Most Popular Privacy Law Blawgs Expanded View List View

Blogs 46 - 52 of 52
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Sep 19

    Tor Challenge Inspires 1,635 Tor Relay

    Tor Challenge Inspires 1,635 Tor Relay
    Good news for whistleblowers, journalists, and everyone who likes to browse the Internet with an added cloak of privacy: the Tor network got a little stronger. Tor—software that lets you mask your IP address—relies on an…
  • Sep 19

    Court Lets Cisco Systems Off the Hook for Helping China Detain, Torture Religious Minoritie

    Court Lets Cisco Systems Off the Hook for Helping China Detain, Torture Religious Minoritie
    Chinese citizens who suffered forced detention, torture, and a panoply of brutal human rights abuses at the hands of the Chinese government have been engaged in a high profile court case against Silicon Valley mainstay Cisco Systems for many…
  • Sep 19

    Opportunity Missed: Why We're Not Thrilled By Restoration of PACER Access to "Old" Court Record

    Opportunity Missed: Why We're Not Thrilled By Restoration of PACER Access to "Old" Court Record
    The Administrative Office of the United States Courts (AO) announced on Friday that it would make reams of court records once again accessible through PACER, the federal courts' digital warehouse for its court files. Many advocates are…
Rank this Week: 4227

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
  • Sep 12

    Grab your passport; geographic gTLDs are jetsetting this month

    Grab your passport; geographic gTLDs are jetsetting this month
    By Melissa Barnett Twenty-three new gTLDs have been delegated since our last post. The following gTLDs have been cleared for takeoff: .network .企业 (Chinese for…
  • Sep 8

    Porter Wright launches Antitrust Law Source

    Porter Wright launches Antitrust Law Source
    By Robert J. Morgan We wanted to take a moment to announce our newest endeavor, Antitrust Law Source. Antitrust Law Source is a new site designed for visitors to quickly and easily learn about developments in this growing arena. The site…
  • Aug 26

    Coinye West will not take over bitcoin’s reign on cryptocurrency

    Coinye West will not take over bitcoin’s reign on cryptocurrency
    By Melissa Barnett There’s exciting news in the world of cryptocurrency, the exchange medium that uses cryptography to secure the transactions and control the creation of new units. Bitcoin, created in 2009, was the first cryptocurrency…
Rank this Week: 4461

Web Tech Law

Web Tech Law

Covers intellectual property, privacy, and social media in South Africa.

http://webtechlaw.com/our-insights
  • Apr 24

    The legalities of going paper-le

    The legalities of going paper-le
    Many people think that going digital is problematic from a legal perspective and, to a large extent, it isn't. It does require that you understand the implications and adjust your workflows to suit the digital paradigm.
  • Apr 24

    Bombs under wheelchairs, model airplanes and other stupid tweet

    Bombs under wheelchairs, model airplanes and other stupid tweet
    The last couple weeks saw two spectacular lapses in judgment in corporate Twitter accounts. The first was the pornographic US Airways tweet in response to a passenger’s complaints about a delayed flight and the second was an FNB…
  • Apr 7

    How to deal with stalkers taking photos of you

    How to deal with stalkers taking photos of you
    I spoke to Kieno Kammies on 567 CapeTalk radio this morning about a troubling trend. As you can hear from the segment, below, the concern is partly about people being photographed in suspicious ways in public. One example is a person…
Rank this Week: 4589

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • Mar 10

    Independent Creation Paper Trail To Fend Off Copyright Suit

    Independent Creation Paper Trail To Fend Off Copyright Suit
    Keeping adequate record of your software creation efforts can be very helpful to stave off copyright infringement claimsThe post Independent Creation Paper Trail To Fend Off Copyright Suits appeared first on .
  • Feb 20

    Oracle’s Copyright Victory: An Ephemeral Win

    Oracle’s Copyright Victory: An Ephemeral Win
    Despite Oracle’s efforts to utilize copyright law to asphyxiate Rimini’s business model, Rimini’s support services appear to have bright days aheadThe post Oracle’s Copyright Victory: An Ephemeral Win appeared first…
  • Feb 14

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”
    After former employer declined to invest in Defendant’s new business, Defendant turned cybersquatterThe post Retaliatory Cybersquatter Used Domain Name To “Get Leverage” appeared first on .
Rank this Week: 4617

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
  • Sep 19

    DNS Policy Notes for Sept. 19, 2014

    DNS Policy Notes for Sept. 19, 2014
    Topics include Russian preparations to disconnect from the outside Internet, phishing spotted in the new gTLDs, a U.S. State Department report on a Pleinpot prep meeting, privacy in Europe, and an update on ICANN's plans for another round of…
  • Sep 18

    DNS Policy Notes for Sept. 18, 2014 (Server Crash Edition)

    DNS Policy Notes for Sept. 18, 2014 (Server Crash Edition)
    Topics include attachment proceedings over the .ir top-level domain, privacy choice and fiduciary access to digital assets, new life for former .green aspirants, the FCC's net neutrality mailbag, and fretting over Internet fragmentation.
  • Sep 16

    DNS Policy Notes for Sept. 16, 2014

    DNS Policy Notes for Sept. 16, 2014
    Topics include possible new life for .music community applicant, worries about GAC dominance within ICANN, and valuing domain names.
Rank this Week: 4695

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 4683

The D: Drive | E-Discovery,…

The D: Drive | E-Discovery, Privacy and All Things Data

Covers privacy, e-discovery, data security, and cloud computing. By Davis LLP.

http://www.davis.ca/en/blog/d-drive/
  • Sep 17

    Are Municipal Governments Subject to Canada's Anti-Spam Law?

    Are Municipal Governments Subject to Canada's Anti-Spam Law?
    Canada's Anti-Spam Legislation (CASL) came into force on July 1, 2014. It is intended to protect Canadians from unsolicited commercial electronic messages and to reduce electronic threats to commerce. Under CASL, a commercial electronic…
  • Aug 6

    An Important Perspective on Data Breach Response - In Conversation with David Loukidelis, QC

    An Important Perspective on Data Breach Response - In Conversation with David Loukidelis, QC
    After publication of my article “Why Your Lawyer Should Be the First Point of Contact after a Data Breach,” I had the honour of receiving an email from someone whom I had never met. That person was David Loukidelis, QC, who has…
  • Jul 22

    Why Your Lawyer Should Be the First Point of Contact after a Data Breach

    Why Your Lawyer Should Be the First Point of Contact after a Data Breach
    Securing corporate information assets against a data breach, and responding to a data breach when it occurs, is not just a technology problem. While information security certainly has a major technological component, it is also a public…
Rank this Week: 4732