Search for: "Inside Privacy" Results 241 - 260 of 4,583
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
5 May 2020, 6:00 pm by CAFE
Kayleigh McEnany defends Flynn, 5/1/20 See omnystudio.com/listener for privacy information. [read post]
3 Sep 2019, 4:29 pm by CAFE
To hear the full episode, join the CAFE Insider community. [read post]
21 Oct 2019, 4:25 pm by CAFE
Listen to the full episode with a free 2-week trial of the CAFE Insider membership. [read post]
28 Nov 2011, 6:17 am by val_kimber
The topics range from insider trading and Securities Regulation, to the Privacy Act and whether emotional and other noneconomic damages are “actual damages,” raising broad implications for future suits under the Privacy Act. [read post]
19 Jul 2019, 12:18 pm by Roger Li
These changes include: expanding disclosure of privacy risks in licensing applications, conducting regular audits on government data requests, incorporating privacy considerations in the criteria for high-risk applicants, and conducting a further rulemaking on these privacy concerns. [read post]
13 May 2015, 7:27 am by Tim Edgar
As a lawyer inside the Executive Branch providing advice on intelligence activities, I found myself turning to E.O. 12,333, and the AG guidelines for each agency required by that order, far more often than I did to FISA or other statutes. [read post]
9 Apr 2009, 12:11 pm
The garbage bags had been placed inside garbage cans, which in turn had been left outside in a small shed for collection. [read post]
12 Mar 2010, 9:40 am by axd10
The Security of Data Export to India. 13 Journal of Internet Law 9-17 (Nov. 2009) Google Battles Privacy Suit. 18 Inside Counsel (June 2008) 84. [read post]
If you have questions about developing a privacy and data compliance plan for Virginia law or related issues please reach out to a member of our Privacy, Data, and Cybersecurity practice group. [read post]
”  We will continue to monitor these various regulatory developments and keep you apprised here on Inside Privacy. [read post]
Since then, the momentum to enact stronger privacy protections for kids and teens has only increased, fueled by charges that social media and algorithms are causing self-harm and addictive behaviors by minors; multiple rounds of testimony from a former social media insider; and the desire in Congress to find common ground on some aspect of consumer privacy. [read post]
28 Jun 2012, 6:55 am by Lawrence Solum
Here is the abstract: The last decade of privacy scholarship is replete with theories of privacy that reject absolute binaries such as secret/not secret or inside/outside, instead favoring approaches that take context into account to varying degrees. [read post]
11 Jul 2021, 8:41 am by Eric Goldman
May 21, 2021): navigating Google’s user-facing privacy representations is a singularly fragmented affair. [read post]
5 Jan 2020, 4:27 pm by INFORRM
Sergejs Buivids [2019] EUECJ C-345/17 The claimant recorded the inside of a Latvian police station whist he was there giving a statement. [read post]
27 Mar 2020, 6:47 am by CAFE
To try it free for two weeks, head to CAFE.com/insider and to receive CAFE emails, including links to free episodes, join the list at CAFE.com/Preet See omnystudio.com/listener for privacy information. [read post]
3 Apr 2020, 6:00 am by CAFE
To try it free for two weeks, head to CAFE.com/insider and to receive CAFE emails, including links to free episodes, join the list at CAFE.com/Preet See omnystudio.com/listener for privacy information. [read post]
22 Nov 2019, 6:04 am by CAFE
See omnystudio.com/listener for privacy information. [read post]
6 Oct 2017, 10:57 am by HL Chronicle of Data Protection
Protecting against such “insider” cyber risks can be challenging, especially given the global web of privacy, communications secrecy, and employment laws that may be implicated by monitoring workforce use of IT resources. [read post]
6 Oct 2017, 10:57 am by HL Chronicle of Data Protection
Protecting against such “insider” cyber risks can be challenging, especially given the global web of privacy, communications secrecy, and employment laws that may be implicated by monitoring workforce use of IT resources. [read post]