Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
Unprecedented Global ATM Heist Presents a Number of Lessons for Companies
Data Privacy Trouble Surrounding Google Street View Cars Presents Lesson for Smaller Companies
Ted Hester on Congressional Investigations
Tips for Mobile App Privacy Compliance
Cameras Snap Your License Plates for Huge Databases
Big Brother Is Tracking You through Your Cell Phone
Safeguards against Data Security Breaches (Part One)
Weekly Brief: New Round of Layoffs Hit Law Firms
Safeguards against Data Security Breaches (Part Two)
How to Protect Your Company From Hackers
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
How to Respond to President Obama's Cybersecurity Executive Order
Where Does the Cybersecurity Executive Order Hit and Miss the Mark?
FTC Hits Path with $800k Fine, Continues to Make Mobile Privacy a Priority
The Biggest Changes in HIPAA/HITECH Omnibus Rule & Recommended Action Steps—Ted Kobus
Law Firms Need to Be Aware of Data Security Blind Spots—Stuart McClure
Three Key Data Retention Questions
Death of Activist Aaron Swartz Could Spur Changes to Computer Fraud & Abuse Act
Corporate Law Report: Cybersecurity, CEO Social Media, New Workplace Laws, Healthcare Reform in 2013
Top 3 Concerns in Data Security
A detailed social media policy specifically addressing the ownership of social media accounts is key to a corporation’s ability to maintain ownership of an employee’s account after the employee leaves the corporation....more
In March 2012, the Obama Administration announced its Big Data Research and Development Initiative. The program involves a total of over $200 million in new commitments from several departments and agencies to improve the...more
In This Issue:
- Corporate Humor Context is Key
- Cyber Security
- Technology’s Impact on Reputation
- Blogs Worth Following
- LEVICK In the News
- Excerpt from Corporate Humor, Context is...more
Life is full of anxieties. We all know that. Some suffer worse anxieties than others. As I often say, anxiety comes and goes. Anxiety cannot be measured but is something that everyone experiences on their own terms....more
The message–that’s what I’m talking about–who’s gonna get the message sent to them first?
Data breaches, hacking, and privacy are one of the biggest news stories since 2011 and there is no sign that will be changing...more
The Federal Trade Commission (“FTC”) announced the release of revised “Green Guides” on October 1, 2012. The Green Guides are intended to help marketers avoid making misleading environmental claims.
The Green Guides are...more
Infographic: The Growing Impact of Social Media
Social media sites are transforming not only the daily lives of consumers, but also how companies interact with consumers. As with the Internet boom during the mid-to-late...more
The European perspective on managing cyber risk is valuable for US companies operating internationally and also as risk management guidance when operating in the US.
Recently, an arm of the UK Government Communication...more
The CAN-SPAM act sets legal rules for commercial E-Mail and includes various provisions that apply to “any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial...more
California takes citizen privacy rights seriously.
That’s the unmistakable message communicated by a recent announcement that the Office of the Attorney General of California is creating a Privacy Enforcement and...more
This week, Apple shareholders requested that its Board of Directors publish a report explaining how the board oversees privacy and data security risks. The proposal was prompted by concern that recent issues such as the...more
This article explains to in-house corporate counsels the risks, benefits, and issues to investigate regarding cloud storage of data....more
Google’s business model is based on delivering relevant search results and, increasingly, relevant ads to those who use its products. In order to do so, Google needs to know a user’s search history since search history and...more
The Federal Trade Commission (FTC) issued a report in March 2012 setting forth best practices for businesses to protect the privacy of American consumers and give them greater control over the collection and use of their...more
Elisabeth Murdoch, daughter of media baron Rupert Murdoch and a successful media executive in her own right, recently criticized her brother James, a top executive at News Corp., for pursuing profit at all costs.
Michelle Cohen recently joined Ifrah Law as a partner. Here is an edited transcript of a recent interview with Ms. Cohen.
Question: What are some of your legal experiences and strengths that you’d like to...more
Originally published in Law360, New York (May 30, 2012, 1:08 PM ET)
In This Issue:
Toothpaste, Juice Targets of New False Advertising Suits; FTC Settles Flash Cookies Action; Federal Food Marketing Guidelines Confront Hurdle; NAD Inquiry Leads to Mascara Ad Yank; Senate Seeks to Delay...more
Last week, a California court of appeals ruled that a state statute -- the California Invasion of Privacy Act, Cal. Penal Code § 632 (“CIPA”)-- prohibit a business from monitoring its own customer service and other telephone...more
In a settlement announced today by the Federal Trade Commission and Facebook, the social networking service agreed to settle charges that it deceived consumers by telling them they could keep their information on Facebook...more
Earlier today, Federal Trade Commission ("FTC") and Facebook announced a settlement of the government's charges that the company had deceived users regarding their ability to keep their information private. We have reposted...more
The latest research paper on workplaces and social networking published by ACASsuggests that employers should not make use of social networking in the context of recruitment. That is all very well but is it realistic?...more
JD Supra gets your content noticed, increases your visibility and makes your marketing efforts hassle free...
Learn More or Schedule a demo