Most Popular Privacy Law Blawgs Expanded View List View

Blogs 46 - 59 of 59
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Cyberinsurance Law Blog

Cyberinsurance Law Blog

News and comments on Business Law. By Jordan M. Rand.

http://www.databreachninja.com/
  • Jul 11

    “I’m a Little Short – Gladly Pay You Tuesday?”

    “I’m a Little Short – Gladly Pay You Tuesday?”
    Solvency.  It means you can pay your tab.  Cyber attacks are occurring with greater frequency and effectiveness, resulting in an ever-increasing bill.  The cyberinsurance market is booming, but will policy premiums and carrier…
  • Feb 23

    “3 Tips for Public Pension Funds”

    “3 Tips for Public Pension Funds”
    On Tuesday, I was privileged to be part of a panel discussing cyberinsurance for public pension funds at Kessler Topaz’s Evolving Fiduciary Obligations for Institutional Investors conference, joining Victoria Hale, General Counsel of…
  • Feb 23

    “3 Tips for Public Pension Funds”

    “3 Tips for Public Pension Funds”
    On Tuesday, I was privileged to be part of a panel discussing cyberinsurance for public pension funds at Kessler Topaz’s Evolving Fiduciary Obligations for Institutional Investors conference, joining Victoria Hale, General Counsel of…
Rank this Week: 3550

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
Rank this Week: 3910

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • May 15

    The New York Bitlicense is coming: What you need to know

    The New York Bitlicense is coming: What you need to know
    As the final version of the New York BitLicense will roll out within the next 2 weeks, bitcoin startups are gearing up to enter the U.S. market. The post The New York Bitlicense is coming: What you need to know appeared first on .
  • May 12

    What Makes a Brand a Good Trademark?

    What Makes a Brand a Good Trademark?
    A suggestive trademark can be a salutary compromise between marketing and legal considerations. The post What Makes a Brand a Good Trademark? appeared first on .
  • Apr 30

    LLC., C Corp, S Corp: How to Pick a Business Structure

    LLC., C Corp, S Corp: How to Pick a Business Structure
    Few decisions are as important as choosing the right entity for your new startup. This post explores the factors that matter most when making this decision. The post LLC., C Corp, S Corp: How to Pick a Business Structure appeared first on .
Rank this Week: 4184

Data Protection Report

Data Protection Report

Covers global privacy, data protection and cybersecurity regulatory and litigation environment. By Norton Rose Fulbright.

http://www.dataprotectionreport.com/
  • Aug 16

    UK Data Protection After Brexit – UK Government Statement of Intent Contains Few Surprise

    UK Data Protection After Brexit – UK Government Statement of Intent Contains Few Surprise
    On the 7th August 2017, the UK’s Government Department for Digital, Culture, Media and Sport issued a Statement of Intent (the Statement) outlining its planned reforms of the UK’s data protection laws which are to be implemented…
  • Aug 8

    German Court: Monitoring of Employees by Key Logger is Not Allowed

    German Court: Monitoring of Employees by Key Logger is Not Allowed
    The German federal labor court held in a recent decision (Bundesarbeitsgericht, 27 July 2017 – case no. 2 AZR 681/16) that the use of evidence obtained through the use of key logger software is not permitted under current German privacy…
  • Aug 3

    Senators Introduce IoT Cybersecurity Bill

    Senators Introduce IoT Cybersecurity Bill
    On August 1, 2017, Senators unveiled a bipartisan bill to mandate baseline cybersecurity requirements for internet connected devices purchased by the federal government. Recent attacks demonstrate that connected devices, which make up the…
Rank this Week: 4225

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 4261

Web Tech Law

Web Tech Law

Covers intellectual property, privacy, and social media in South Africa.

http://webtechlaw.com/
  • Nov 23

    Donate to SAFLII and support open access to the law

    Donate to SAFLII and support open access to the law
    SAFLII is a vital cog in the broader movement to safeguard democracy in South Africa through open access to the law. SAFLII relies on donations to operate. Make your donation today, before it is too late. The post Donate to SAFLII and support…
  • Nov 3

    The State Capture Report downloads, analysis and new

    The State Capture Report downloads, analysis and new
    Update (2016-11-08): Added a new section titled “Interviews with President Zuma” with embedded audio recordings of interviews conducted by the Public Protector. The State Capture Report is the culmination of a revealing…
  • May 23

    Japanese theft from Standard Bank – leak?

    Japanese theft from Standard Bank – leak?
    The news about the Japanese theft from Standard Bank using roughly 1,400 cash withdrawals from Japanese bank ATMs raises serious questions about Standard Bank's security and the possibility of a data leak. The post Japanese theft from…
Rank this Week: 4326

Primary Opinion

Primary Opinion

Covers corporate, employment, IP and privacy news.

http://primaryopinion.com/
  • Nov 27

    Social media marketing for lawyers and law firm

    Social media marketing for lawyers and law firm
    Law firms of all sizes are now embracing social media as a means to showcase expertise and reach new customers. But, opening a Twitter, LinkedIn or Google+ account is only the first part of the process. Here are five pointers for realising…
  • Oct 13

    Legal opinion round up: CJEU’s ruling on registering 3D object trademark

    Legal opinion round up: CJEU’s ruling on registering 3D object trademark
    3D shape marks took another battering at the end of September with the European Court of Justice (CJEU) ruling that such trademarks can be declared invalid if the shape can be linked ‘essentially’ or ‘substantially’ to…
  • Oct 7

    Meet our independent blogger

    Meet our independent blogger
    Our new content portal www.primaryopinion.com draws together the best of the IP industry’s news, commentary and knowledge, so that IP professionals, in-house counsel and business heads can access it on one up-to-date platform. That…
Rank this Week: 4426

Technology, Telecom and Internet…

Technology, Telecom and Internet Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
Rank this Week: 4463

Data Breach Lawyer Blog

Data Breach Lawyer Blog

Covers intellectual property law. By Raines Feldman.

http://www.databreachlawyerblog.com/
  • Oct 24

    Trade Secrets and Internet Scraping

    Trade Secrets and Internet Scraping
    Recently, our cyber liability team discussed the impact internet data scraping has had upon trade secrets litigation.  Trade secrets cases are tough to win as plaintiffs.  The availability of competitive data online presents…
  • Oct 24

    Trade Secrets and Internet Scraping

    Trade Secrets and Internet Scraping
    Recently, our cyber liability team discussed the impact internet data scraping has had upon trade secrets litigation.  Trade secrets cases are tough to win as plaintiffs.  The availability of competitive data online presents…
  • Aug 30

    Be Mindful of Statute of Limitations for Internet Defamation

    Be Mindful of Statute of Limitations for Internet Defamation
    Often, data breaches are associated with internet defamation or other torts like impersonation.  Many times we come across strong defamation cases that cannot proceed because the potential client has waited too long to take action.…
Rank this Week: 4483

Cybersecurity Lawyer Forum

Cybersecurity Lawyer Forum

Covers business and privacy law. By Jeffer Mangels Butler & Mitchell LLP.

http://cybersecurity.jmbm.com/
  • Aug 17

    HBO Hack Illustrates That It’s Hard to Tell Exactly What’s Been Compromised

    HBO Hack Illustrates That It’s Hard to Tell Exactly What’s Been Compromised
    There may be much more missing than the headlines suggest. Some 30 million people watched the Season 7 premiere of “Game of Thrones,” according to its creator, HBO. It’s one of the hottest media properties in years. The…
  • Aug 3

    Why Data Security Is So Hard (and what to do about it)

    Why Data Security Is So Hard (and what to do about it)
    It’s ironic: when global threats are in the news every day, their ubiquity makes them easy to ignore. Whether they be political threats, climate threats, or data security threats, we can become numb to ever-present risk. Add in the…
  • Jul 7

    Beyond Breach Notification

    Beyond Breach Notification
    Ever since California adopted the nation’s first breach notification law in 2002, companies that have suffered a data breach have focused on whether and how to notify their customers, employees and others of the nature and extent of the…
Rank this Week: 4605

Hunton Retail Law Resource Blog

Hunton Retail Law Resource Blog

Analysis and Insight in Retail Law

https://www.huntonretailindustryblog.com/
  • Aug 17

    NLRB No Longer Controlled by Labor Union Appointee

    NLRB No Longer Controlled by Labor Union Appointee
    On August 2, 2017, the U.S. Senate confirmed one of President Trump’s two management-side appointees, Marvin Kaplan, to the National Labor Relations Board in a contentious vote along party lines. Kaplan was sworn in on August 10, 2017,…
  • Aug 16

    Santa Barbara City Council Strikes Back Against Retail Malaise

    Santa Barbara City Council Strikes Back Against Retail Malaise
    Recently, the Santa Barbara City Council, in an effort to combat the retail malaise on State Street in Downtown Santa Barbara, has approved a pilot program that would streamline the permit and review process for potential commercial tenants.…
  • Aug 15

    Consumer Protection in Retail: Weekly Roundup

    Consumer Protection in Retail: Weekly Roundup
    This past week, several consumer actions made headlines that affect the retail industry. Continue reading for our weekly roundup. … Continue Reading
Rank this Week: 4754

Privacy Compliance & Data Security

Privacy Compliance & Data Security

Covers data breach prevention and responses. By Fox & Rothschild LLP.

https://dataprivacy.foxrothschild.com/
  • Aug 17

    Hackers Surveyed on Their Favorite Ways to Access Your Data

    Hackers Surveyed on Their Favorite Ways to Access Your Data
    Cybercrooks’ preferred path to critical data is through privileged accounts, those held by users who have broad access and powers within the target’s network. That’s according to a recent survey conducted by the…
  • Aug 15

    NIST Issues New Password Security Recommendations: Keep It Simple, Long and Memorable

    NIST Issues New Password Security Recommendations: Keep It Simple, Long and Memorable
    Shata Stucky writes: The United States National Institute for Standards and Technology (NIST) has issued new guidelines for creating secure passwords.  NIST guidelines, which are directed to “federal government systems,”…
  • Aug 14

    Law360 Article: Why Today’s Law Firm Needs a Chief Privacy Officer

    Law360 Article: Why Today’s Law Firm Needs a Chief Privacy Officer
    Fox Rothschild partner and firm Chief Privacy Officer Mark G. McCreary sees a trend: Law firms are increasingly recognizing that naming a lawyer to lead data security and privacy efforts is “an essential ingredient in good…
Rank this Week: 4872

Data Privacy Alert

Data Privacy Alert

Covers privacy, data protection, information security, consumer protection, information management, records retention, cybercrimes and data breaches. By Montgomery McCracken Walker & Rhoads LLP.

https://privacyblog.mmwr.com/
  • Aug 1

    Will the Rise of the Cell Phone Mean the Death of the Third-Party Doctrine?

    Will the Rise of the Cell Phone Mean the Death of the Third-Party Doctrine?
    This guest post was authored by Molly Dolinger, a summer associate with Montgomery McCracken. There are currently more cell phones in the U.S. than there are people. Given the increasingly mobile-dependent state of our society, it should…
  • Aug 2

    No Harm, No Foul? Not According to the FTC’s LabMD Decision

    No Harm, No Foul? Not According to the FTC’s LabMD Decision
    This post was co-authored by Mara Smith, a summer associate with Montgomery McCracken, and Stephen Grossman, a partner and chair of Montgomery McCracken’s Data Privacy Practice Group. Last Friday, the FTC reversed an administrative…
  • Jul 28

    HIPAA Privacy and Security: Not Just for Healthcare Provider

    HIPAA Privacy and Security: Not Just for Healthcare Provider
    This guest post was authored by Bianca A. Valcarce, a summer associate with Montgomery McCracken. HIPAA regulations don’t just impact doctors and health plans.  Lawyers, Certified Public Accountants, billing companies, and…
Rank this Week: 4861

Trust Anchor

Trust Anchor

Covers cyber security, data privacy and regulatory compliance. By Orrick.

http://blogs.orrick.com/trustanchor/
Rank this Week: 4857