Most Popular Privacy Law Blawgs Expanded View List View

Blogs 46 - 52 of 52
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Jul 29

    A National Consensus: Cell Phone Location Records Are Private

    A National Consensus: Cell Phone Location Records Are Private
    The Fourth Amendment protects us from “unreasonable” government searches of our persons, houses, papers and effects. How courts should determine what is and isn’t reasonable in our increasingly digital world…
  • Jul 29

    The New Senate USA FREEDOM Act: A First Step Towards Reforming Mass Surveillance

    The New Senate USA FREEDOM Act: A First Step Towards Reforming Mass Surveillance
    Earlier today, Senator Patrick Leahy introduced a revised version of his USA FREEDOM legislation, the USA FREEDOM Act of 2014, which focuses on telephone record collection and FISA Court reform. While this bill is not a comprehensive solution…
  • Jul 28

    The Phone Unlocking Victory Should Be the First Step Towards Real Copyright Reform

    The Phone Unlocking Victory Should Be the First Step Towards Real Copyright Reform
    It's increasingly rare for Congress to actually pass bills into law, but Friday brought some good news from Capitol Hill: More than a year after the exemption covering phone unlocking expired and a White House petition on the topic collected…
Rank this Week: 4289

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
  • Jul 28

    A new Ohio weapon against patent trolls?

    A new Ohio weapon against patent trolls?
    By Dan Miller Ohio may become the next state — after Virginia, Georgia, and thirteen other states — to take on the fight against patent trolls. A bill pending in Ohio’s General Assembly, H.B. 573, would provide additional…
  • Jul 18

    Delegation slows this week but the gTLD program is still going steady

    Delegation slows this week but the gTLD program is still going steady
    By Melissa Barnett Three new gTLDs have been delegated to the root zone since our last post. The newest group of gTLDs to be delegated include: .gent .nrw .scb gTLDs in Sunrise period — update The following gTLDs are now added to the…
  • Jul 11

    ICANN continues to rapidly expand the Internet this summer — newest statistics released

    ICANN continues to rapidly expand the Internet this summer — newest statistics released
    By Melissa Barnett As of July 4, 2014 ICANN announced that out of the 1,930 applicants received in 2012, 1,146 have been invited to contracting. Contracting is the process through which ICANN will contact eligible applicants and engage with…
Rank this Week: 4463

Web Tech Law

Web Tech Law

Covers intellectual property, privacy, and social media in South Africa.

http://webtechlaw.com/our-insights
  • Apr 24

    The legalities of going paper-le

    The legalities of going paper-le
    Many people think that going digital is problematic from a legal perspective and, to a large extent, it isn't. It does require that you understand the implications and adjust your workflows to suit the digital paradigm.
  • Apr 24

    Bombs under wheelchairs, model airplanes and other stupid tweet

    Bombs under wheelchairs, model airplanes and other stupid tweet
    The last couple weeks saw two spectacular lapses in judgment in corporate Twitter accounts. The first was the pornographic US Airways tweet in response to a passenger’s complaints about a delayed flight and the second was an FNB…
  • Apr 7

    How to deal with stalkers taking photos of you

    How to deal with stalkers taking photos of you
    I spoke to Kieno Kammies on 567 CapeTalk radio this morning about a troubling trend. As you can hear from the segment, below, the concern is partly about people being photographed in suspicious ways in public. One example is a person…
Rank this Week: 4594

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • Mar 10

    Independent Creation Paper Trail To Fend Off Copyright Suit

    Independent Creation Paper Trail To Fend Off Copyright Suit
    Keeping adequate record of your software creation efforts can be very helpful to stave off copyright infringement claimsThe post Independent Creation Paper Trail To Fend Off Copyright Suits appeared first on .
  • Feb 20

    Oracle’s Copyright Victory: An Ephemeral Win

    Oracle’s Copyright Victory: An Ephemeral Win
    Despite Oracle’s efforts to utilize copyright law to asphyxiate Rimini’s business model, Rimini’s support services appear to have bright days aheadThe post Oracle’s Copyright Victory: An Ephemeral Win appeared first…
  • Feb 14

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”
    After former employer declined to invest in Defendant’s new business, Defendant turned cybersquatterThe post Retaliatory Cybersquatter Used Domain Name To “Get Leverage” appeared first on .
Rank this Week: 4604

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
Rank this Week: 4671

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 4697

The D: Drive | E-Discovery,…

The D: Drive | E-Discovery, Privacy and All Things Data

Covers privacy, e-discovery, data security, and cloud computing. By Davis LLP.

http://www.davis.ca/en/blog/d-drive/
  • Jul 22

    Why Your Lawyer Should Be the First Point of Contact after a Data Breach

    Why Your Lawyer Should Be the First Point of Contact after a Data Breach
    Securing corporate information assets against a data breach, and responding to a data breach when it occurs, is not just a technology problem. While information security certainly has a major technological component, it is also a public…
  • Jun 23

    Join the Dialogue: Sedona Canada Holds Working Group Meeting to Update E-Discovery Principle

    Join the Dialogue: Sedona Canada Holds Working Group Meeting to Update E-Discovery Principle
    The Sedona Conference’s Working Group 7 (Sedona Canada) strives to create forward-looking principles and best practice recommendations for lawyers, courts, businesses, and others who regularly confront eDiscovery issues in Canada. The…
  • Jun 3

    Minimizing Risks and Responding to Data Breache

    Minimizing Risks and Responding to Data Breache
    This article originally appeared on Canadian Lawyer InHouse Online and has been reproduced here with permission from the publisher. [More…]
Rank this Week: 4689