February 2010 Privacy Law Top Blawgs

  1. Covers privacy, crime and security online. From Wired News.
  2. Features a discussion of medical privacy. By Jeffrey P. Drummond.
  3. Covers biometrics, HIPAA, identity theft, PATRIOT Act, phishing and more. By Davis Wright Tremaine.
  4. Features legal scholarship in law and technology topics, including intellectual property law, cyberspace law, environmental law, criminal law, health law, and privacy law.
  5. Provides global privacy and information security law updates and analysis. By Hunton & Williams.
  6. Covers data privacy, identity theft, invasion of privacy, and national security legal issues. By Proskauer Rose LLP.
  7. Covers employment related privacy issues. Published by Philip Gordon of Littler Mendelson's Privacy and Data Protection Practice Group.
  8. Provides commentary and news on developing legal issues in advertising, promotional marketing, Internet, and privacy law. By Olshan Frome Wolosky LLP.
  9. Covers privacy laws and regulations.
  10. Covers privacy law and corporate privacy policy. By Peter Fleischer, Global Privacy Counsel for Google.
  11. Covers privacy, liberty, security, economy and their interaction. By Andreas Busch.
  12. Addresses recent events in trademark, copyright, computer and privacy law. By Christina Frangiosa.
  13. Covers the Elvey v. TDAmeritrade case concerning information security, spam and identity theft.
  14. Focuses on privacy, security, data protection, technology, and financial services issues affecting corporations, governments, and individuals. By Tsibouris & Associates.
  15. Covers intellectual property law. By Raines Feldman.
  16. Covers corporate, employment, IP and privacy news.
  17. Covers the creation, collection, use, destruction and security of data. By Dentons.
  18. Covers IP/IT law, with a strong focus on copyright and internet law. By Barry Sookman.
  19. Legal news and analysis, with an emphasis on international and domestic intellectual property developments. By Shawn Sullivan.
  20. Covers data security, cloud computing, data privacy and anything E. By Al Saikali.