Most Popular Privacy Law Blawgs Expanded View List View

Blogs 46 - 53 of 53
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Privacy & Security Source

Privacy & Security Source

Covers anonymous subpoenas, behavioral advertising, employee monitoring, geolocation and information security. By Foley & Lardner LLP.

http://www.privacysecuritysource.com
Rank this Week: 3866

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Mar 27

    EFF Files Second Round of Comments on New York’s BitLicense Proposal

    EFF Files Second Round of Comments on New York’s BitLicense Proposal
    Today, EFF filed a second round of comments to the New York State Department of Financial Services (NYDFS) on its proposed regulatory rules for digital currencies like Bitcoin. EFF, the Internet Archive, and reddit filed initial joint…
  • Mar 27

    France’s Censorship and Surveillance Initiatives Lack Judicial Review

    France’s Censorship and Surveillance Initiatives Lack Judicial Review
    Following the terrorist attacks in Paris in January, including the murder of several journalists at the satirical newspaper Charlie Hebdo, we anticipated that the French government would overreact. Sure enough, recent reporting has revealed…
  • Mar 26

    UN Human Rights Council Appoints Special Rapporteur on the Right to Privacy

    UN Human Rights Council Appoints Special Rapporteur on the Right to Privacy
    The Electronic Frontier Foundation is pleased with the United Nations Human Rights Council's (UNHRC) decision to adopt a resolution appointing a special rapporteur on the right to privacy. This decision is a key step forward for the UNHRC; it…
Rank this Week: 4099

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
  • Mar 24

    Sixth Circuit adopts broad view of trade secret preemption

    Sixth Circuit adopts broad view of trade secret preemption
    The Sixth Circuit Court of Appeals recently took a broad view of preemption under the Uniform Trade Secrets Act (UTSA) and held that Ohio’s version of the UTSA preempted state-law claims for tortious interference with prospective…
  • Mar 19

    Online advertiser denied immunity under Section 230 of the CDA for permitting use of fake news sites by affiliate marketer

    Online advertiser denied immunity under Section 230 of the CDA for permitting use of fake news sites by affiliate marketer
    A federal court recently agreed with the Federal Trade Commission (FTC) that an advertiser should be held accountable for the deceptive acts and practices of its affiliate marketers, and ordered that the advertiser disgorge the entire $11.9…
  • Mar 10

    CRTC claims its first victim under Canada’s anti-spam law

    CRTC claims its first victim under Canada’s anti-spam law
    Canada’s anti-spam law (CASL), enforced by the Canadian Radio-television and Telecommunications Commission (CRTC), requires that businesses and organizations secure a recipient’s express or implied consent before sending…
Rank this Week: 4423

Web Tech Law

Web Tech Law

Covers intellectual property, privacy, and social media in South Africa.

http://webtechlaw.com/our-insights
  • Apr 24

    The legalities of going paper-le

    The legalities of going paper-le
    Many people think that going digital is problematic from a legal perspective and, to a large extent, it isn't. It does require that you understand the implications and adjust your workflows to suit the digital paradigm.
  • Apr 24

    Bombs under wheelchairs, model airplanes and other stupid tweet

    Bombs under wheelchairs, model airplanes and other stupid tweet
    The last couple weeks saw two spectacular lapses in judgment in corporate Twitter accounts. The first was the pornographic US Airways tweet in response to a passenger’s complaints about a delayed flight and the second was an FNB…
  • Apr 7

    How to deal with stalkers taking photos of you

    How to deal with stalkers taking photos of you
    I spoke to Kieno Kammies on 567 CapeTalk radio this morning about a troubling trend. As you can hear from the segment, below, the concern is partly about people being photographed in suspicious ways in public. One example is a person…
Rank this Week: 4598

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • Mar 18

    The Many Benefits of an Employee Handbook

    The Many Benefits of an Employee Handbook
    The content of an employee handbook matters greatly. When it is well-drafted and tailored to the the company it can prevent or greatly minimize liability. The post The Many Benefits of an Employee Handbook appeared first on .
  • Mar 10

    Independent Creation Paper Trail To Fend Off Copyright Suit

    Independent Creation Paper Trail To Fend Off Copyright Suit
    Keeping adequate record of your software creation efforts can be very helpful to stave off copyright infringement claims The post Independent Creation Paper Trail To Fend Off Copyright Suits appeared first on .
  • Mar 10

    Independent Creation Paper Trail To Fend Off Copyright Suit

    Independent Creation Paper Trail To Fend Off Copyright Suit
    Keeping adequate record of your software creation efforts can be very helpful to stave off copyright infringement claims The post Independent Creation Paper Trail To Fend Off Copyright Suits appeared first on .
Rank this Week: 4627

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
  • Dec 10

    DNS Policy Notes for Dec. 10, 2014

    DNS Policy Notes for Dec. 10, 2014
    Topics include the inclusion in the omnibus spending bill language defunding the NTIA's involvement in the IANA functions transition policy development effort, Secretary Strickling's continuing effort to inject fact-based reasoning to the…
  • Nov 24

    DNS Policy Notes for Nov. 24, 2014

    DNS Policy Notes for Nov. 24, 2014
    Topics include Russia's tightening grip on the Internet, Facebook's foray into health content sans GAC advice, the latest twist in the Yoyo.email story, trademark owners on a URS hot streak, and a pair of industry analyses of the new…
  • Nov 21

    DNS Policy Notes for Nov. 21, 2014

    DNS Policy Notes for Nov. 21, 2014
    Topics include the Defending Internet Freedom Act of 2014, coverage of the World Internet Conference, the GAC's inquiry on additional protections for geographic names in new gTLDs, grousing about the NETmundial Initiative, and the defeat of…
Rank this Week: 4729

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 4776

The D: Drive | E-Discovery,…

The D: Drive | E-Discovery, Privacy and All Things Data

Covers privacy, e-discovery, data security, and cloud computing. By Davis LLP.

http://www.davis.ca/en/blog/d-drive/
  • Jan 15

    Update on the Burgeoning International E-Discovery Standard

    Update on the Burgeoning International E-Discovery Standard
    In the D:Drive blog post “An International Standard on E-Discovery is Becoming a Reality”, I introduced the development of an international standard for electronic discovery, “ISO/IEC 27050 – Information technology…
  • Jan 14

    Update on the Burgeoning International E-Discovery Standard

    Update on the Burgeoning International E-Discovery Standard
    In the D:Drive blog post “An International Standard on E-Discovery is Becoming a Reality”, I introduced the development of an international standard for electronic discovery, “ISO/IEC 27050 – Information technology…
  • Nov 18

    Improving Cybersecurity Against Data Breaches: How Information Governance Paves the Way

    Improving Cybersecurity Against Data Breaches: How Information Governance Paves the Way
    The issue of data breach is not exactly new, but in the past it has been relegated to a niche corner of information technology. Increasingly, however, cybersecurity is becoming a critical priority for businesses as a recent surge of…
Rank this Week: 4773