Privacy Concerns

News & Analysis as of

The Drones are Under Attack

Those who know me know that I love gadgets. Most of the time, I imagine I have a need that the newest toy will fix, at least until the next one comes along. But, despite my best efforts, I have not been able to create an...more

Privacy Tip #9: Destroying prescription information

Have you ever noticed how much of your personal information is included on a prescription bottle and its packaging? Take a look next time you pick up a prescription at the pharmacy. The outer packaging may include your name,...more

Parental consent by selfie?

As a general rule, the Children’s Online Privacy Protection Act (COPPA) requires operators of websites (including mobile apps) directed to children under the age of 13 to obtain verifiable parental consent before collecting...more

How Does Your Terms of Service Agreement Rate?

Online terms of service agreements are the rarely-read but often-mocked daily annoyance of Internet users worldwide. A large (literally) barrier to the immediate gratification of access to online content, most of us are...more

FTC Announces Agenda for Cross-Device Tracking Workshop

On November 3, the FTC announced the agenda for its Cross-Device Tracking workshop, which is scheduled to take place on November 16 in Washington, D.C. FTC Chairwoman Edith Ramirez will deliver opening remarks, with FTC...more

Privacy Tip #8 – How teachers can assist students to be safe online

It is scary to read the headlines that kids become victims of crimes, some of them horrific, because of online activity. Kids are naive and susceptible to online predators. Parents must be vigilant in educating their children...more

Background check companies to pay $13 million for FCRA violations

General Information Services (GIS) and Inc. (e-Background) agreed to pay $13 million in restitution and fines to settle their violations of the Fair Credit Reporting Act (FCRA) charged by the Consumer...more

“Hell No Barbie” Campaign against the new interactive doll with artificial intelligence

Well folks, it’s that time of year again, the time of year where the latest and greatest toys hit the shelves just in time for the Christmas shopping season. This year, one of the most controversial toys to hit the shelves...more

"Intellectual Property and Technology News (Asia Pacific) - November 2015

Welcome to the latest Asia Pacific Edition of Intellectual Property and Technology News, our biannual publication designed to report on worldwide developments in intellectual property and technology law, offering perspective,...more

FTC Delays Decision on Proposal Under COPPA Rule

Parents and companies will have to wait a few more weeks before learning whether facial recognition technology can be used to verify parental consent under the Children’s Online Privacy Protection Act (COPPA)....more

OCR Finds Title IX Violation for School District’s Prohibition of Transgender Student’s Use of Locker Room

The U.S. Department of Education’s Office for Civil Rights (“OCR”) recently concluded that a public school district in Illinois violated Title IX both by prohibiting a transgender high school student from using the locker...more

Three Things You Need To Know: School Ordered To Allow Girls' Locker Room Access To Transgender Student

Should anatomically male transgender high school students who identify as female be allowed to use female locker rooms? In what has been described as a “momentous” decision, the Department of Education Office of Civil Rights...more

Recent Amendments to Security Breach Notification Laws Further Complicate Breach Notification for Employers

It is not a matter of "if" but "when" an employer will be required to notify employees of a security breach.  Forty-seven states require employers to notify employees when defined categories of personal information, including...more

San Francisco Launches First “Internet of Things” Wireless Network in United States

With the onslaught of smart watches, smart thermostats, and even smart refrigerators that allow you to Tweet hungry messages to your followers, it’s only natural that a “smart city” would follow. This week, San...more

NAIC Adopts Cybersecurity Bill of Rights

The National Association of Insurance Commissioners (“NAIC”) continued its efforts to advance cybersecurity in the insurance industry when it recently adopted the Cybersecurity Bill of Rights. The Cybersecurity Bill of Rights...more

Three Trending Topics in IoT: Privacy, Security, and Fog Computing

Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more

Mobile Location Analytics: Changing the Game for Brick and Mortar Retail

For brick-and-mortar retailers, smart phones have taken on an entirely new role in customers’ shopping experiences. A technology known as "mobile location analytics" ("MLA") or sometimes, "indoor analytics," gives brick and...more

Report on Student Data Privacy Highlights Two Key Issues For School Leaders

Student data privacy is the “it” issue right now in edtech, as evidenced by a recent special Student Data Privacy Report (free registration required) issued by Education Week. Education Week prefaces the report with a fact...more

HIPAA and Text Messaging

Text messaging is pervasive. Doctors and other health care providers, covered entities, and business associates currently use (and embrace) the technology. Texting is easy, fast and efficient. It doesn’t require a laptop...more

Alert: Senate Passes Historic Information Sharing Bill

On October 27, the Cybersecurity Information Sharing Act (CISA) finally passed the Senate by a hefty margin of 74–21 (read the text of the bill as passed). Despite an escalation of opposition and rhetoric over the past couple...more

Privacy Tip #7 – Who is listening to your conversations through your smartphone microphone?

I’ve always known that my smartphone had a microphone. If nothing else, it obviously has to be used for the Shazam app so I can figure out the name of that great song. So that is the only time I use the microphone on my...more

U.S. Senate Moves Forward On Cybersecurity Information-Sharing Legislation

On October 27, 2015, the U.S. Senate passed the Cybersecurity Information Sharing Act of 2015 ("CISA") by a vote of 74-21. CISA had been stalled in the Senate since its submission in April 2015 by Senators Diane Feinstein...more

NIST seeks comments on Privacy-Enhanced Identity Brokers project document

The National Cybersecurity Center of Excellence, in partnership with the National Strategy for Trusted Identities in Cyberspace National Program Office, have launched a project designed to embed privacy and security measures...more

Senate passes Cybersecurity Information Sharing Act

After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015. The bill has been touted as being controversial and is opposed by...more

Controversial Cybersecurity Information Sharing Act Passes in Senate

This week, the Senate passed a cybersecurity bill, called the Cybersecurity Information Sharing Act of 2015 (the “CISA”), by a vote of 74 to 21. With the Senate’s vote, the bill is one step closer to becoming law....more

279 Results
View per page
Page: of 12

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.