Stefan Hankin on Online Harassment
Do I need permission to use images from Google on my website?
Stealth Lawyer: Chieh Huang, Social Games Developer
Bill on Bankruptcy: Why is Kodak's Stock Soaring?
Smolinsky Sees Similarities Between Reader's Digest, Kodak
Digital Health: Where is the Action for Entrepreneurs?
Stealth Lawyer: Scott Jordan, Co-Founder of Scottevest
Top 3 Concerns in Data Security
Vague Definitions in CISPA Raise Concerns of SOPA 2.0
At a recent regional SIFMA conference, the Securities and Exchange Commission (SEC), the Financial Industry Regulatory Authority (FINRA) and state regulators discussed the risks inherent in the ongoing low-yield environment....more
This marks the second week of National Cyber Security Awareness Month, and one focused on the Secure Development of IT Products, so it seems only appropriate to discuss security and The Internet of Things and a recent panel...more
A Legal Guide to Privacy and Data Security, a new book offering guidance on a wide variety of privacy and data security laws and how those laws may impact your business, is now available from the Minnesota Department of...more
The Internet of Things is expected to lead to 50 billion connected devices by 2020 collecting and exchanging personal data about their users, their lives, their preferences and tastes. This will lead not only to relevant data...more
Move over World Cup. Discipline based on employee social media activities is taking center stage this week. Well, maybe the World Cup has a few more headlines, but you can follow the links below to read four articles from...more
While most people have focused on the free speech and implementation difficulties of the “right to be forgotten” announced by the European Court of Justice (ECJ) in Google Spain SL, Google Inc. v. Agencia Española de...more
The first Tuesday in June is also the first Tuesday of meterological summer -and a welcome sight after a brutally-long winter for many of our readers. So, here’s to a happy Summer!
Google Receives 12,000 Take-Down...more
In today’s business environment, information is a powerful and valuable asset. Organizations that use information wisely and strategically can reach customers faster and with more precision. But in today’s highly regulated...more
The European Court of Justice (“ECJ”) recently held that Google must, under certain circumstances, provide European Union (“EU”) citizens with the right to remove information about themselves, including the list of results...more
With the number of (internet) connected devices rapidly surpassing the number of internet people (actually, all people whether or not connected), we take this opportunity to explore some of the legal complexity brought about...more
The UK data protection watchdog has said that it will give search engines like Google some time to put measures in place to respond to requests to take down links in search results.
In a decision with far-reaching consequences, the European Court of Justice (located in Luxembourg) (“ECJ”) ruled on May 13, 2014, that E.U. citizens can demand that search engines – in this instance Google – must delete...more
A recent EU decision by the Court of Justice of the European Union (CJEU) has generated a lot of press since it involves a high profile company - Google - and a tantalizing concept of a “right to be forgotten”. The story...more
In a landmark ruling the European Court of Justice has ruled that search engines, as a principle, need to remove the link between search results and a webpage if it contains information the individual deems should be...more
Database marketing outsourcing is a strategic transaction for retailers. This type of outsourcing can facilitate the integration of diverse marketing channels e.g., web, social media, catalog and in-store sales) and enable...more
Last month, the world learned of the discovery of the "Heartbleed" bug, a software glitch leaving approximately two-thirds of the world's Internet servers vulnerable to potential hackers. This revelation sent online service...more
After recovering from high-profile data breaches at Target and Neiman Marcus, signing up for free credit monitoring and analyzing our credit reports, a new Internet villain recently emerged: the “Heartbleed Bug.” The...more
The Internet of Things will generate 9 billion devices by 2018 according to estimates, but the recent hacker attack that caused a fridge to send over 750,000 spam and phishing messages over the Christmas break create concerns...more
At this week's International Association of Privacy Professionals (IAPP) Global Privacy Summit, the FTC and the White House made several important announcements....more
In This Issue:
- Ramifications of the Target Data Breach
- California Federal Judge Winnows Down Massive Privacy Class Action
- White House Launches “Big Data” Review
- Senator Rockefeller Issues Data Broker...more
Effective January 1, 2014, amendments to the California Online Privacy Protection Act (“CalOPPA”) require all commercial websites and online services that collect personally identifiable information (“PII”) to include...more
Brazilian President Dilma Rousseff reportedly aims to push Congress to vote in February 2014 on sweeping legislation relating to internet governance. The bill, titled "Civil Internet Framework (Marco Civil da Internet)," sets...more
Recent amendments to California’s Online Privacy Protection Act may have implications for all commercial online operators given the geographically limitless scope of the Internet. The amendments, effective Jan. 1, 2014,...more
BETTING AND GAMING -
Japan looking at casino promotion legislation - With a few very limited exceptions, gaming is generally banned in Japan. In the wake of the tsunami and earthquake, and as the 2020 Olympic Games...more
Web cameras, burglar alarms, fitness monitors, smartphones, and a host of other internet connected devices all have the potential to invade privacy by collecting and sharing personal information. Yet in many cases, the...more
Back to Top