Most Popular Privacy Law Blawgs Expanded View List View

Blogs 46 - 52 of 52
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Data Security Law Journal

Data Security Law Journal

Covers data security, cloud computing, data privacy and anything E. By Al Saikali.

http://www.datasecuritylawjournal.com/
  • Nov 30

    60 Minutes Reports on Payment Card Data Breache

    60 Minutes Reports on Payment Card Data Breache
    Ever wonder how your credit card gets compromised and how the bad guys get your information? This report on tonight’s episode of 60 Minutes provides an overview of what happens from the moment you swipe your card at the point-of-sale…
  • May 26

    Why Every Business Should Care About Florida’s Information Protection Act

    Why Every Business Should Care About Florida’s Information Protection Act
    My last post described what the recently passed Florida Information Protection Act (FIPA) will do.  This post analyzes how FIPA differs from Florida’s existing breach notification law and explains why those differences will hurt or…
  • May 15

    Everything You Need To Know About Florida’s New Data Protection Law

    Everything You Need To Know About Florida’s New Data Protection Law
    The Florida Legislature recently passed the Florida Information Protection Act of 2014 (FIPA).  This post describes the FIPA and analyzes the advantages and disadvantages to businesses governed by the new law.  The FIPA must still…
Rank this Week: 3629

Trials and Tribulations

Trials and Tribulations

Covers the Elvey v. TDAmeritrade case concerning information security, spam and identity theft.

http://caringaboutsecurity.wordpress.com
  • Jul 3

    Advice for TD Ameritrade from Tim Devaney and Tom Stein

    Advice for TD Ameritrade from Tim Devaney and Tom Stein
    TD Ameritrade’s PR flacks think this is bad advice on how to handle haters, I guess.Filed under: Settlement Component
  • Jun 13

    Settlement Valuation

    Settlement Valuation
    Judge Walker repeatedly asked the former class counsel to place a value on the benefits the rejected settlement offered to the class. I think it’s doable, and no one has truly done so, so I’m going to give it a shot. The audit…
  • Jun 13

    Settlement Valuation

    Settlement Valuation
    Judge Walker repeatedly asked the former class counsel to place a value on the benefits the rejected settlement offered to the class. I think it’s doable, and no one has truly done so, so I’m going to give it a shot. The audit…
Rank this Week: 4497

Reasonable Expectation

Reasonable Expectation

Focuses on privacy and data security. By M. Scott Koller.

http://www.reasonableexpectation.com
  • Jun 30

    Are Data Breach Investigations Privileged?

    Are Data Breach Investigations Privileged?
    #150654797 / gettyimages.com Are Data Breach Investigations Privileged? Originally Published on the InfoLaw Group Blog: Over the past year, the number of data breaches has skyrocketed and, as a result, companies are facing increased risk of…
  • Mar 20

    FTC Seeks Public Comment on iKeepSafe’s Proposed Safe Harbor Program Under the Children’s Online Privacy Protection Rule

    FTC Seeks Public Comment on iKeepSafe’s Proposed Safe Harbor Program Under the Children’s Online Privacy Protection Rule
    Internet Keep Safe Coalition (iKeep Safe) has submitted a proposed safe harbor program to the Federal Trade Commission under the the agency’s Children’s Online Privacy Protection Rule. Under 16 C.F.R. 312.11, COPPA safe…
  • Feb 28

    Obama’s new cybersecurity plan a good start

    Obama’s new cybersecurity plan a good start
    I recently authored an article for the Daily Journal on the new cybersecurity framework.  You can read about it by visiting the Daily Journal.  
Rank this Week: 4325

Web Tech Law

Web Tech Law

Covers intellectual property, privacy, and social media in South Africa.

http://webtechlaw.com/our-insights
  • Apr 24

    The legalities of going paper-le

    The legalities of going paper-le
    Many people think that going digital is problematic from a legal perspective and, to a large extent, it isn't. It does require that you understand the implications and adjust your workflows to suit the digital paradigm.
  • Apr 24

    Bombs under wheelchairs, model airplanes and other stupid tweet

    Bombs under wheelchairs, model airplanes and other stupid tweet
    The last couple weeks saw two spectacular lapses in judgment in corporate Twitter accounts. The first was the pornographic US Airways tweet in response to a passenger’s complaints about a delayed flight and the second was an FNB…
  • Apr 7

    How to deal with stalkers taking photos of you

    How to deal with stalkers taking photos of you
    I spoke to Kieno Kammies on 567 CapeTalk radio this morning about a troubling trend. As you can hear from the segment, below, the concern is partly about people being photographed in suspicious ways in public. One example is a person…
Rank this Week: 3809

Coming of Edge

Coming of Edge

Discusses the legal hurdles facing startups and entrepreneurs including all intellectual property law topics. By Steven Buchwald.

http://comingofedge.com/
  • Mar 10

    Independent Creation Paper Trail To Fend Off Copyright Suit

    Independent Creation Paper Trail To Fend Off Copyright Suit
    Keeping adequate record of your software creation efforts can be very helpful to stave off copyright infringement claimsThe post Independent Creation Paper Trail To Fend Off Copyright Suits appeared first on .
  • Feb 20

    Oracle’s Copyright Victory: An Ephemeral Win

    Oracle’s Copyright Victory: An Ephemeral Win
    Despite Oracle’s efforts to utilize copyright law to asphyxiate Rimini’s business model, Rimini’s support services appear to have bright days aheadThe post Oracle’s Copyright Victory: An Ephemeral Win appeared first…
  • Feb 14

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”

    Retaliatory Cybersquatter Used Domain Name To “Get Leverage”
    After former employer declined to invest in Defendant’s new business, Defendant turned cybersquatterThe post Retaliatory Cybersquatter Used Domain Name To “Get Leverage” appeared first on .
Rank this Week: 3815

sobre privacidad y protección de…

sobre privacidad y protección de datos

Spanish language blog about privacy and data protection. By Daniel A. Lopez Carballo.

http://www.dlcarballo.com/
  • May 8

    Primeras sanciones por violación del Habeas Data en Colombia

    Primeras sanciones por violación del Habeas Data en Colombia
    Según se hacia eco la Radio Nacional de Colombia, un total de 350 sanciones, por más de mil millones de pesos,  ha impuesto la Superintendencia de Industria y Comercio por violar la nueva ley de Habeas Data. El dato lo…
  • Apr 22

    Aprobado el proyecto de ley de protección de datos de República Dominicana

    Aprobado el proyecto de ley de protección de datos de República Dominicana
    Según se hacían eco diferentes medios de comunicación, el Senado de la República Dominicana aprobó en segunda lectura el proyecto de Ley Orgánica sobre Protección de Datos de Carácter…
  • Apr 14

    Presentación de la Declaración de Lima

    Presentación de la Declaración de Lima
    El pasado viernes 12 de abril de 2013, fue presentada, en la ciudad de Lima (Perú), en el transcurso del Seminario de Derecho Constitucional la primera Declaración emanada en el seno del Observatorio Iberoamericano de…
Rank this Week: 4777

Politics of Privacy Blog

Politics of Privacy Blog

Covers privacy, liberty, security, economy and their interaction. By Andreas Busch.

http://politicsofprivacy.blogspot.com/
  • Jan 18

    Again: loss of personal data by public officials in the UK

    Again: loss of personal data by public officials in the UK
    Less than two months after the loss of the personal details of 25 million people by the UK's tax authorities (see this blog entry), another substantial loss of personal data has occurred in Britain. As the BBC website writes, a laptop…
  • Jan 7

    Jeremy Clarkson and identity theft

    Jeremy Clarkson and identity theft
    Well, first of all, a happy new year to my readers! And I am glad to be able to report that page visits to this blog more than doubled in 2007 over 2006, to well over 5000 pageviews. I am very happy about this and will take it as a reminder…
  • Nov 20

    British tax authorities lose personal details of 25 million people

    British tax authorities lose personal details of 25 million people
    A crass case of neglect and breach of data protection legislation has led to the loss of discs containing the names, addresses, dates of birth, bank account details and National Insurance numbers of 25 million people in the United Kingdom, it…
Rank this Week: 4924