Most Popular Privacy Law Blawgs Expanded View List View

Blogs 1 - 45 of 58
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Threat Level

Threat Level

Covers privacy, crime and security online. From Wired News.

http://www.wired.com/threatlevel
  • Aug 29

    Inside an Epic Hotel Room Hacking Spree

    Inside an Epic Hotel Room Hacking Spree
    A global vulnerability in hotel keycard locks was a security disaster—and the opportunity of a lifetime for one burglar. The post Inside an Epic Hotel Room Hacking Spree appeared first on WIRED.
  • Jun 5

    Feds Charge NSA Contractor Accused of Exposing Russian Hacking

    Feds Charge NSA Contractor Accused of Exposing Russian Hacking
    The arrest of an alleged source of a classified leak to the Intercept offers a lesson in the risks of spilling secrets. The post Feds Charge NSA Contractor Accused of Exposing Russian Hacking appeared first on WIRED.
  • Jun 2

    Hack Brief: Dangerous ‘Fireball’ Adware Infects a Quarter Billion PC

    Hack Brief: Dangerous ‘Fireball’ Adware Infects a Quarter Billion PC
    A widespread adware infection hides the ability to inflict far worse than spammy browser tweaks. The post Hack Brief: Dangerous 'Fireball' Adware Infects a Quarter Billion PCs appeared first on WIRED.
Rank this Week: 10

Inforrm\'s Blog

Inforrm\'s Blog

Discusses issues of media law and responsibility with a special focus on libel and privacy law and the balance between the two.

https://inforrm.wordpress.com/
Rank this Week: 122

Privacy and Data Security Law

Privacy and Data Security Law

Covers the creation, collection, use, destruction and security of data. By Dentons.

http://www.privacyanddatasecuritylaw.com/
  • Sep 21

    Canada’s Privacy Commissioner Pursues a Stronger Consent Framework and More Proactive Enforcement

    Canada’s Privacy Commissioner Pursues a Stronger Consent Framework and More Proactive Enforcement
    On September 21st, 2017, Daniel Therrien, Canada’s Federal Privacy Commissioner, tabled his annual report to Canada’s Parliament today. The report to Parliament includes results and recommendations with respect to the OPC’s…
  • Sep 5

    Déjà Vu – Canada’s Breach Reporting and Notification Requirement

    Déjà Vu – Canada’s Breach Reporting and Notification Requirement
    On September 2, 2017, the Ministry of Innovation, Science and Economic Development Canada (ISED) published draft Breach of Security Safeguards Regulations. The draft Regulations will be open for comment for 30 days. If the Regulations are not…
  • Aug 23

    Data processors under the GDPR

    Data processors under the GDPR
    In our monthly GDPR Updates we discuss various key issues of the General Data Protection Regulation, (EU) 2016/679 (the GDPR), which applies from 25 May 2018. With the introduction of the GDPR, the existing Directive 95/46/EC and its…
Rank this Week: 371

Deeplinks Blog

Deeplinks Blog

Covers bloggers' rights, DMCA, DRM, intellectual property, privacy and security issues. From the Electronic Frontier Foundation.

https://www.eff.org/deeplinks
  • Nov 21

    The Senate’s Liberty Act Helps Close the “Backdoor”

    The Senate’s Liberty Act Helps Close the “Backdoor”
    Take the language of one NSA surveillance reauthorization bill and add a few strong reform proposals from another, and what do you get? A bill that helps protect Americans from the warrantless search of the content of their emails, text…
  • Nov 21

    Today—and Every Day—We Fight to Defend the Open Internet

    Today—and Every Day—We Fight to Defend the Open Internet
    Today, we heard from the Federal Communications Commission (FCC) about its plans to devastate Network Neutrality.  Instead of responding to the millions of Americans who want to protect the free and open Internet, the FCC instead is…
  • Nov 21

    Treasury Department Concludes Fraud Investigation into ComputerCOP "Internet Safety" Software

    Treasury Department Concludes Fraud Investigation into ComputerCOP "Internet Safety" Software
    Three years ago, EFF exposed how hundreds of law enforcement agencies were putting families at risk by distributing free ComputerCOP “Internet safety” software that actually transmitted keystrokes unencrypted to a third-party…
Rank this Week: 728

Privacy & Information Security…

Privacy & Information Security Law Blog

Provides global privacy and information security law updates and analysis. By Hunton & Williams.

https://www.huntonprivacyblog.com/
  • Nov 21

    UK Information Commissioner Publishes Advice on BCR Applications under the GDPR

    UK Information Commissioner Publishes Advice on BCR Applications under the GDPR
    On November 20, 2017, the UK Information Commissioner's Office published guidance on applications for Binding Corporate Rules to comply with requirements under the EU General Data Protection Regulation.… Continue Reading
  • Nov 16

    FTC Seeks Public Comment on Sears’ Petition to Modify Prior Order on Consumer Tracking

    FTC Seeks Public Comment on Sears’ Petition to Modify Prior Order on Consumer Tracking
    On November 8, 2017, Sears Holding Management Corporation requested that the FTC reopen and modify a 2009 Commission Order settling charges that Sears inadequately disclosed the scope of consumer data collected through the company’s…
  • Nov 15

    German Privacy Laws Intersect with Discovery in a Patent Case

    German Privacy Laws Intersect with Discovery in a Patent Case
    On November 8, 2017, the United States District Court for the Northern District of California ordered German defendants in an ongoing patent suit to produce a particular database, despite its claims that such production would violate German…
Rank this Week: 516

Information Technology Law Blog

Information Technology Law Blog

Covers social media, e-discovery, privacy, and intellectual property. By Foster Swift Collins & Smith PC.

http://www.michiganitlaw.com/
  • Nov 19

    Business Rap: Investing in Single-Family Home

    Business Rap: Investing in Single-Family Home
    On November 7, Foster Swift Business Attorney John Mashni, joined a round table discussion with other business professionals on Business Rap, a weekly podcast featuring Mid-Michigan's brightest business owners and decision makers discussing…
  • Nov 12

    Are Ransomware Payments Tax Deductible?

    Are Ransomware Payments Tax Deductible?
    Earlier this year it was revealed that hackers had seized 1.5 terabytes of data from HBO, and over the course of the summer the hackers released the stolen property, including script summaries for "Game of Thrones," as well as scripts and…
  • Nov 1

    Forming a start-up venture with others? Consider a Founders' Agreement.

    Forming a start-up venture with others? Consider a Founders' Agreement.
    Co-founders of a start-up venture often find themselves excited and enthusiastic about getting their business idea off the ground. Amidst the whirlwind of developing a product or service and forming a team, it can be easy for the founders of…
Rank this Week: 992

Clancco: Art & Law

Clancco: Art & Law

Covers the relationship between art and law with a focus on intellectual property, nonprofit tax-exempt organizations, free speech, and contemporary art. By Sergio Muñoz Sarmiento.

http://clancco.com/wp
  • Nov 17

    Government claims Guantanamo detainee art is U.S. property

    Government claims Guantanamo detainee art is U.S. property
    And thus, the U.S. government can do what it wants with that artwork, including burn it. If the U.S. government was smart, they would put it up for auction at Christie’s and with the billion-dollar proceeds, pay off the national debt.
  • Nov 15

    “Maybe I’ll have Ross paint a picture of the seven-figure check that Mary paid me to settle.”

    “Maybe I’ll have Ross paint a picture of the seven-figure check that Mary paid me to settle.”
    Actor Alec Baldwin tells The New Yorker quite a bit regarding art dealer Mary Boone’s recent seven-figure settlement concerning his lawsuit against her for fraud. Background here.
  • Nov 14

    Olga Viso steps down as Executive Director of the Walker Art Center

    Olga Viso steps down as Executive Director of the Walker Art Center
    The board of trustees of the Walker Art Center in Minneapolis, Minnesota has announced that Olga Viso is stepping down from her post as the institution’s executive director. The board will create a search committee for a new executive…
Rank this Week: 595

Socially Aware Blog

Socially Aware Blog

Covers the law and business of social media. By Morrison Foerster.

http://www.sociallyawareblog.com/
Rank this Week: 947

Data Privacy Monitor

Data Privacy Monitor

Covers data privacy, security and social media subjects. By Baker Hostetler.

http://www.dataprivacymonitor.com/
  • Nov 8

    Moving Beyond Passwords – Does Your Face Raise Privacy Concerns?

    Moving Beyond Passwords – Does Your Face Raise Privacy Concerns?
    Phishing attacks continue to be the root cause of a considerable number of data breaches. Typically, these incidents occur when employees are enticed into giving up their login credentials in response to a cleverly designed, yet fake email.…
  • Nov 7

    From the Mouths of Babes: FTC Issues COPPA Enforcement Policy Regarding Voice Recording

    From the Mouths of Babes: FTC Issues COPPA Enforcement Policy Regarding Voice Recording
    On October 23, the Federal Trade Commission (FTC) released new guidance on how the Children’s Online Privacy Protection Act (COPPA) Rule may apply to audio recordings of children’s voices collected by websites and online services.…
  • Oct 23

    Deception and Unfair Practices Come Preinstalled

    Deception and Unfair Practices Come Preinstalled
    Lenovo, a manufacturer of personal computers, recently agreed, among other things, to implement a software security program in a settlement with the Federal Trade Commission (FTC) over issues with third-party software preinstalled on some…
Rank this Week: 987

Fair Competition Law Blog

Fair Competition Law Blog

Covers trade secrets, noncompetes, privacy and security, the Computer Fraud and Abuse Act, trademarks, copyrights, and business torts. By Russell Beck.

http://faircompetitionlaw.com
  • Oct 31

    Taking AIM at the Hearing on Massachusetts Trade Secrets and Noncompete Bill

    Taking AIM at the Hearing on Massachusetts Trade Secrets and Noncompete Bill
    Today, the Massachusetts Joint Committee on Labor and Workforce Development held a hearing on the 8 bills involving noncompetes or trade secrets currently pending at the State House. As many of you will remember, this process started in…
  • Oct 29

    Trade Secret and Noncompete Survey – National Case Graph (Updated 10-29-2017)

    Trade Secret and Noncompete Survey – National Case Graph (Updated 10-29-2017)
    In preparation for an upcoming discussion of trade secrets law for PLI in San Francisco (Trade Secrets 2017: What Every Lawyer Should Know), I reran my chart of noncomepte and trade secrets decisions. As regular readers of this blog…
  • Oct 21

    More updates to the Changing Noncompete | Trade Secrets Laws Page

    More updates to the Changing Noncompete | Trade Secrets Laws Page
    It turns out that I missed a few bills! New York:  Two identical bills (one in the Assembly (A 6419) and one in the Senate (S 4688)) to adopt the Uniform Trade Secrets Act; and one (S 1204) that provides a procedural mechanism for…
Rank this Week: 558

The Privacy Law Site

The Privacy Law Site

Covers privacy laws and regulations.

http://privacy-law.blogspot.com/
  • Mar 25

    White House to Propose End to Bulk Collection

    White House to Propose End to Bulk Collection
    According to the The New York Times, President Obama plans to propose legislation that would end bulk collection of phone records under Sec. 215 of the Patriot Act, keep the records in the hands of the phone companies, and require…
  • Jun 29

    26 Senators Seek Details on Information Collection from NSA

    26 Senators Seek Details on Information Collection from NSA
    26 Senators have sent a letter to DNI James Clapper seeking examples of how bulk collection of phone records information from provided unique intelligence.The AP reports the story here.
  • Jun 29

    COPPA Limits on Collection of Children's Information Applies to Apps as of July 1, 2013

    COPPA Limits on Collection of Children's Information Applies to Apps as of July 1, 2013
    Congress amended COPPA in 2012 to cover online services such as apps. As was previously the case, the law only applies to apps "directed at" children under the age of 13, or have actual knowledge of collection of personal information from…
Rank this Week: 692

Politics of Privacy Blog

Politics of Privacy Blog

Covers privacy, liberty, security, economy and their interaction. By Andreas Busch.

http://politicsofprivacy.blogspot.com/
  • Jan 18

    Again: loss of personal data by public officials in the UK

    Again: loss of personal data by public officials in the UK
    Less than two months after the loss of the personal details of 25 million people by the UK's tax authorities (see this blog entry), another substantial loss of personal data has occurred in Britain. As the BBC website writes, a laptop…
  • Jan 7

    Jeremy Clarkson and identity theft

    Jeremy Clarkson and identity theft
    Well, first of all, a happy new year to my readers! And I am glad to be able to report that page visits to this blog more than doubled in 2007 over 2006, to well over 5000 pageviews. I am very happy about this and will take it as a reminder…
  • Nov 20

    British tax authorities lose personal details of 25 million people

    British tax authorities lose personal details of 25 million people
    A crass case of neglect and breach of data protection legislation has led to the loss of discs containing the names, addresses, dates of birth, bank account details and National Insurance numbers of 25 million people in the United Kingdom, it…
Rank this Week: 863

Inside Privacy

Inside Privacy

Covers global privacy and data security. By Covington & Burling LLP.

http://www.insideprivacy.com
  • Nov 21

    FCC Poised to Release Draft Order on Net Neutrality Overhaul

    FCC Poised to Release Draft Order on Net Neutrality Overhaul
    FCC Chairman Ajit Pai announced today that at its December 14 open meeting, the FCC will vote on an overhaul of the net neutrality framework adopted by the prior Administration in 2015.  The full text of the draft order will be released…
  • Nov 16

    White House Releases Vulnerability Equities Policy and Processe

    White House Releases Vulnerability Equities Policy and Processe
    The White House released on November 15, 2017 the Vulnerabilities Equities Policy and Process for the United States Government (“VEP”) — the process by which the Government determines whether to disseminate or restrict…
  • Nov 14

    FTC Seeks Comment on Petition to Modify 2009 Sears Order Concerning Online Browsing Tracking

    FTC Seeks Comment on Petition to Modify 2009 Sears Order Concerning Online Browsing Tracking
    The Federal Trade Commission (“FTC”) is soliciting public comments on a petition filed by Sears Holdings Management (“Sears”) to reopen and modify a 2009 FTC order regarding the tracking of personal information on…
Rank this Week: 1500

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 1304

Hunton Retail Law Resource Blog

Hunton Retail Law Resource Blog

Analysis and Insight in Retail Law

https://www.huntonretailindustryblog.com/
  • Nov 21

    New York Proposes Predictable Scheduling Regulations for Employee

    New York Proposes Predictable Scheduling Regulations for Employee
    Recently, the New York Department of Labor released a set of proposed regulations affecting the Minimum Wage Order for Miscellaneous Industries and Occupations, which applies to most employers, except hotels and restaurants. … Continue…
  • Nov 20

    A Unique Situation for a Unique Asset

    A Unique Situation for a Unique Asset
    A mall located in West Los Angeles has been put up for sale by its owner, Santa Monica-based REIT Macerich Co. Although the mall is facing many of the same systemic pressures that other malls are facing nationwide, those are not the only…
  • Nov 15

    Consumer Protection in Retail: Weekly Roundup

    Consumer Protection in Retail: Weekly Roundup
    This past week, several consumer actions made headlines that affect the retail industry. Continue reading for our weekly roundup. … Continue Reading
Rank this Week: 2116

Privacy and Security Law Blog

Privacy and Security Law Blog

Covers biometrics, HIPAA, identity theft, PATRIOT Act, phishing and more. By Davis Wright Tremaine.

http://www.privsecblog.com/
Rank this Week: 1730

Business Litigation Info

Business Litigation Info

Covers business litigation, intellectual property, data security, and advertising and media. By Faruki Ireland & Cox P.L.L.

http://www.ficlaw.com/blog/
  • Nov 21

    November 2017 Website Newsletter

    November 2017 Website Newsletter
    The Benchmark Litigation 2018 Guide once again ranked Faruki Ireland Cox Rhinehart & Dusing P.L.L. as one of Ohio’s preeminent litigation firms, naming it one of only eleven firms statewide to receive Benchmark’s “highly…
  • Nov 20

    Do Employers Have a Duty To Protect Their Employees’ Personal Information From Data Breaches?

    Do Employers Have a Duty To Protect Their Employees’ Personal Information From Data Breaches?
    According to the federal court in the Southern District of New York, the answer is a resounding yes.  In a putative class action filed on behalf of Transperfect employees whose personal information was disclosed as a result of a…
  • Nov 17

    Faruki+ Welcomes New Attorney

    Faruki+ Welcomes New Attorney
    Faruki Ireland Cox Rhinehart & Dusing PLL is pleased to welcome Melissa Schuett as its newest attorney.  Prior to joining the firm, Melissa served as the Staff Attorney to Judge Patrick DeWine in the First District Court of…
Rank this Week: 3797

Copyright, Intellectual Property,…

Copyright, Intellectual Property, Computer, Internet, e-Commerce Law

Covers IP/IT law, with a strong focus on copyright and internet law. By Barry Sookman.

http://www.barrysookman.com
Rank this Week: 1170

Workplace Privacy, Data Management…

Workplace Privacy, Data Management & Security Report

Covers data security, HIPAA, identity theft and workplace privacy. By Jackson Lewis.

http://www.workplaceprivacyreport.com
  • Nov 19

    Elder Abuse: Are Granny Cams a Solution, a Compliance Burden, or Both?

    Elder Abuse: Are Granny Cams a Solution, a Compliance Burden, or Both?
      In Minnesota, 97% of the 25,226 allegations of elder abuse (neglect, physical abuse, unexplained serious injuries and thefts) in state-licensed senior facilities in 2016 were never investigated. This prompted Minnesota Governor, Mark…
  • Nov 16

    Lessons To Be Learned From The Breach Of Nearly 500,000 Individual Health Records Reported In September 2017

    Lessons To Be Learned From The Breach Of Nearly 500,000 Individual Health Records Reported In September 2017
    A recent report indicates that nearly 500,000 individual health records were breached in September 2017. This figure is taken from the 39 healthcare data breaches involving more than 500 records that were reported to the Department of Health…
  • Nov 13

    SCOTUS Will Not Review CFAA Password Sharing Case

    SCOTUS Will Not Review CFAA Password Sharing Case
    The United State Supreme Court recently denied certiorari in Nosal v. United States, 16-1344, declining to weigh in on the scope of unauthorized access under the Computer Fraud and Abuse Act (“CFAA”). The Ninth Circuit held in…
Rank this Week: 1562

www.lawblogswitzerland.ch

www.lawblogswitzerland.ch

Covers Swiss, European and international legal news. It focuses on data protection, privacy, technology law, IT/IP law, criminal law, administrative law, civil law, tax law, banking and finance law, bankruptcy, competition law and construction as well as real estate law.

http://www.lawblogswitzerland.ch
Rank this Week: 2006

techblawg

techblawg

Focuses primarily on issues involving the intersection of law, technology and finance. By David Ma.

http://david-ma.ca/
  • Nov 16

    weekly tweet roundup

    weekly tweet roundup
    functional integration of human brain tissue in brains of rats raises ethical questions. and is also creepy. https://t.co/RiUT3eRAmb 2017-11-10 researchers use gene therapy to reconstruct almost all the skin of a child.…
  • Nov 9

    weekly tweet roundup

    weekly tweet roundup
    tartup creates ultrasound device that fits in a pocket & 1/50th the cost of a traditional device. impressive. https://t.co/MWubEi2pky 2017-11-07 applying the cake cutting method to eliminate gerrymandering. interesting.…
  • Nov 2

    weekly tweet roundup

    weekly tweet roundup
    adversarial machine learning – the implications of countermeasures designed to fool ai. interesting. https://t.co/wl4oJGNEL4 2017-10-31
Rank this Week: 3545

Technology, Telecom and Internet…

Technology, Telecom and Internet Blog

Posts on variety of internet law issues, with a focus on domain names, internet governance, social media, internet freedom and privacy. By Bloomberg BNA.

http://www.bna.com/ecommerce-tech-law-blog/
Rank this Week: 1179

Privacy Compliance & Data Security

Privacy Compliance & Data Security

Covers data breach prevention and responses. By Fox & Rothschild LLP.

https://dataprivacy.foxrothschild.com/
  • Nov 14

    Nonprofits Aren’t Immune From or Prepared for Cyberattack

    Nonprofits Aren’t Immune From or Prepared for Cyberattack
    The Financial Times reports that many nonprofits are vulnerable to cyberattacks. Many charities simply don’t want to invest time and money defending against hackers. A 2016 study found about half of nonprofits…
  • Nov 7

    Hackers Increasingly Using Weak RDP Credentials in Ransomware Attack

    Hackers Increasingly Using Weak RDP Credentials in Ransomware Attack
    Industry publication Data Breach Today reports hackers are increasingly exploiting weak Remote Desktop Protocol (RDP) credentials to launch ransomware attacks. “Many enterprises use remote desktop protocol to remotely administer…
  • Oct 27

    Security May Be the Silver Lining in Cloud Computing, Study Reveal

    Security May Be the Silver Lining in Cloud Computing, Study Reveal
    Cloud computing offers greater flexibility, speed, and convenience, but some businesses were hesitating to take advantage of the technology due to fears of increasing vulnerability to cyberattacks. But a recent study reveals a marked increase…
Rank this Week: 2338

New Media & Technology Law Blog

New Media & Technology Law Blog

Covers intellectual property, data security, online marketing and online commerce. By Proskauer.

http://newmedialaw.proskauer.com
  • Nov 14

    SEC Chairman Jay Clayton’s Remarks on ICO

    SEC Chairman Jay Clayton’s Remarks on ICO
    In his remarks at a recent Practicing Law Institute program on securities regulation, Securities and Exchange Commission Chairman Jay Clayton once again addressed Initial Coin Offerings, or ICOs.  Mr. Clayton highlighted several issues…
  • Nov 14

    YouTube Protected by CDA Immunity over Claims That It Provided Material Support to Terrorist

    YouTube Protected by CDA Immunity over Claims That It Provided Material Support to Terrorist
    Following the reasoning of several past decisions, a California district court dismissed claims against Google under the Anti-Terrorism Act (ATA), 18 U.S.C. § 2333, for allegedly providing “material support” to ISIS by…
  • Nov 9

    California Court Enjoins Canadian Court’s Global De-listing Order to Google as Contrary to CDA

    California Court Enjoins Canadian Court’s Global De-listing Order to Google as Contrary to CDA
    In a decision that sets up a potential international comity showdown, a California district court granted Google’s request for a preliminary injunction preventing enforcement in the U.S. of a Canadian court order that compelled Google…
Rank this Week: 1581

Advertising Law Blog

Advertising Law Blog

Provides commentary and news on developing legal issues in advertising, promotional marketing, Internet, and privacy law. By Olshan Frome Wolosky LLP.

http://www.olshanlaw.com/blogs-Advertising-Law-Blog
Rank this Week: 3976

Broadband Law Advisor

Broadband Law Advisor

Provides insight and information on the FCC's National Broadband Plan. By Davis Wright Tremaine LLP.

http://www.broadbandlawadvisor.com/
Rank this Week: 3713

Privacy & Security Matters

Privacy & Security Matters

By Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

http://www.privacyandsecuritymatters.com
  • Nov 13

    Proposed Ohio Law May Encourage Businesses to Adopt Cyber Standard

    Proposed Ohio Law May Encourage Businesses to Adopt Cyber Standard
      Recently proposed legislation in Ohio could provide businesses with special protection from lawsuits in the event of a hack under certain circumstances. Senate Bill 220 would shelter businesses that have been proactive in instituting…
  • Nov 8

    HIPAA and Other Privacy Considerations at Play when Building a Health App

    HIPAA and Other Privacy Considerations at Play when Building a Health App
    Consumers are increasingly turning to health apps for a variety of medical and wellness-related purposes. This has in turn caused greater amounts of data—including highly sensitive information—to flow through these apps. These…
  • Nov 7

    The GDPR Roadshow – Coming Soon!

    The GDPR Roadshow – Coming Soon!
    The clock is ticking down to May 25, 2018 , the date that the European Union’s General Data Protection Regulation (GDPR) goes into effect.   The GDPR is likely to be a game-changer for US companies doing business with the…
Rank this Week: 1832

Security, Privacy and The Law

Security, Privacy and The Law

Covers information security and privacy issues. By Foley Hoag LLP.

http://www.securityprivacyandthelaw.com
Rank this Week: 1564

Data Protection Report

Data Protection Report

Covers global privacy, data protection and cybersecurity regulatory and litigation environment. By Norton Rose Fulbright.

http://www.dataprotectionreport.com/
  • Nov 3

    Discovery of New Internet of Things (IoT) Based Malware Could Put a New Spin on DDoS Attack

    Discovery of New Internet of Things (IoT) Based Malware Could Put a New Spin on DDoS Attack
    Slightly over one year ago, several major distributed denial-of-service (“DDoS”) attacks took place, including a major event affecting the domain name service provider Dyn, which caused outages and slowness for a number of popular…
  • Sep 25

    Singapore proposes changes to cybersecurity and data protection regime

    Singapore proposes changes to cybersecurity and data protection regime
    In a bid to keep pace with advancements in the technological landscape, the Singapore Government has in recent months embarked on public consultations on its draft Cybersecurity Bill (the Cyber Bill) and its proposed amendments to…
  • Sep 25

    Singapore proposes changes to cybersecurity and data protection regime

    Singapore proposes changes to cybersecurity and data protection regime
    In a bid to keep pace with advancements in the technological landscape, the Singapore Government has in recent months embarked on public consultations on its draft Cybersecurity Bill (the Cyber Bill) and its proposed amendments to…
Rank this Week: 2060

HIPAA Blog

HIPAA Blog

Features a discussion of medical privacy. By Jeffrey P. Drummond.

http://hipaablog.blogspot.com/
  • Nov 2

    CyberThreat Information Sharing: HHS is…

    CyberThreat Information Sharing: HHS is publicly urging healthcare industry participants to actively share cybersecurity threat information.  Basically, they're urging healthcare players to utilize the benefits provided by CISA (the…
  • Oct 26

    Medical Device Cybersecurity: I tend to…

    Medical Device Cybersecurity: I tend to prefer an industry-driven approach, like the House bill, over a top-down approach like the Senate bill.
  • Oct 12

    Cloud-Based Blood Testing Information…

    Cloud-Based Blood Testing Information Breached: An Amazon cloud data repository for blood testing data managed by Patient Home Monitoring was not configured correctly, and a tech security company came across it.  300,000 PDFs accounting for…
Rank this Week: 1738

North Carolina Journal of Law &…

North Carolina Journal of Law & Technology

Features legal scholarship in law and technology topics, including intellectual property law, cyberspace law, environmental law, criminal law, health law, and privacy law.

http://ncjolt.org/
Rank this Week: 4538

Chronicle of Data Protection

Chronicle of Data Protection

Covers consumer privacy, data security, HIPAA, financial privacy and EU privacy. By Hogan Lovells.

http://www.hldataprotection.com
  • Nov 1

    Privacy and Cybersecurity November 2017 Event

    Privacy and Cybersecurity November 2017 Event
    Please join us for our November 2017 Privacy and Cybersecurity Events.
  • Oct 24

    Upcoming Webinar on Privacy and the Internet of Thing

    Upcoming Webinar on Privacy and the Internet of Thing
    Join us tomorrow, October 25 for the next installment of our 2017 Internet of Things webinar series and get practical guidance on privacy compliance challenges presented by the Internet of Things.
  • Oct 24

    Upcoming Webinar on Privacy and the Internet of Thing

    Upcoming Webinar on Privacy and the Internet of Thing
    Join us tomorrow, October 25 for the next installment of our 2017 Internet of Things webinar series and get practical guidance on privacy compliance challenges presented by the Internet of Things.
Rank this Week: 1490

Information Law Group

Information Law Group

Covers advertising law, privacy, information security and intellectual property.

http://www.infolawgroup.com/
  • Oct 30

    Willful or Knowing Violation of the TCPA: Treble Damages and What Businesses Should Know

    Willful or Knowing Violation of the TCPA: Treble Damages and What Businesses Should Know
    A U.S. District Court signaled that deterrence was a significant factor in awarding treble damages in a Telephone Consumer Protection Act (“TCPA“) lawsuit. The United States District Court for the Middle District of North Carolina…
  • Oct 24

    Getting to the Root of the Problem

    Getting to the Root of the Problem
    We all know that food and beverage companies cannot expressly lie to consumers about the ingredients in their products. But what about implying that a certain ingredient is included in the product; one that is known to have some health…
  • Oct 23

    FTC Sets Out How Kids’ Apps Can Use Voice-Based Features under COPPA

    FTC Sets Out How Kids’ Apps Can Use Voice-Based Features under COPPA
    The Federal Trade Commission (FTC) has indicated that operators of child-directed online services may permissibly offer voice search and similar features without first obtaining parental consent under the Children’s Online Privacy…
Rank this Week: 1598

Trust Anchor

Trust Anchor

Covers cyber security, data privacy and regulatory compliance. By Orrick.

http://blogs.orrick.com/trustanchor/
Rank this Week: 2180

Global Regulatory Enforcement Law…

Global Regulatory Enforcement Law Blog

Covers antitrust, privacy, international trade, and white color criminal defense. By Reed Smith.

http://www.globalregulatoryenforcementlawblog.com
Rank this Week: 4128

Data Security Law Journal

Data Security Law Journal

Covers data security, cloud computing, data privacy and anything E. By Al Saikali.

http://www.datasecuritylawjournal.com/
  • Oct 16

    New Wave of Biometric Privacy Class Actions: Could You Be A Target?

    New Wave of Biometric Privacy Class Actions: Could You Be A Target?
    While the privacy world is focused on the Equifax data breach, another development is taking place that could have a more lasting effect on privacy law.  In the last month, plaintiffs’ lawyers in Illinois have filed over 20…
  • Oct 16

    New Wave of Biometric Privacy Class Actions: Could You Be A Target?

    New Wave of Biometric Privacy Class Actions: Could You Be A Target?
    While the privacy world is focused on the Equifax data breach, another development is taking place that could have a more lasting effect on privacy law.  In the last month, plaintiffs’ lawyers in Illinois have filed over 20…
  • May 21

    Court Applies Work Product Protection to Breach Investigation Report

    Court Applies Work Product Protection to Breach Investigation Report
    One of the most significant questions in data security law is whether reports created by forensic firms investigating data breaches at the direction of counsel are protected from discovery in civil class action lawsuits.  They are, at…
Rank this Week: 1841

Beyond Telecom Law Blog

Beyond Telecom Law Blog

Covers telecom policy, services agreements and data security/privacy. By Keller and Heckman LLP.

http://www.beyondtelecomlawblog.com
  • Oct 16

    Time to Refresh FCC Forms 499-A/Q

    Time to Refresh FCC Forms 499-A/Q
    Trends in wireline and mobile services strongly suggest a refresh to the FCC Forms 499-A/Q is in order. For purposes of brevity, this entry focuses on the Form 499-A. While changes to the forms do not address the challenge of a declining USF…
  • Oct 16

    Time to Refresh FCC Forms 499-A/Q

    Time to Refresh FCC Forms 499-A/Q
    Trends in wireline and mobile services strongly suggest a refresh to the FCC Forms 499-A/Q is in order. For purposes of brevity, this entry focuses on the Form 499-A. While changes to the forms do not address the challenge of a declining USF…
  • Sep 22

    Objectives in Negotiating Telecommunications Services Agreement

    Objectives in Negotiating Telecommunications Services Agreement
    This entry discusses the primary objectives that enterprise customers look to achieve in negotiating telecommunications services agreements. In a recent entry, we discussed the challenge counsel for enterprise customers face in confining…
Rank this Week: 4108

Focus on the Data

Focus on the Data

Provides insights and practical guidance on privacy and data security issues under international, federal, state and local laws. By Frankfurt Kurnit Klein + Selz PC.

http://www.focusonthedata.com
  • Oct 16

    Privacy Shield: Year One Updates You Need To Know

    Privacy Shield: Year One Updates You Need To Know
    This month we’re celebrating Privacy Shield’s first birthday (admittedly, a bit belated) with an update on everything Privacy Shield. There have been a number of developments on the Privacy Shield-front that companies certified or…
  • Oct 16

    Privacy Shield: Year One Updates You Need To Know

    Privacy Shield: Year One Updates You Need To Know
    This month we’re celebrating Privacy Shield’s first birthday (admittedly, a bit belated) with an update on everything Privacy Shield. There have been a number of developments on the Privacy Shield-front that companies certified or…
  • Aug 22

    Class Action Lawsuits over Alleged COPPA Violations Reinforce Importance of Compliance

    Class Action Lawsuits over Alleged COPPA Violations Reinforce Importance of Compliance
    Earlier this month, three class action lawsuits were filed against companies for alleged violations of the Children’s Online Privacy Protection Act (“COPPA”). These lawsuits are raising eyebrows as COPPA does not provide for…
Rank this Week: 2314

Cybersecurity Lawyer Forum

Cybersecurity Lawyer Forum

Covers business and privacy law. By Jeffer Mangels Butler & Mitchell LLP.

http://cybersecurity.jmbm.com/
  • Oct 11

    Think Twice Before Logging on to Public Wi-Fi

    Think Twice Before Logging on to Public Wi-Fi
    At the airport, in a coffee shop or hotel lobby? Think twice before logging on to that free Wi-Fi. What’s not to love about free, public Wi-Fi?  It’s free. It’s easy. A couple of clicks and you’re connected to the…
  • Oct 5

    Michael Gold Nominated as a Leader in Cybersecurity Law by the Los Angeles Business Journal

    Michael Gold Nominated as a Leader in Cybersecurity Law by the Los Angeles Business Journal
    LOS ANGELES—Jeffer Mangels Butler & Mitchell LLP (JMBM) is pleased to announce that Michael A. Gold, co-chair of JMBM’s Cybersecurity & Privacy Group and co-author of the Cybersecurity Lawyer Forum, has been nominated by…
  • Sep 29

    Responding to a Data Breach: CEOs Should Develop a Narrative That Responds to Customers and Regulator

    Responding to a Data Breach: CEOs Should Develop a Narrative That Responds to Customers and Regulator
    The cybersecurity breaches this month of Equifax and Deloitte—both firms that tout the value of their data and security acumen—show that no company is immune to hacking. But there is one thing that smart companies can do, both…
Rank this Week: 1956

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
  • Oct 4

    DMCA agent requirements changing by end of year

    DMCA agent requirements changing by end of year
    In December 2016, the United States Copyright Office introduced an online registration system and electronically generated directory to replace the office’s old paper-based system and directory for filing DMCA agent information. The…
  • Oct 4

    DMCA agent requirements changing by end of year

    DMCA agent requirements changing by end of year
    In December 2016, the United States Copyright Office introduced an online registration system and electronically generated directory to replace the office’s old paper-based system and directory for filing DMCA agent information. The…
  • Aug 16

    Rivalry in the Athleisure Industry – lululemon and Under Armour battle over criss-cross strap

    Rivalry in the Athleisure Industry – lululemon and Under Armour battle over criss-cross strap
    Patent infringement lawsuits are rather unusual in the fashion industry in part because design patents are difficult, expensive, and slow to obtain. In an industry that is constantly evolving to keep up with consumer trends, the year+ length…
Rank this Week: 1340

Privacy Law Blog

Privacy Law Blog

Covers data privacy, identity theft, invasion of privacy, and national security legal issues. By Proskauer Rose LLP.

http://privacylaw.proskauer.com/
Rank this Week: 4569

Cyberinsurance Law Blog

Cyberinsurance Law Blog

News and comments on Business Law. By Jordan M. Rand.

http://www.databreachninja.com/
  • Sep 26

    “To Be ExSPECted? Contractual Liability Exclusion Bars PCI Fine Coverage Again”

    “To Be ExSPECted? Contractual Liability Exclusion Bars PCI Fine Coverage Again”
    In Spec’s Family Partners v. The Hanover Insurance Company, the Southern District of Texas became the second court to grapple with the interaction among Payment Card Industry (PCI) fines, payment card processor contracts and the…
  • Jul 11

    “I’m a Little Short – Gladly Pay You Tuesday?”

    “I’m a Little Short – Gladly Pay You Tuesday?”
    Solvency.  It means you can pay your tab.  Cyber attacks are occurring with greater frequency and effectiveness, resulting in an ever-increasing bill.  The cyberinsurance market is booming, but will policy premiums and carrier…
  • Feb 23

    “3 Tips for Public Pension Funds”

    “3 Tips for Public Pension Funds”
    On Tuesday, I was privileged to be part of a panel discussing cyberinsurance for public pension funds at Kessler Topaz’s Evolving Fiduciary Obligations for Institutional Investors conference, joining Victoria Hale, General Counsel of…
Rank this Week: 1087

LegalTXTS

LegalTXTS

Covers law and technology, with an emphasis on legal issues regarding digital media, privacy and data security, and information management. By Elijah Yip.

http://www.legaltxts.com/
  • Sep 14

    Vision-Impaired Customer of Grocery Chain Becomes First Plaintiff to Win ADA Website Accessibility Claim After Trial

    Vision-Impaired Customer of Grocery Chain Becomes First Plaintiff to Win ADA Website Accessibility Claim After Trial
    A lawsuit against grocery chain Winn-Dixie became the first case of its kind to produce a decision holding, after a trial, that a public accommodation violated the Americans With Disabilities Act (ADA) because its website was inaccessible to…
  • Jun 22

    Firing of Employee For Posting Profanity-Laced Facebook Comments Ruled Illegal

    Firing of Employee For Posting Profanity-Laced Facebook Comments Ruled Illegal
    Social media seems to be a favorite forum for employees to complain about their workplace.  Firing employees for posting work-related social media messages can land an employer in trouble.  But is management absolutely forbidden…
  • Apr 19

    Take Control of Negative Online Comment

    Take Control of Negative Online Comment
    “Why did you fire my wife?”  Bradley Reid Byrd posted this question on the Facebook page of Cracker Barrel.  Byrd wanted to know why his wife was let go after working for the restaurant chain for 11 years.  The post…
Rank this Week: 1194

Privacy and IP Law Blog

Privacy and IP Law Blog

Addresses recent events in trademark, copyright, computer and privacy law. By Christina Frangiosa.

http://privacyandiplawblog.com/
  • Sep 12

    IP Claims Fail Against ISP for Merely Hosting Infringing Material

    IP Claims Fail Against ISP for Merely Hosting Infringing Material
    In Parker v. Paypal, the court dismissed an individual author’s suit against Amazon for hosting an infringing copy of his copyrighted work, deciding that ISPs actions in merely hosting the infringing work did not cause "in some…
  • Jul 27

    Don’t Assume Post-Registration Invoices for Trademark Fees Are Legitimate

    Don’t Assume Post-Registration Invoices for Trademark Fees Are Legitimate
    Following up on the USPTO's public roundtable on "Fraudulent and Misleading Solicitations to Trademark Owners", this post analyzes how to recognize fraudulent fee solicitations (invoices) and what to do when you receive them. The post…
  • Jun 5

    What do Barber Poles and Lapel Pins Have in Common?

    What do Barber Poles and Lapel Pins Have in Common?
    Both can serve as examples of trademark use in connection with membership in an organization. In May, the Wall Street Journal reported on enforcement actions by the New Hampshire Board of Barbering, Cosmetology & Esthetics to fine the…
Rank this Week: 2933

SullivanLawNet

SullivanLawNet

Legal news and analysis, with an emphasis on international and domestic intellectual property developments. By Shawn Sullivan.

http://sullivanlaw.net/
  • Aug 8

    Malaysia Passes Access to Biological Resources and Benefit Sharing Bill

    Malaysia Passes Access to Biological Resources and Benefit Sharing Bill
    Last week, the House of Representatives (Dewan Rakyat) in Malaysia’s Parliament passed the Access to Biological Resources and Benefit Sharing Bill 2017. The bill implements the provisions of the Convention on Biological…
  • May 4

    Louisiana Seeks Fed Help to Get Generic Hep C Drug

    Louisiana Seeks Fed Help to Get Generic Hep C Drug
    Louisiana’s Secretary of Health, Dr. Rebekah Gee, is attempting to persuade politicians to support the use of 28 USC § 1498, a federal statute that allows the federal government intentionally to infringe patents, to arrange for…
  • Jun 20

    EU Court: 3-D Toothbrush Shape not Registrable as Trademark

    EU Court: 3-D Toothbrush Shape not Registrable as Trademark
    In Loops, LLC v EUIPO, Case T‑385/15 (14 June 2016), the General Court of the European Union held that held that the three dimensional shape of a toothbrush lacked any distinctive character and could not be registered as an EU ……
Rank this Week: 1210