Most Popular Privacy Law Blawgs Expanded View List View

Blogs 46 - 55 of 55
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Cyberinsurance Law Blog

Cyberinsurance Law Blog

News and comments on Business Law. By Dilworth Paxson L.L.P.

http://www.databreachninja.com/
  • Jul 1

    “The Inky Explains How Your Firm Can Avoid Cybercrime”

    “The Inky Explains How Your Firm Can Avoid Cybercrime”
    Check out today’s article by Chris Mondics of the Philadelphia Inquirer.  Mondics, citing yours truly and several other top professionals in the field, covers the increased attention being paid to cybercrime and the role of…
  • Jun 10

    “P.F. Chang’s On the Hook for Contractual Liabilities”

    “P.F. Chang’s On the Hook for Contractual Liabilities”
    On May 31, 2016, the U.S. District Court for the District of Arizona held that P.F. Chang’s obligation to pay its credit card processor nearly $2M following a 2014 data breach was contractual, and therefore not covered under its…
  • May 12

    “When Retro Isn’t Cool”

    “When Retro Isn’t Cool”
    Those new, old-school Air Jordans are retro cool (and I have them).  Those new cyberinsurance retroactive dates – eh. I blogged about retroactive dates here.  Reminder: an insurance policy retroactive date is the day…
Rank this Week: 3864

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
  • Jun 24

    FAA’s comprehensive new small UAS rules are here. How can they help your business?

    FAA’s comprehensive new small UAS rules are here. How can they help your business?
    On June 21, the Federal Aviation Administration (FAA) released long-awaited new rules for commercial, non-hobbyist small unmanned aircraft (sUAS) operations. The FAA’s press release about the new rules in part 107 of the FAA regulations…
  • May 26

    What is the legal standard for harm in a data breach event?

    What is the legal standard for harm in a data breach event?
    Consumer data breaches happen all of the time. And some of those times, consumers may not have had harm…yet. Our colleagues at Antitrust Law Source published a podcast discussing the how fear of harm may or may not warrant relief and…
  • May 25

    What is the immunity notice required to take full advantage of the Defending Trade Secrets Act?

    What is the immunity notice required to take full advantage of the Defending Trade Secrets Act?
    We’ve previously posted about the Defending Trade Secrets Act allowing plaintiffs to pursue a trade secret claim in federal court. Our colleagues at Employer Law Report recently reported on how employers can take advantage of this Act.…
Rank this Week: 4232

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • May 15

    The New York Bitlicense is coming: What you need to know

    The New York Bitlicense is coming: What you need to know
    As the final version of the New York BitLicense will roll out within the next 2 weeks, bitcoin startups are gearing up to enter the U.S. market. The post The New York Bitlicense is coming: What you need to know appeared first on .
  • May 12

    What Makes a Brand a Good Trademark?

    What Makes a Brand a Good Trademark?
    A suggestive trademark can be a salutary compromise between marketing and legal considerations. The post What Makes a Brand a Good Trademark? appeared first on .
  • Apr 30

    LLC., C Corp, S Corp: How to Pick a Business Structure

    LLC., C Corp, S Corp: How to Pick a Business Structure
    Few decisions are as important as choosing the right entity for your new startup. This post explores the factors that matter most when making this decision. The post LLC., C Corp, S Corp: How to Pick a Business Structure appeared first on .
Rank this Week: 4542

The D: Drive | E-Discovery,…

The D: Drive | E-Discovery, Privacy and All Things Data

Covers privacy, e-discovery, data security, and cloud computing. By Davis LLP.

http://www.davis.ca/en/blog/d-drive/
  • Jan 15

    Update on the Burgeoning International E-Discovery Standard

    Update on the Burgeoning International E-Discovery Standard
    In the D:Drive blog post “An International Standard on E-Discovery is Becoming a Reality”, I introduced the development of an international standard for electronic discovery, “ISO/IEC 27050 – Information technology…
  • Jan 14

    Update on the Burgeoning International E-Discovery Standard

    Update on the Burgeoning International E-Discovery Standard
    In the D:Drive blog post “An International Standard on E-Discovery is Becoming a Reality”, I introduced the development of an international standard for electronic discovery, “ISO/IEC 27050 – Information technology…
  • Nov 18

    Improving Cybersecurity Against Data Breaches: How Information Governance Paves the Way

    Improving Cybersecurity Against Data Breaches: How Information Governance Paves the Way
    The issue of data breach is not exactly new, but in the past it has been relegated to a niche corner of information technology. Increasingly, however, cybersecurity is becoming a critical priority for businesses as a recent surge of…
Rank this Week: 4565

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 4610

Web Tech Law

Web Tech Law

Covers intellectual property, privacy, and social media in South Africa.

http://webtechlaw.com/our-insights
  • Apr 24

    The legalities of going paper-le

    The legalities of going paper-le
    Many people think that going digital is problematic from a legal perspective and, to a large extent, it isn't. It does require that you understand the implications and adjust your workflows to suit the digital paradigm.
  • Apr 24

    Bombs under wheelchairs, model airplanes and other stupid tweet

    Bombs under wheelchairs, model airplanes and other stupid tweet
    The last couple weeks saw two spectacular lapses in judgment in corporate Twitter accounts. The first was the pornographic US Airways tweet in response to a passenger’s complaints about a delayed flight and the second was an FNB…
  • Apr 7

    How to deal with stalkers taking photos of you

    How to deal with stalkers taking photos of you
    I spoke to Kieno Kammies on 567 CapeTalk radio this morning about a troubling trend. As you can hear from the segment, below, the concern is partly about people being photographed in suspicious ways in public. One example is a person…
Rank this Week: 4605

Data Breach Lawyer Blog

Data Breach Lawyer Blog

Covers intellectual property law. By Raines Feldman.

http://www.databreachlawyerblog.com/
  • May 9

    The Computer Fraud and Abuse Act Basic

    The Computer Fraud and Abuse Act Basic
    Data security and privacy lawyers Steve Gebelin and Erik Syverson talk the NFL draft and how a hacking incident impacted the draft status of prospect Laremy Tunsil.  The Raines Feldman cyber liability team then pivots to hacking…
  • Apr 19

    The Raines Feldman Cyber Liability Update

    The Raines Feldman Cyber Liability Update
    The cyber liability team here at Raines Feldman has endeavoured to provide weekly cyber liability law updates.  While the production values are very public access, we hope that you will find some practical advice and useful legal…
  • Nov 17

    What the Shift to Chip-Cards Means for Your Small Busine

    What the Shift to Chip-Cards Means for Your Small Busine
    Accepting credit cards just became a riskier and more expensive proposition for small business owners. As a law firm specializing in data breach prevention and response, we know that the United States lags behind comparable markets globally…
Rank this Week: 4729

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
  • Dec 10

    DNS Policy Notes for Dec. 10, 2014

    DNS Policy Notes for Dec. 10, 2014
    Topics include the inclusion in the omnibus spending bill language defunding the NTIA's involvement in the IANA functions transition policy development effort, Secretary Strickling's continuing effort to inject fact-based reasoning to the…
  • Nov 24

    DNS Policy Notes for Nov. 24, 2014

    DNS Policy Notes for Nov. 24, 2014
    Topics include Russia's tightening grip on the Internet, Facebook's foray into health content sans GAC advice, the latest twist in the Yoyo.email story, trademark owners on a URS hot streak, and a pair of industry analyses of the new…
  • Nov 21

    DNS Policy Notes for Nov. 21, 2014

    DNS Policy Notes for Nov. 21, 2014
    Topics include the Defending Internet Freedom Act of 2014, coverage of the World Internet Conference, the GAC's inquiry on additional protections for geographic names in new gTLDs, grousing about the NETmundial Initiative, and the defeat of…
Rank this Week: 4723

Data Protection Report

Data Protection Report

Covers global privacy, data protection and cybersecurity regulatory and litigation environment. By Norton Rose Fulbright.

http://www.dataprotectionreport.com/
  • Jun 29

    Brexit: The Continued Application of the GDPR

    Brexit: The Continued Application of the GDPR
    On Friday, June 24, the UK electorate voted through a referendum to leave the European Union by a 52% majority. The mechanics of leaving the European Union will be complex, given that the referendum question did not spell out what…
  • Jun 24

    Privacy Shield Framework Sees Changes, EU Vote Expected in July 2016

    Privacy Shield Framework Sees Changes, EU Vote Expected in July 2016
    The United States and the European Union reportedly have agreed on changes to the EU-US Privacy Shield. A revised agreement has been sent to EU Member States, and a vote is expected to be held early next month, in early July 2016. If approved…
  • Jun 17

    Final CISA Guidance for Cybersecurity Information Sharing Published

    Final CISA Guidance for Cybersecurity Information Sharing Published
    On June 15, 2016, the U.S. Department of Homeland Security (“DHS”) and Department of Justice issued Final Procedures Related to the Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Government (“Final…
Rank this Week: 4841

Primary Opinion

Primary Opinion

Covers corporate, employment, IP and privacy news.

http://primaryopinion.com/
  • Nov 27

    Social media marketing for lawyers and law firm

    Social media marketing for lawyers and law firm
    Law firms of all sizes are now embracing social media as a means to showcase expertise and reach new customers. But, opening a Twitter, LinkedIn or Google+ account is only the first part of the process. Here are five pointers for realising…
  • Oct 13

    Legal opinion round up: CJEU’s ruling on registering 3D object trademark

    Legal opinion round up: CJEU’s ruling on registering 3D object trademark
    3D shape marks took another battering at the end of September with the European Court of Justice (CJEU) ruling that such trademarks can be declared invalid if the shape can be linked ‘essentially’ or ‘substantially’ to…
  • Oct 7

    Meet our independent blogger

    Meet our independent blogger
    Our new content portal www.primaryopinion.com draws together the best of the IP industry’s news, commentary and knowledge, so that IP professionals, in-house counsel and business heads can access it on one up-to-date platform. That…
Rank this Week: 4877