Most Popular Privacy Law Blawgs Expanded View List View

Blogs 46 - 52 of 52
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Aug 29

    Texas Supreme Court Rejects Second-Class Status for Online Speech, Finds Internet Speech Injunctions Violate the First Amendment

    Texas Supreme Court Rejects Second-Class Status for Online Speech, Finds Internet Speech Injunctions Violate the First Amendment
    The Texas Supreme Court today ruled that orders preventing people who have been found liable for defamation from publishing further statements about the plaintiff are “prior restraints,” a remedy that the First Amendment rarely…
  • Aug 29

    We're All In It Together: Cosplay With Us Over Labor Day Weekend

    We're All In It Together: Cosplay With Us Over Labor Day Weekend
    Join the Electronic Frontier Foundation, io9, and a coalition of fan groups over Labor Day weekend for Project Secret Identity, a cosplay photo campaign to raise awareness of how online anonymity and privacy are key to free expression. Visit…
  • Aug 28

    Magical Drug Wins EFF’s Stupid Patent of the Month

    Magical Drug Wins EFF’s Stupid Patent of the Month
    Good news everyone! The Patent Office has granted a patent on a cure for cancer. Last December, the Patent Office issued Patent No. 8,609,915 on a “potent drug” that “rebukes cancer, cancer cells, and kills cancer.”…
Rank this Week: 4238

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
  • Aug 26

    Coinye West will not take over bitcoin’s reign on cryptocurrency

    Coinye West will not take over bitcoin’s reign on cryptocurrency
    By Melissa Barnett There’s exciting news in the world of cryptocurrency, the exchange medium that uses cryptography to secure the transactions and control the creation of new units. Bitcoin, created in 2009, was the first cryptocurrency…
  • Aug 22

    Back to school – time to get educated about the newest gTLD

    Back to school – time to get educated about the newest gTLD
    By Melissa Barnett Ready for the first day of sunrise ICANN continues to make big strides in widening the Internet playing field. To date, ICANN has invited 1,159 new gTLDs to contract, and of those 1,159 invited, 495 registry agreements have…
  • Aug 21

    Privacy law in the U.S. and Europe: University of Amsterdam Summer Course explores current issue

    Privacy law in the U.S. and Europe: University of Amsterdam Summer Course explores current issue
    By Dennis Hirsch On July 7-11, 2014, a group of 25 privacy lawyers met in a historic building overlooking the Keizersgracht, one of Amsterdam’s most beautiful canals, and spent five days learning about U.S. privacy law, European data…
Rank this Week: 4462

Web Tech Law

Web Tech Law

Covers intellectual property, privacy, and social media in South Africa.

http://webtechlaw.com/our-insights
  • Apr 24

    The legalities of going paper-le

    The legalities of going paper-le
    Many people think that going digital is problematic from a legal perspective and, to a large extent, it isn't. It does require that you understand the implications and adjust your workflows to suit the digital paradigm.
  • Apr 24

    Bombs under wheelchairs, model airplanes and other stupid tweet

    Bombs under wheelchairs, model airplanes and other stupid tweet
    The last couple weeks saw two spectacular lapses in judgment in corporate Twitter accounts. The first was the pornographic US Airways tweet in response to a passenger’s complaints about a delayed flight and the second was an FNB…
  • Apr 7

    How to deal with stalkers taking photos of you

    How to deal with stalkers taking photos of you
    I spoke to Kieno Kammies on 567 CapeTalk radio this morning about a troubling trend. As you can hear from the segment, below, the concern is partly about people being photographed in suspicious ways in public. One example is a person…
Rank this Week: 4573

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • Mar 10

    Independent Creation Paper Trail To Fend Off Copyright Suit

    Independent Creation Paper Trail To Fend Off Copyright Suit
    Keeping adequate record of your software creation efforts can be very helpful to stave off copyright infringement claimsThe post Independent Creation Paper Trail To Fend Off Copyright Suits appeared first on .
  • Feb 20

    Oracle’s Copyright Victory: An Ephemeral Win

    Oracle’s Copyright Victory: An Ephemeral Win
    Despite Oracle’s efforts to utilize copyright law to asphyxiate Rimini’s business model, Rimini’s support services appear to have bright days aheadThe post Oracle’s Copyright Victory: An Ephemeral Win appeared first…
  • Feb 14

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”
    After former employer declined to invest in Defendant’s new business, Defendant turned cybersquatterThe post Retaliatory Cybersquatter Used Domain Name To “Get Leverage” appeared first on .
Rank this Week: 4626

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 4669

E-Commerce and Tech Law Blog

E-Commerce and Tech Law Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
  • Aug 27

    DNS Policy Notes for August 27, 2014

    DNS Policy Notes for August 27, 2014
    Error: Error loading XSLT document. http://bna-stage.bna.com/WorkArea/ContentDesigner/ContentOutGoing.xslt NOTE: the SERVER is accessing this URL. Stylesheet must start either with an 'xsl:stylesheet' or an 'xsl:transform' element, or with…
  • Aug 26

    DNS Policy Notes for August 26, 2014 (Late Edition)

    DNS Policy Notes for August 26, 2014 (Late Edition)
    Topics include expert ruminations on new top-level domain registration statistics, remote observation of the IGF 2014 proceedings, and fake ICANN Twitter accounts.
  • Aug 25

    DNS Policy Notes for August 25, 2014

    DNS Policy Notes for August 25, 2014
    Topics include a prediction of 300 new gTLD applications from large cities in the next round, details on the NETmundial Initiative, worries about moves to give the GAC greater authority at ICANN, a few noteworthy events, and the latest…
Rank this Week: 4686

The D: Drive | E-Discovery,…

The D: Drive | E-Discovery, Privacy and All Things Data

Covers privacy, e-discovery, data security, and cloud computing. By Davis LLP.

http://www.davis.ca/en/blog/d-drive/
Rank this Week: 4716