Most Popular Privacy Law Blawgs Expanded View List View

Blogs 46 - 55 of 55
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Massachusetts Data Privacy Law…

Massachusetts Data Privacy Law Blog

Covers data breaches, phishing, social engineering and federal privacy law. By John H. Lacey of The McCormack Firm, LLC.

http://www.massdataprivacylaw.com
  • Apr 30

    "Slippery Slope" defined...

    "Slippery Slope" defined...
    Way back in law school we learned a term called the "slippery slope." In academia, it usually has a negative connotation because it usually means..."the beginning of the end."
  • Apr 9

    MASS RMV DATA STOLEN - WHY?

    MASS RMV DATA STOLEN - WHY?
    Last Thursday two masked men, operating a stolen jeep, pulled up next to a courier's white van that was parked outside a MA RMV location, jumped out of the jeep and stole five bags from the courier's van. This is according to witness'…
  • Apr 2

    Major Credit Card Processor hacked - is the sky falling?

    Major Credit Card Processor hacked - is the sky falling?
    Last Friday, I was reading my daily dose of Brian Krebs' blog, KrebsOnSecurity.com, and read his story about a compa
Rank this Week: 3981

Privacy & Security Source

Privacy & Security Source

Covers anonymous subpoenas, behavioral advertising, employee monitoring, geolocation and information security. By Foley & Lardner LLP.

http://www.privacysecuritysource.com
Rank this Week: 3992

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Apr 15

    Tea Party, Taxes and Why the Original Patriots Would’ve Revolted Against the Surveillance State

    Tea Party, Taxes and Why the Original Patriots Would’ve Revolted Against the Surveillance State
    Let’s just imagine we could transport an Internet-connected laptop back to the 1790s, when the United States was in its infancy. The technology would no doubt knock the founders out of their buckle-top boots, but once the original…
  • Apr 15

    Is the SEC Obtaining Emails Without a Warrant?

    Is the SEC Obtaining Emails Without a Warrant?
    Updates to the email privacy law called the Electronic Communications Privacy Act (ECPA) are long overdue. It's common sense that emails and other online private messages (like Twitter direct messages) are protected by the Fourth Amendment.…
  • Apr 15

    EFF Supports CafePress Safe Harbor Claim

    EFF Supports CafePress Safe Harbor Claim
    After seven years of litigation, the basic contours of the Digital Millennium Copyright Act (DMCA) safe harbors should be pretty well established. Unfortunately, a new front may have opened up in a case called Gardner v. CafePress, thanks to…
Rank this Week: 4490

Cybersecurity Lawyer Blog

Cybersecurity Lawyer Blog

Covers technology and privacy law. By Samuelson Law Offices, LLC.

http://www.cybersecuritylawyerblog.com/
  • Mar 31

    Indemnity Boilerplate Can Come-Back to Bite in Unexpected Way

    Indemnity Boilerplate Can Come-Back to Bite in Unexpected Way
         Organizers, managing members, officers and directors (collectively, “Insiders”) often demand broad indemnity agreements, from the company, to protect themselves against third-party claims.  However,…
  • Feb 19

    Drafting LLC Agreement

    Drafting LLC Agreement
    When drafting a LLC agreement, you should consider numerous issues, including the respective capital and sweat equity contributions, retained ownership of intellectual property, voting control, sharing of compensation, the effects of any…
  • Sep 30

    Teaming Agreement Held Unenforceable

    Teaming Agreement Held Unenforceable
    Teaming agreements in tech are often like letters of intent in commercial real estate, but with one important difference - whether they are assumed to be binding. Commercial real estate letters of intent are rarely intended to be binding,…
Rank this Week: 4593

Web Tech Law

Web Tech Law

Covers intellectual property, privacy, and social media in South Africa.

http://webtechlaw.com/our-insights
  • Apr 7

    How to deal with stalkers taking photos of you

    How to deal with stalkers taking photos of you
    I spoke to Kieno Kammies on 567 CapeTalk radio this morning about a troubling trend. As you can hear from the segment, below, the concern is partly about people being photographed in suspicious ways in public. One example is a person…
  • Mar 31

    Why you may want to reconsider that co.za domain name

    Why you may want to reconsider that co.za domain name
    If you are thinking about registering a co.za domain name, you may want to consider your possible liability to ZA Central Registry NPC (formerly called Uniforum), the organisation which administers the co.za namespace. It could be…
  • Mar 27

    Your email providers don't require a warrant to read your email

    Your email providers don't require a warrant to read your email
    Our email providers give themselves much more convenient access to your data through their terms of service or privacy policies. On one hand, this is level of access may be necessary to prevent disruptions and limit liability but, on the…
Rank this Week: 4657

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • Mar 10

    Independent Creation Paper Trail To Fend Off Copyright Suit

    Independent Creation Paper Trail To Fend Off Copyright Suit
    Keeping adequate record of your software creation efforts can be very helpful to stave off copyright infringement claimsThe post Independent Creation Paper Trail To Fend Off Copyright Suits appeared first on .
  • Feb 20

    Oracle’s Copyright Victory: An Ephemeral Win

    Oracle’s Copyright Victory: An Ephemeral Win
    Despite Oracle’s efforts to utilize copyright law to asphyxiate Rimini’s business model, Rimini’s support services appear to have bright days aheadThe post Oracle’s Copyright Victory: An Ephemeral Win appeared first…
  • Feb 14

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”
    After former employer declined to invest in Defendant’s new business, Defendant turned cybersquatterThe post Retaliatory Cybersquatter Used Domain Name To “Get Leverage” appeared first on .
Rank this Week: 4710

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
Rank this Week: 4730

Center for Democracy & Technology

Center for Democracy & Technology

Cover privacy, digital copyright, security and open government.

https://www.cdt.org/blog
Rank this Week: 4736

The D: Drive | E-Discovery,…

The D: Drive | E-Discovery, Privacy and All Things Data

Covers privacy, e-discovery, data security, and cloud computing. By Davis LLP.

http://www.davis.ca/en/blog/d-drive/
  • Apr 7

    Compliance is Just the Beginning: CASL and Business Transaction

    Compliance is Just the Beginning: CASL and Business Transaction
    Many businesses are taking steps to comply with Canada’s new anti-spam legislation (“CASL”), which is coming into force on July 1, 2014. However, CASL compliance should not be the end of the story for businesses or their…
  • Mar 27

    When is an E-mail a Business Record?

    When is an E-mail a Business Record?
    Following my previous post, “E-mail Use Policies Must Be Meaningful,” it was pointed out to me, quite rightly, that a difficult part of implementing an e-mail use policy is defining what is a “business record.”…
  • Mar 24

    Email Use Policies Must Be Meaningful

    Email Use Policies Must Be Meaningful
    Coming up in the elevator this morning, I was reading the “Elevator News Network” (I am on the 60th floor, so it is hard not to stare at something!). It contained a bit of advice about Email Use Policies. The advice: Do not allow…
Rank this Week: 4791

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
  • Apr 1

    ICANN Reader: IANA Transition Away from U.S. Draws Widespread Concern

    ICANN Reader: IANA Transition Away from U.S. Draws Widespread Concern
    Three things can happen when you pass the football, and two of them are bad. A roundup of reaction to the news that the U.S. Department of Commerce will be transferring its oversight role for key functions in the domain name system to an…
  • Feb 6

    The Latest on ICANN's New gTLD Program: Business Opportunities and Legal Risk

    The Latest on ICANN's New gTLD Program: Business Opportunities and Legal Risk
    On March 5, Bloomberg BNA is putting on a free webinar, "The Latest on ICANN's gTLD Program: Today’s Business Opportunities and Legal Risks." This webinar promises to be well worth the time of anyone with a business or law practice…
  • Feb 6

    Cyberlaw Review 2014: Electronic Surveillance, Emerging Payment Technologie

    Cyberlaw Review 2014: Electronic Surveillance, Emerging Payment Technologie
    Legal experts and policy officials comment on significant developments, and likely 2014 hotspots, for electronic surveillance and emerging payment technologies.
Rank this Week: 4966