Most Popular Privacy Law Blawgs Expanded View List View

Blogs 46 - 55 of 55
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Massachusetts Data Privacy Law…

Massachusetts Data Privacy Law Blog

Covers data breaches, phishing, social engineering and federal privacy law. By John H. Lacey of The McCormack Firm, LLC.

http://www.massdataprivacylaw.com
  • Apr 30

    "Slippery Slope" defined...

    "Slippery Slope" defined...
    Way back in law school we learned a term called the "slippery slope." In academia, it usually has a negative connotation because it usually means..."the beginning of the end."
  • Apr 9

    MASS RMV DATA STOLEN - WHY?

    MASS RMV DATA STOLEN - WHY?
    Last Thursday two masked men, operating a stolen jeep, pulled up next to a courier's white van that was parked outside a MA RMV location, jumped out of the jeep and stole five bags from the courier's van. This is according to witness'…
  • Apr 2

    Major Credit Card Processor hacked - is the sky falling?

    Major Credit Card Processor hacked - is the sky falling?
    Last Friday, I was reading my daily dose of Brian Krebs' blog, KrebsOnSecurity.com, and read his story about a compa
Rank this Week: 3971

Privacy & Security Source

Privacy & Security Source

Covers anonymous subpoenas, behavioral advertising, employee monitoring, geolocation and information security. By Foley & Lardner LLP.

http://www.privacysecuritysource.com
Rank this Week: 3987

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Apr 23

    How Iran's Gadget Bloggers Became Victims of the Revolutionary Guard

    How Iran's Gadget Bloggers Became Victims of the Revolutionary Guard
    Narenji ("Orange") was Iran's top website for gadget news, edited daily by a team of tech bloggers who worked from a cramped office in the country's city of Kerman. The site was targeted at Iran's growing audience of technology enthusiasts.…
  • Apr 23

    Designing a Prize for Usable Cryptography

    Designing a Prize for Usable Cryptography
    In an era when email and messaging services are being regularly subject to attacks, surveillance, and compelled disclosure of user data, we know that many people around the world need secure end-to-end encrypted communications tools so that…
  • Apr 23

    EFF Outlines Key Issues With Mass Surveillance to Government Oversight Board

    EFF Outlines Key Issues With Mass Surveillance to Government Oversight Board
    EFF recently filed comments with the Privacy and Civil Liberties Oversight Board (PCLOB) concerning Section 702 of the Foreign Intelligence Surveillance Amendments Act (FAA), one of the key statutes under which the government claims it can…
Rank this Week: 4481

Cybersecurity Lawyer Blog

Cybersecurity Lawyer Blog

Covers technology and privacy law. By Samuelson Law Offices, LLC.

http://www.cybersecuritylawyerblog.com/
  • Mar 31

    Indemnity Boilerplate Can Come-Back to Bite in Unexpected Way

    Indemnity Boilerplate Can Come-Back to Bite in Unexpected Way
         Organizers, managing members, officers and directors (collectively, “Insiders”) often demand broad indemnity agreements, from the company, to protect themselves against third-party claims.  However,…
  • Feb 19

    Drafting LLC Agreement

    Drafting LLC Agreement
    When drafting a LLC agreement, you should consider numerous issues, including the respective capital and sweat equity contributions, retained ownership of intellectual property, voting control, sharing of compensation, the effects of any…
  • Sep 30

    Teaming Agreement Held Unenforceable

    Teaming Agreement Held Unenforceable
    Teaming agreements in tech are often like letters of intent in commercial real estate, but with one important difference - whether they are assumed to be binding. Commercial real estate letters of intent are rarely intended to be binding,…
Rank this Week: 4587

Web Tech Law

Web Tech Law

Covers intellectual property, privacy, and social media in South Africa.

http://webtechlaw.com/our-insights
  • Apr 7

    How to deal with stalkers taking photos of you

    How to deal with stalkers taking photos of you
    I spoke to Kieno Kammies on 567 CapeTalk radio this morning about a troubling trend. As you can hear from the segment, below, the concern is partly about people being photographed in suspicious ways in public. One example is a person…
  • Mar 31

    Why you may want to reconsider that co.za domain name

    Why you may want to reconsider that co.za domain name
    If you are thinking about registering a co.za domain name, you may want to consider your possible liability to ZA Central Registry NPC (formerly called Uniforum), the organisation which administers the co.za namespace. It could be…
  • Mar 27

    Your email providers don't require a warrant to read your email

    Your email providers don't require a warrant to read your email
    Our email providers give themselves much more convenient access to your data through their terms of service or privacy policies. On one hand, this is level of access may be necessary to prevent disruptions and limit liability but, on the…
Rank this Week: 4661

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
Rank this Week: 4693

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • Mar 10

    Independent Creation Paper Trail To Fend Off Copyright Suit

    Independent Creation Paper Trail To Fend Off Copyright Suit
    Keeping adequate record of your software creation efforts can be very helpful to stave off copyright infringement claimsThe post Independent Creation Paper Trail To Fend Off Copyright Suits appeared first on .
  • Feb 20

    Oracle’s Copyright Victory: An Ephemeral Win

    Oracle’s Copyright Victory: An Ephemeral Win
    Despite Oracle’s efforts to utilize copyright law to asphyxiate Rimini’s business model, Rimini’s support services appear to have bright days aheadThe post Oracle’s Copyright Victory: An Ephemeral Win appeared first…
  • Feb 14

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”
    After former employer declined to invest in Defendant’s new business, Defendant turned cybersquatterThe post Retaliatory Cybersquatter Used Domain Name To “Get Leverage” appeared first on .
Rank this Week: 4711

Center for Democracy & Technology

Center for Democracy & Technology

Cover privacy, digital copyright, security and open government.

https://www.cdt.org/blog
Rank this Week: 4749

The D: Drive | E-Discovery,…

The D: Drive | E-Discovery, Privacy and All Things Data

Covers privacy, e-discovery, data security, and cloud computing. By Davis LLP.

http://www.davis.ca/en/blog/d-drive/
  • Apr 7

    Compliance is Just the Beginning: CASL and Business Transaction

    Compliance is Just the Beginning: CASL and Business Transaction
    Many businesses are taking steps to comply with Canada’s new anti-spam legislation (“CASL”), which is coming into force on July 1, 2014. However, CASL compliance should not be the end of the story for businesses or their…
  • Mar 27

    When is an E-mail a Business Record?

    When is an E-mail a Business Record?
    Following my previous post, “E-mail Use Policies Must Be Meaningful,” it was pointed out to me, quite rightly, that a difficult part of implementing an e-mail use policy is defining what is a “business record.”…
  • Mar 24

    Email Use Policies Must Be Meaningful

    Email Use Policies Must Be Meaningful
    Coming up in the elevator this morning, I was reading the “Elevator News Network” (I am on the 60th floor, so it is hard not to stare at something!). It contained a bit of advice about Email Use Policies. The advice: Do not allow…
Rank this Week: 4817

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
  • Apr 1

    ICANN Reader: IANA Transition Away from U.S. Draws Widespread Concern

    ICANN Reader: IANA Transition Away from U.S. Draws Widespread Concern
    Three things can happen when you pass the football, and two of them are bad. A roundup of reaction to the news that the U.S. Department of Commerce will be transferring its oversight role for key functions in the domain name system to an…
  • Feb 6

    The Latest on ICANN's New gTLD Program: Business Opportunities and Legal Risk

    The Latest on ICANN's New gTLD Program: Business Opportunities and Legal Risk
    On March 5, Bloomberg BNA is putting on a free webinar, "The Latest on ICANN's gTLD Program: Today’s Business Opportunities and Legal Risks." This webinar promises to be well worth the time of anyone with a business or law practice…
  • Feb 6

    Cyberlaw Review 2014: Electronic Surveillance, Emerging Payment Technologie

    Cyberlaw Review 2014: Electronic Surveillance, Emerging Payment Technologie
    Legal experts and policy officials comment on significant developments, and likely 2014 hotspots, for electronic surveillance and emerging payment technologies.
Rank this Week: 4955