com
Rank this Week: 1973

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
Rank this Week: 1560

LegalTXTS

LegalTXTS

Covers law and technology, with an emphasis on legal issues regarding digital media, privacy and data security, and information management. By Elijah Yip.

http://www.legaltxts.com/
Rank this Week: 1617

Chronicle of Data Protection

Chronicle of Data Protection

Covers consumer privacy, data security, HIPAA, financial privacy and EU privacy. By Hogan Lovells.

http://www.hldataprotection.com
  • Apr 18

    DOJ and FTC Clarify Antitrust Implications of Cybersecurity Information Sharing

    DOJ and FTC Clarify Antitrust Implications of Cybersecurity Information Sharing
    On April 10, 2014, the Department of Justice and Federal Trade Commission issued a joint policy statement on the antitrust implications of sharing cybersecurity information to help facilitate the flow of cyberintelligence throughout the…
  • Apr 14

    HHS Releases Security Risk Assessment Tool

    HHS Releases Security Risk Assessment Tool
    The U.S. Department of Health and Human Services (HHS) recently released a security risk assessment (SRA) tool as a resource to assist health care providers in complying with the Health Insurance Portability and Accountability Act (HIPAA)…
  • Apr 9

    ECJ Declares Data Retention Directive Invalid

    ECJ Declares Data Retention Directive Invalid
    In a decision rendered on 8 April 2014, the European Court of Justice (ECJ) declared the Data Retention Directive invalid. The Court's decision was grounded on its conclusion that, by requiring the retention of the data falling within the…
Rank this Week: 1981

Business Litigation Info

Business Litigation Info

Covers business litigation, intellectual property, data security, and advertising and media. By Faruki Ireland & Cox P.L.L.

http://www.businesslitigationinfo.com/
Rank this Week: 1610

Data Privacy Monitor

Data Privacy Monitor

Covers data privacy, security and social media subjects. By Baker Hostetler.

http://www.dataprivacymonitor.com/
  • Apr 16

    Iowa Breach Notification Law Now Requires AG Notification, Applies to Paper Record

    Iowa Breach Notification Law Now Requires AG Notification, Applies to Paper Record
    Iowa recently joined an increasing number of states that require notification of state regulatory authorities following a breach, as well as a handful of states in which paper records can trigger notification obligations.  On April 3,…
  • Apr 14

    Kentucky Enacts Data Breach Notification Statute

    Kentucky Enacts Data Breach Notification Statute
    On April 10, 2014, Kentucky Governor Steve Beshear signed H.B. 232 into law, making Kentucky the 47th state to enact data breach notification legislation.  Prior to H.B. 232, Kentucky was one of only four states—including Alabama,…
  • Apr 14

    With OpenSSL Compromised by Heartbleed, an Opportunity for Companies to Diversify Cyber Security Effort

    With OpenSSL Compromised by Heartbleed, an Opportunity for Companies to Diversify Cyber Security Effort
    The recent discovery of the “Heartbleed” online bug has sent shockwaves through the internet, causing companies and individuals alike to question very basic assumptions about cyber security. The bug has allegedly existed for…
Rank this Week: 1628

Security, Privacy and The Law

Security, Privacy and The Law

Covers information security and privacy issues. By Foley Hoag LLP.

http://www.securityprivacyandthelaw.com
  • Apr 15

    Does Wyndham Confirm the FTC’s Role as Federal Privacy Enforcer?

    Does Wyndham Confirm the FTC’s Role as Federal Privacy Enforcer?
    by Chris Hart Data breach law in the United States might have just become a lot less patchy, but a little more uncertain.  On April 7, 2014, the District Court of New Jersey decided FTC v. Wyndham Worldwide Corp., et al., No.…
  • Apr 11

    FTC Provides Guidance on Heartbleed

    FTC Provides Guidance on Heartbleed
    I usually do not re-post directly from the FTC, but given the timeliness of the subject, the wide impact of the problem and the technical nature of the issue, I thought it was warranted to re-post the FTC’s guidance on…
  • Apr 11

    SEC Hosts Cybersecurity Roundtable

    SEC Hosts Cybersecurity Roundtable
    By Catherine Anderson Cybersecurity remains a hot topic for regulators, including the Securities and Exchange Commission (SEC).  On March 26, 2014, the SEC hosted a roundtable to discuss cybersecurity and the issues and challenges…
Rank this Week: 2353

Peter Fleischer: Privacy...?

Peter Fleischer: Privacy...?

Covers privacy law and corporate privacy policy. By Peter Fleischer, Global Privacy Counsel for Google.

http://peterfleischer.blogspot.com/
  • Apr 6

    From pool to pool

    From pool to pool
    I love my pools.    In Paris, my pool is in a fancy private club, in the Bois de Boulogne, on the edge of Paris.  It's a gorgeous 50-meter pool, open year-round outdoors, framed by views of the Eiffel Tower. My pool nurtured…
  • Mar 12

    A Science Fiction Novel

    A Science Fiction Novel
    I'd like to crowd-source the plot for a science fiction novel.  Would this make a good story?:In a not-too-distant future, say 20 years from now, humanity lives through the biggest change in its history.  It doesn't happen…
  • Jan 29

    Hokey Pokey in Sochi

    Hokey Pokey in Sochi
    Czar Vladimir is not your average oligarch who can blow 50 billion to throw himself a party.  But even that much money can't buy you love, with the terrorists plotting to get in, and people with a conscience staying away.…
Rank this Week: 1811

SullivanLawNet

SullivanLawNet

Legal news and analysis, with an emphasis on international and domestic intellectual property developments. By Shawn Sullivan.

http://sullivanlaw.net/
  • Mar 31

    Unintended Consequences of Open Access Publishing Policie

    Unintended Consequences of Open Access Publishing Policie
    Rick Anderson at The Scholarly Kitchen has a thought-provoking article regarding the pressure on authors to publish their academic articles under the most permissive open access licenses available. See Rick Anderson, CC-BY, Copyright, and…
  • Mar 31

    “Twilight” Trademark Infringement Claims Cleared for Trial

    “Twilight” Trademark Infringement Claims Cleared for Trial
    The U.S. District Court for the Southern District of New York ruled that the entertainment company responsible for the “Twilight” film series is entitled to a trial on claims that its trademarks were infringed by a cosmetics…
  • Mar 28

    DC Circuit Upholds USDA Country-of-Origin Rule for Meat Label

    DC Circuit Upholds USDA Country-of-Origin Rule for Meat Label
    In American Meat Institute, Inc. v. United States Department of Agriculture, No. 13-5281 (D.C. Cir. Mar. 28, 2014), the U.S. Court of Appeals for the District of Columbia Circuit rejected industry challenges to a U.S. Department of…
Rank this Week: 1565

Dot Indicia

Dot Indicia

Covers information, privacy and security from a Canadian perspective. By Michael Power.

http://michaelpower.ca
  • Feb 27

    Toronto Hydro Surveillance?

    Toronto Hydro Surveillance?
    I can’t help but think there’s a movie in this somewhere. Love, devotion and allegations of betrayal are all present. Mix in smart meters and privacy and it becomes obvious why I’m blogging about this. It’s quite a…
  • Feb 19

    Health Privacy: Is PHIPA the only game in town?

    Health Privacy: Is PHIPA the only game in town?
    There is a new and interesting decision out of Peterborough that raises but doesn’t answer a lot of questions. These questions revolve around the intersection of PHIPA, class action law and tort law. This is not something you see…
  • Feb 12

    FATCA: Charter Challenge?

    FATCA: Charter Challenge?
    The federal government has now solved a major problem for Canada’s banks by entering into an intergovernmental agreement concerning FATCA with the United States. The details about the privacy implications of FATCA can be found in…
Rank this Week: 2252

Data Governance Law

Data Governance Law

Covers anti-spam, privacy, records retention and e-commerce as related to data governance. By FMC Law.

http://www.datagovernancelaw.com/
  • Feb 24

    Copyright v. Privacy: Voltage Pictures LLC v. John Doe and Jane Doe

    Copyright v. Privacy: Voltage Pictures LLC v. John Doe and Jane Doe
      The recent Federal Court of Canada decision in Voltage Pictures LLC v. John Doe and Jane Doe (2014 FC 161) has already received considerable attention for its approach to deterring so-called “copyright trolls”: plaintiffs…
  • Feb 22

    UK Information Commissioner Reappointed

    UK Information Commissioner Reappointed
    Christopher Graham, the UK Informaton Commissioner, has been reappointed for another two years. This follows from the end of his current term on 28 June 2014. It means he will have served 7 years in total. How time flies! The news came out on…
  • Feb 18

    FTC steps up enforcement action

    FTC steps up enforcement action
    Last week, the FTC announced that it had settled with a gaming company that falsely claimed to be certified under the US Safe Harbor.  The Safe Harbor agreement is a self-certification arrangement under which you can transfer personal…
Rank this Week: 1756

Privacy Law Blog

Privacy Law Blog

Covers data privacy, identity theft, invasion of privacy, and national security legal issues. By Proskauer Rose LLP.

http://privacylaw.proskauer.com/
Rank this Week: 2384

Data Security Law Journal

Data Security Law Journal

Covers data security, cloud computing, data privacy and anything E. By Al Saikali.

http://www.datasecuritylawjournal.com/
  • Dec 30

    The Target Data Breach Lawsuits: Why Every Company Should Care

    The Target Data Breach Lawsuits: Why Every Company Should Care
    Plaintiffs’ lawyers were falling over themselves last week in a race to the courthouse to sue Target as a result of its recent data breach.  By at least one report, over 40 lawsuits have already been filed against Target, the first…
  • Nov 21

    What’s The Next Wave of Privacy Litigation? “Failure to Match”

    What’s The Next Wave of Privacy Litigation? “Failure to Match”
    A client recently asked me to identify the next wave of data privacy litigation.  I said that with so much attention on lawsuits arising from data breaches, particularly in light of some recent... [[ This is a content summary only. Visit…
  • Oct 30

    Yet Another Potential Multimillion-Dollar Data Breach Settlement . . .

    Yet Another Potential Multimillion-Dollar Data Breach Settlement . . .
    Just when you thought it might be safe to go back into the water, another significant data breach lawsuit may be settling.  Last week, I wrote about the proposed settlement in the AvMed lawsuit.  The motion for a preliminary…
Rank this Week: 1992

techblawg

techblawg

Focuses primarily on issues involving the intersection of law, technology and finance. By David Ma.

http://david-ma.ca/
  • Jun 28

    Protected: bob’s stuff

    Protected: bob’s stuff
    There is no excerpt because this is a protected post. [Click on title above to read the full post]
  • Jun 8

    weekly tweet roundup

    weekly tweet roundup
    haswell – not much of a tock, is it? at least not for desktop. http://t.co/Z4WytI0cnO 2013-06-02 analysis of carbon footprint of a tesla s. not as green as i thought, but still pretty good. http://t.co/6fPPVFnNzA 2013-06-02 better…
  • Jun 1

    weekly tweet roundup

    weekly tweet roundup
    for the next time someone says you don't need project controls aren't because of agile. http://t.co/RhdKFAr58d 2013-05-27 quebec cracks down on airbnb. or rather those who rent out their home using airbnb. http://t.co/fU22acDtHs 2013-05-27…
Rank this Week: 2106

sobre privacidad y protección de…

sobre privacidad y protección de datos

Spanish language blog about privacy and data protection. By Daniel A. Lopez Carballo.

http://www.dlcarballo.com/
  • May 8

    Primeras sanciones por violación del Habeas Data en Colombia

    Primeras sanciones por violación del Habeas Data en Colombia
    Según se hacia eco la Radio Nacional de Colombia, un total de 350 sanciones, por más de mil millones de pesos,  ha impuesto la Superintendencia de Industria y Comercio por violar la nueva ley de Habeas Data. El dato lo…
  • Apr 22

    Aprobado el proyecto de ley de protección de datos de República Dominicana

    Aprobado el proyecto de ley de protección de datos de República Dominicana
    Según se hacían eco diferentes medios de comunicación, el Senado de la República Dominicana aprobó en segunda lectura el proyecto de Ley Orgánica sobre Protección de Datos de Carácter…
  • Apr 14

    Presentación de la Declaración de Lima

    Presentación de la Declaración de Lima
    El pasado viernes 12 de abril de 2013, fue presentada, en la ciudad de Lima (Perú), en el transcurso del Seminario de Derecho Constitucional la primera Declaración emanada en el seno del Observatorio Iberoamericano de…
Rank this Week: 1941

Data Protection, Privacy and Tech…

Data Protection, Privacy and Tech Law in Asia

Covers privacy and data protection law in Asia, and from time to time, things in the technology, telecoms and mobile space. By Derek Ho.

http://privacyasia.blogspot.com/
Rank this Week: 2222

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Apr 23

    EFF Outlines Key Issues With Mass Surveillance to Government Oversight Board

    EFF Outlines Key Issues With Mass Surveillance to Government Oversight Board
    EFF recently filed comments with the Privacy and Civil Liberties Oversight Board (PCLOB) concerning Section 702 of the Foreign Intelligence Surveillance Amendments Act (FAA), one of the key statutes under which the government claims it can…
  • Apr 23

    LGBTQ Communities in the Arab World Face Unique Digital Threat

    LGBTQ Communities in the Arab World Face Unique Digital Threat
    Across the Arab world, LGBTQ communities still struggle to gain social recognition, and individuals still face legal penalties for consensual activities. In Saudi Arabia, Yemen, and Iraq, homosexuality is punishable by death. In 2001, 52 men…
  • Apr 23

    Comparing NSA Reforms to International Law: A New Graphic by AccessNow

    Comparing NSA Reforms to International Law: A New Graphic by AccessNow
    All too often bills are proposed and laws are passed in the United States that are in grave violation of the United States' obligations under the International  Covenant on Civil and Political Rights. And all too rarely does U.S.…
Rank this Week: 2632

Broadband Law Advisor

Broadband Law Advisor

Provides insight and information on the FCC's National Broadband Plan. By Davis Wright Tremaine LLP.

http://www.broadbandlawadvisor.com/
Rank this Week: 4764

Privacy & Security Matters

Privacy & Security Matters

By Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

http://www.privacyandsecuritymatters.com
  • Apr 23

    NYC Women in Intellectual Property Discuss Cybersecurity

    NYC Women in Intellectual Property Discuss Cybersecurity
    Written by Andowah Newton Yesterday, Mintz Levin attended a panel breakfast sponsored by the New York City Bar’s Committee on Women in Intellectual Property.  The panel featured two practitioners, one from the public sector and one…
  • Apr 22

    Get your updated Mintz Matrix!

    Get your updated Mintz Matrix!
    As our readers know, we maintain a summary of the US state data breach notification laws, which we refer to as the “Mintz Matrix.”   We update the Mintz Matrix on a quarterly basis, or more frequently if developments…
  • Apr 21

    Privacy Monday – April 21, 2014

    Privacy Monday – April 21, 2014
    Today is the running of the 118th Boston Marathon.  
Rank this Week: 4144

Workplace Privacy Counsel

Workplace Privacy Counsel

Covers employment related privacy issues. Published by Philip Gordon of Littler Mendelson's Privacy and Data Protection Practice Group.

http://www.littler.com/blog/workplace-privacy-counsel
Rank this Week: 4467

Information Technology Law Blog

Information Technology Law Blog

Covers social media, e-discovery, privacy, and intellectual property. By Foster Swift Collins & Smith PC.

http://www.michiganitlaw.com/
  • Apr 16

    The Importance of IT Contract Review

    The Importance of IT Contract Review
    Technology is increasingly becoming an essential component of all industries. This is especially true for the health care industry. As health care providers continue to increase their use of technology, they are asked more and more frequently…
  • Apr 9

    Provisional Patent Application

    Provisional Patent Application
    I get a lot of questions from clients about “provisional patents." Let me just start this blog by clarifying once and for all that there is no such thing as a “provisional patent” anywhere in the Patent Act. However, since…
  • Apr 2

    Bitcoin Update

    Bitcoin Update
    The IRS has warned that virtual currencies, such as Bitcoin, are to be treated as property and not as currency for tax purposes. Read this latest Bitcoin update on our tax blog. Want to learn more about Bitcoin? Check out this blog post from…
Rank this Week: 3319

Privacy and IP Law Blog

Privacy and IP Law Blog

Addresses recent events in trademark, copyright, computer and privacy law. By Christina Frangiosa.

http://privacyandip.blogspot.com/
  • Apr 15

    Recent Presentations and Article

    Recent Presentations and Article
    More articles on IP and privacy issues will be posted here soon, but in the meantime, here are several recent articles that have published in other media:·        Participated in a panel discussion on…
  • Jan 28

    Today is Data Privacy Day!

    Today is Data Privacy Day!
    January 28 is “Data Privacy Day.”  In honor of the day, below are several links relating to efforts to protect the privacy of personal data and some tools for small businesses:Council of Europe’s explanation of the…
  • Jan 27

    New “Personal Information Privacy” Legislation Introduced

    New “Personal Information Privacy” Legislation Introduced
    On January 8, 2014, Sen. Patrick Leahy (D-Vt) re-introduced a personal privacy protection bill intended “to prevent and mitigate identity theft, to ensure privacy, to provide notice of security breaches, and to enhance criminal…
Rank this Week: 4818

North Carolina Journal of Law &…

North Carolina Journal of Law & Technology

Features legal scholarship in law and technology topics, including intellectual property law, cyberspace law, environmental law, criminal law, health law, and privacy law.

http://ncjolt.org/
  • Apr 10

    Cryptocontracts: Automating Payment for Digital Consumption

    Cryptocontracts: Automating Payment for Digital Consumption
    The proliferation of digital currencies, following the lead of Bitcoin, has been outpaced only by the companies forming to bet their futures on widespread acceptance of the new technology. A few companies are focusing on self-enforcing…
  • Apr 10

    How Should Bitcoin Be Taxed? IRS Provides Short Answer

    How Should Bitcoin Be Taxed? IRS Provides Short Answer
    With “Tax Day” looming for many Americans, it seems the perfect time to talk about the Internal Revenue Service (“IRS”). Bitcoin is a relatively novel form of currency that was first introduced in 2009. Unlike…
  • Apr 8

    Stop Being a Jerk: FTC Charges Jerk.com with Deceiving Consumer

    Stop Being a Jerk: FTC Charges Jerk.com with Deceiving Consumer
    On Monday, April 7, 2014, the FTC alleged that Jerk broke federal laws and deceived consumers. The Massachusetts-based company created the social media site, Jerk.com which was active from 2009 until 2013. It also operated under jerk.be and…
Rank this Week: 4394

Center for Democracy & Technology

Center for Democracy & Technology

Cover privacy, digital copyright, security and open government.

https://www.cdt.org/blog
Rank this Week: 2775

The D: Drive | E-Discovery,…

The D: Drive | E-Discovery, Privacy and All Things Data

Covers privacy, e-discovery, data security, and cloud computing. By Davis LLP.

http://www.davis.ca/en/blog/d-drive/
  • Apr 7

    Compliance is Just the Beginning: CASL and Business Transaction

    Compliance is Just the Beginning: CASL and Business Transaction
    Many businesses are taking steps to comply with Canada’s new anti-spam legislation (“CASL”), which is coming into force on July 1, 2014. However, CASL compliance should not be the end of the story for businesses or their…
  • Mar 27

    When is an E-mail a Business Record?

    When is an E-mail a Business Record?
    Following my previous post, “E-mail Use Policies Must Be Meaningful,” it was pointed out to me, quite rightly, that a difficult part of implementing an e-mail use policy is defining what is a “business record.”…
  • Mar 24

    Email Use Policies Must Be Meaningful

    Email Use Policies Must Be Meaningful
    Coming up in the elevator this morning, I was reading the “Elevator News Network” (I am on the 60th floor, so it is hard not to stare at something!). It contained a bit of advice about Email Use Policies. The advice: Do not allow…
Rank this Week: 3171

Web Tech Law

Web Tech Law

Covers intellectual property, privacy, and social media in South Africa.

http://webtechlaw.com/our-insights
  • Apr 7

    How to deal with stalkers taking photos of you

    How to deal with stalkers taking photos of you
    I spoke to Kieno Kammies on 567 CapeTalk radio this morning about a troubling trend. As you can hear from the segment, below, the concern is partly about people being photographed in suspicious ways in public. One example is a person…
  • Mar 31

    Why you may want to reconsider that co.za domain name

    Why you may want to reconsider that co.za domain name
    If you are thinking about registering a co.za domain name, you may want to consider your possible liability to ZA Central Registry NPC (formerly called Uniforum), the organisation which administers the co.za namespace. It could be…
  • Mar 27

    Your email providers don't require a warrant to read your email

    Your email providers don't require a warrant to read your email
    Our email providers give themselves much more convenient access to your data through their terms of service or privacy policies. On one hand, this is level of access may be necessary to prevent disruptions and limit liability but, on the…
Rank this Week: 2768

Beyond Telecom Law Blog

Beyond Telecom Law Blog

Covers telecom policy, services agreements and data security/privacy. By Keller and Heckman LLP.

http://www.beyondtelecomlawblog.com
Rank this Week: 3937

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
  • Apr 1

    ICANN Reader: IANA Transition Away from U.S. Draws Widespread Concern

    ICANN Reader: IANA Transition Away from U.S. Draws Widespread Concern
    Three things can happen when you pass the football, and two of them are bad. A roundup of reaction to the news that the U.S. Department of Commerce will be transferring its oversight role for key functions in the domain name system to an…
  • Feb 6

    The Latest on ICANN's New gTLD Program: Business Opportunities and Legal Risk

    The Latest on ICANN's New gTLD Program: Business Opportunities and Legal Risk
    On March 5, Bloomberg BNA is putting on a free webinar, "The Latest on ICANN's gTLD Program: Today’s Business Opportunities and Legal Risks." This webinar promises to be well worth the time of anyone with a business or law practice…
  • Feb 6

    Cyberlaw Review 2014: Electronic Surveillance, Emerging Payment Technologie

    Cyberlaw Review 2014: Electronic Surveillance, Emerging Payment Technologie
    Legal experts and policy officials comment on significant developments, and likely 2014 hotspots, for electronic surveillance and emerging payment technologies.
Rank this Week: 3158

Cybersecurity Lawyer Blog

Cybersecurity Lawyer Blog

Covers technology and privacy law. By Samuelson Law Offices, LLC.

http://www.cybersecuritylawyerblog.com/
  • Mar 31

    Indemnity Boilerplate Can Come-Back to Bite in Unexpected Way

    Indemnity Boilerplate Can Come-Back to Bite in Unexpected Way
         Organizers, managing members, officers and directors (collectively, “Insiders”) often demand broad indemnity agreements, from the company, to protect themselves against third-party claims.  However,…
  • Feb 19

    Drafting LLC Agreement

    Drafting LLC Agreement
    When drafting a LLC agreement, you should consider numerous issues, including the respective capital and sweat equity contributions, retained ownership of intellectual property, voting control, sharing of compensation, the effects of any…
  • Sep 30

    Teaming Agreement Held Unenforceable

    Teaming Agreement Held Unenforceable
    Teaming agreements in tech are often like letters of intent in commercial real estate, but with one important difference - whether they are assumed to be binding. Commercial real estate letters of intent are rarely intended to be binding,…
Rank this Week: 2628

The Privacy Law Site

The Privacy Law Site

Covers privacy laws and regulations.

http://privacy-law.blogspot.com/
  • Mar 25

    White House to Propose End to Bulk Collection

    White House to Propose End to Bulk Collection
    According to the The New York Times, President Obama plans to propose legislation that would end bulk collection of phone records under Sec. 215 of the Patriot Act, keep the records in the hands of the phone companies, and require…
  • Jun 29

    26 Senators Seek Details on Information Collection from NSA

    26 Senators Seek Details on Information Collection from NSA
    26 Senators have sent a letter to DNI James Clapper seeking examples of how bulk collection of phone records information from provided unique intelligence.The AP reports the story here.
  • Jun 29

    COPPA Limits on Collection of Children's Information Applies to Apps as of July 1, 2013

    COPPA Limits on Collection of Children's Information Applies to Apps as of July 1, 2013
    Congress amended COPPA in 2012 to cover online services such as apps. As was previously the case, the law only applies to apps "directed at" children under the age of 13, or have actual knowledge of collection of personal information from…
Rank this Week: 3076

Reasonable Expectation

Reasonable Expectation

Focuses on privacy and data security. By M. Scott Koller.

http://www.reasonableexpectation.com
Rank this Week: 4589

New Media & Technology Law Blog

New Media & Technology Law Blog

Covers intellectual property, data security, online marketing and online commerce. By Proskauer.

http://newmedialaw.proskauer.com
  • Mar 12

    FINRA Issues Investor Alert Concerning Bitcoin Trading and Speculation

    FINRA Issues Investor Alert Concerning Bitcoin Trading and Speculation
    Bitcoin remains fixed on the front pages of the business and technology news for both the salacious and the positive. Much attention has been paid to the collapse of the former top bitcoin exchange, Mt. Gox, stemming from the purported theft…
  • Nov 19

    Bitcoins: A New Form of Currency?

    Bitcoins: A New Form of Currency?
    Yesterday, the Senate Committee On Homeland Security and Governmental Affairs held the first of two days of hearings on Bitcoin and digital currencies — “Beyond Silk Road: Potential Risks, Threats, and Promises of Virtual…
  • Nov 13

    No Expansion of CFAA Liability for Monetary Exploit of Software Bug

    No Expansion of CFAA Liability for Monetary Exploit of Software Bug
    In the game Monopoly, lucky players landing on Community Chest might turn over the highly desirable “Bank Error in Your Favor, Collect $200″ card.  By the next turn, the proceeds are usually invested in properties and houses,…
Rank this Week: 3984