Science, Computers & Technology Privacy International Trade

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Foreign Data Center Subject to Reach of U.S. Government

Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more

Cybersecurity: How well are Latin American banks protected against cyber attacks?

Inter-American Dialogue's Latin America Advisor asked Marcela Cristina Blanco, associate attorney in Diaz Reus’ Bogota, Colombia office: How Well Do Latin American Banks Protect Against Cyber Attacks?...more

Singapore's first data breach?

The Straits Times reported on 14 August that Singapore’s Personal Data Protection Commission (the “Commission”) is investigating a complaint from a user that Xiaomi has breached the Personal Data Protection Act 2012 (“PDPA”)....more

Google, the House of Lords and the timing of the EU Data Protection Regulation

In the Google Spain “Right to be Forgotten” case, the ECJ held that Google must remove links to a newspaper article containing properly published information about a Spanish individual on the basis that the information is no...more

Emergency UK Legislation Expands Government Powers to Retain and Intercept Data

On July 17th, the Data Retention and Investigatory Powers Act (“DRIP”) came into effect in the United Kingdom reinstating the Government’s powers to require communication providers to retain traffic data (also known as...more

The EU Article 29 Working Party's Guidance on the "Legitimate Interest" Ground for Processing Personal Data

When precisely is a data controller lawfully permitted to process personal data? If a data controller does not have the consent of a data subject to process his or her data, when does the “legitimate interest”...more

Microsoft loses third round of battle against extra-territorial warrants

On 31 July, the chief judge of the Southern District of New York delivered the latest in a series of controversial judgments stemming from a test case brought by Microsoft in an extra-territorial warrant issued under the U.S....more

Where to Now St. Peter? – Due Diligence Going Forward in China

Whatever you might think of where his career went, Elton John had some great early stuff. I still rank Tumbleweed Connection right up there as one of my favorite albums of all-time. And while it was packed with some great...more

Hackers steal 1.2 billion passwords – 4 steps to take now

The New York Times reported this week that an organized Russian criminal group stole approximately 1.2 billion user name and password credentials associated with more than 500 million email addresses from hundreds of...more

IP/IT & Media Newsletter - Issue 1/2014

In this issue: - Apps and Data Privacy – New Guidelines from the German DPAs New Developments in Cybersecurity Regulation - Refer-a-Friend Functionality on the Internet – Federal Court underpins its...more

Did Russian Hackers Really Amass Over a Billion Passwords?

It was widely reported yesterday in The New York Times and elsewhere that a sophisticated Russian crime ring was holding a massive cache of stolen Internet credentials. According to the private security firm Hold Security, a...more

Russian Hackers Reportedly Obtain Internet Credentials of More Than 500 Million Users

On August 5, The New York Times reported that Russian hackers have obtained what could be the largest collection of confidential data in history. The security firm that discovered the breach continues to alert affected...more

The EU's Right to be Forgotten: Overly Burdensome?

In May earlier this year, the European Union's top court held in favor of an individual who requested that Google remove the search results associated with his name. In this particular case, a Spanish citizen requested that...more

RFID logo and privacy assessment test

The approval of technical standards introducing an RFID logo and a process for their data protection impact assessment required to comply with the EU Recommendation on RFIDs are expected to boost their usage in several fields...more

Capital Thinking: Cybersecurity

Legislative Branch Activity - House Cybersecurity Legislation - This week, the House will consider four pieces of cybersecurity legislation on the floor including the National Cybersecurity and Critical...more

Sourcing Reference Guide: A reference tool for customers and service providers explaining current best practice and thinking from...

Outsourcing and the New Australian Privacy Law: In a nutshell - In Australia all APP Entities which collect, use or disclose Personal Information must, under the Privacy Act 1988 (Cth) (“Act”), take reasonable steps...more

The Internet of Things: Ofcom call for input

Ofcom has issued a call for stakeholder input on the emerging Internet of Things. The Internet of Things describes the inter-connection of multiple “things”, be they devices or sensors, that are able to communicate and share...more

Status Updates - July 2014 #11

..Facebook reported strong results for ad revenue in the second quarter of 2014. Mobile advertising was particularly strong, up 30 percent from last year. Mobile ads now account for 62 percent of Facebook’s advertising...more

e-IDs: the Future of Secure Digital Identification?

Over the past decade, the EU has made significant technological and legal strides toward the widespread adoption of electronic identification cards. An electronic ID card, or e-ID, serves as a form of secure identification...more

Global Boardroom Risk Solutions Newsletter

Now more than ever, there is a need for risk solutions in the boardroom. Any organization can be faced with a significant crisis, whether a fraud investigation, a regulatory infringement, allegations of anticompetitive...more

Honing in on the new rules for the transfer of personal data outside of the EEA

Although no major legislative milestones for the EU Data Protection Regulation have occurred since March 2014 (see status update here), there has been some progress over the late spring and early summer of 2014. One key item...more

No news doesn’t mean it’s gone away: Timing Update for the EU Data Protection Regulation

With no major legislative milestones since the March 2014 EU Parliamentary vote endorsing the LIBE draft of the new Data Protection Legislation, observers from outside the EU might understandably wonder whether the...more

Update from UK Information Commissioner’s Office (ICO)

Will it happen? Well, “if it looks like a duck, swims like a duck and quacks like a duck then its probably a duck”. All the indications are that the Regulation will happen. We have to assume it will. This echoes the...more

Data protection issues for Google trouble BIG DATA business

Data protection issues for Google in Italy are not over. The Italian Data Protection Authority (DPA) has now challenged their privacy information notice requiring – among others – an express consent from users to their...more

How can you avoid identity theft?

Getting charged for $1000 worth of electronics that you didn’t buy. Seeing your credit score plummet for seemingly no reason. These types of scenarios are potential nightmares for most of us, but they seem unlikely...more

441 Results
|
View per page
Page: of 18

Follow Science, Computers & Technology Updates on: