Most Popular Privacy Law Blawgs Expanded View List View

Blogs 46 - 52 of 52
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Oct 24

    Automated Mass Surveillance is Unconstitutional, EFF Explains in Jewel v. NSA

    Automated Mass Surveillance is Unconstitutional, EFF Explains in Jewel v. NSA
    Today EFF filed our latest brief in Jewel v. NSA, our longstanding case on behalf of AT&T customers aimed at ending the NSA’s dragnet surveillance of millions of ordinary Americans’ communications. The brief specifically…
  • Oct 24

    Two Reports About FBI's Use of National Security Letters Reissued

    Two Reports About FBI's Use of National Security Letters Reissued
    Even the reports that are supposed to provide transparency about the FBI's use of national security lettters (NSLs) are secret—or at least a couple dozen pages of them are. NSLs are nonjudicial orders that allow the FBI to obtain…
  • Oct 24

    Cops Need to Obey Facebook’s Rule

    Cops Need to Obey Facebook’s Rule
    Facebook scolded the Drug Enforcement Administration this week after learning that a narcotics agent had impersonated a user named Sondra Arquiett on the social network in order to communicate and gather intelligence on suspects. In a…
Rank this Week: 4186

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
  • Oct 6

    ‘Patent troll’ cannot “derail” FTC investigation

    ‘Patent troll’ cannot “derail” FTC investigation
    By Jay Levine and Allen Carter Have to give them an “A” for effort. “Patent troll” MPHJ Technology Investments, LLC sued the FTC hoping to shut down its investigation into the company because the investigation violated…
  • Oct 2

    The latest surge in data breaches highlight key takeaways for employer

    The latest surge in data breaches highlight key takeaways for employer
    By Brian Hall The recent data breaches at Target, Home Depot, and Jimmy John’s have kept data privacy and security in the news lately. But from a legal perspective, there has never been much that the victims of these breaches could do…
  • Sep 12

    Grab your passport; geographic gTLDs are jetsetting this month

    Grab your passport; geographic gTLDs are jetsetting this month
    By Melissa Barnett Twenty-three new gTLDs have been delegated since our last post. The following gTLDs have been cleared for takeoff: .network .企业 (Chinese for…
Rank this Week: 4437

Web Tech Law

Web Tech Law

Covers intellectual property, privacy, and social media in South Africa.

http://webtechlaw.com/our-insights
  • Apr 24

    The legalities of going paper-le

    The legalities of going paper-le
    Many people think that going digital is problematic from a legal perspective and, to a large extent, it isn't. It does require that you understand the implications and adjust your workflows to suit the digital paradigm.
  • Apr 24

    Bombs under wheelchairs, model airplanes and other stupid tweet

    Bombs under wheelchairs, model airplanes and other stupid tweet
    The last couple weeks saw two spectacular lapses in judgment in corporate Twitter accounts. The first was the pornographic US Airways tweet in response to a passenger’s complaints about a delayed flight and the second was an FNB…
  • Apr 7

    How to deal with stalkers taking photos of you

    How to deal with stalkers taking photos of you
    I spoke to Kieno Kammies on 567 CapeTalk radio this morning about a troubling trend. As you can hear from the segment, below, the concern is partly about people being photographed in suspicious ways in public. One example is a person…
Rank this Week: 4572

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • Mar 10

    Independent Creation Paper Trail To Fend Off Copyright Suit

    Independent Creation Paper Trail To Fend Off Copyright Suit
    Keeping adequate record of your software creation efforts can be very helpful to stave off copyright infringement claimsThe post Independent Creation Paper Trail To Fend Off Copyright Suits appeared first on .
  • Feb 20

    Oracle’s Copyright Victory: An Ephemeral Win

    Oracle’s Copyright Victory: An Ephemeral Win
    Despite Oracle’s efforts to utilize copyright law to asphyxiate Rimini’s business model, Rimini’s support services appear to have bright days aheadThe post Oracle’s Copyright Victory: An Ephemeral Win appeared first…
  • Feb 14

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”
    After former employer declined to invest in Defendant’s new business, Defendant turned cybersquatterThe post Retaliatory Cybersquatter Used Domain Name To “Get Leverage” appeared first on .
Rank this Week: 4629

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
  • Oct 1

    DNS Policy Notes for Oct. 1, 2014

    DNS Policy Notes for Oct. 1, 2014
    Topics include a late objection to the Tata Sons Ltd. application for .tata, a request for reconsideration of the CPE panel decision awarding .radio to the European Broadcasting Union, and the federal bankruptcy courts' proposal that domain…
  • Sep 30

    DNS Policy Notes for Sept. 30, 2014

    DNS Policy Notes for Sept. 30, 2014
    Topics include the latest wrinkle in the litigation over the nature of property rights in a ccTLD, a blast at the ICANN EWG report on a successor to the WHOIS registrant contact database, evidence of some last-mile lawyering over the…
  • Sep 26

    DNS Policy Notes for Sept. 26, 2014

    DNS Policy Notes for Sept. 26, 2014
    Topics include Namecoin's .bit TLD and trademark protections there, one trademark owner's long slog through the domain name recuperation process, a suggestion that free prioritization is as harmful as paid prioritization, ruminations about…
Rank this Week: 4683

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 4698

The D: Drive | E-Discovery,…

The D: Drive | E-Discovery, Privacy and All Things Data

Covers privacy, e-discovery, data security, and cloud computing. By Davis LLP.

http://www.davis.ca/en/blog/d-drive/
  • Oct 16

    Medical Device Regulation in Cyberspace

    Medical Device Regulation in Cyberspace
    When designing any electronic tool, whether it be a smart phone or a game console, it is always important for the manufacturer to strike a balance between functionality, or ease of use, and data privacy and security. Nowhere is the need to…
  • Sep 22

    Privacy Law Litigation in Ontario - From the Bank to the Hospital and Beyond

    Privacy Law Litigation in Ontario - From the Bank to the Hospital and Beyond
    Health information is generally regarded as among the most sensitive of personal information. Even members of the Millennial Generation, who regularly share details of their personal lives on social media, are troubled by the thought of…
  • Sep 17

    Are Municipal Governments Subject to Canada's Anti-Spam Law?

    Are Municipal Governments Subject to Canada's Anti-Spam Law?
    Canada's Anti-Spam Legislation (CASL) came into force on July 1, 2014. It is intended to protect Canadians from unsolicited commercial electronic messages and to reduce electronic threats to commerce. Under CASL, a commercial electronic…
Rank this Week: 4763