Mondaq All Regions: Privacy
Charles Russell Speechlys LLP
Recently the Argentinian Data Protection Authority has issued guidance on privacy aimed at mobile app developers.
Holman Webb
The article summarises Commonwealth and NSW legislation when deciding on whether to use or disclose genetic information.
Borden Ladner Gervais LLP
The Investment Industry Regulatory Organization of Canada ("IIROC")) issued a new Policy Regarding Use and Disclosure of Personal Information in IIROC Disciplinary Proceedings (the "Policy") on May 1, 2015.
Bereskin & Parr LLP
The Canadian Radio-television and Telecommunications Commission ("CRTC") investigated the online dating site, Plenty of Fish, following complaints from its registered users about commercial emails...
Miller Thomson LLP
CASL prohibits parties from sending commercial electronic messages (including e-mails) unless the recipient of the message has given express consent or the message falls into one of the exceptions in CASL.
Charles Russell Speechlys LLP
Recently the Italian Data Protection Authority has published guidance on the use of the personal data in targeted on-line advertising, pursuant to its Personal Data Protection Code.
Charles Russell Speechlys LLP
On 8 May 2015, the Regulation of the Law on Personal Data Protection was published in Peru and which bears considerable similarity to the Spanish data protection law.
The Information Commissioner's Office (ICO) has called for a more practical approach to data protection regulation as technology progresses.
Ropes & Gray LLP
A closely divided Federal Trade Commission has signaled support for the agency's recent focus on mobile device privacy.
In a prior Orrick Alert, we discussed some of the implications from the proposed data breach notification amendments in Washington State, which were largely included in the version of the bill that passed last month.
Jones Day
The court did not decide whether the NSA's program is constitutional.
Jones Day
On April 15, the National Protection and Programs Directorate ("NPPD")—a division of DHS—released written testimony for the Senate Committee on Appropriations...
Jones Day
The two agreed to increase information-sharing between the two countries in an effort to combat intellectual property theft and focus on "cross-border, cyber-enabled crime."
Borden Ladner Gervais LLP
In April 2015, the United States Securities and Exchange Commission issued updated cybersecurity guidance for registered investment companies and registered investment advisers.
Needless to say, there is no magic bullet. However, customers and providers can take the foregoing steps as part of an information governance program to help mitigate the risks of human foibles in the cloud.
Ropes & Gray LLP
As set out in revised Requirements 2.2.3, 2.3, and 4.1, "new implementations" may not use SSL or early TLS to satisfy PCI DSS requirements.
Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.
The insurance applications and underwriting questionnaires prepared in connection with cyber insurance do matter.
Jones Day
The Director noted that the number of FBI investigations related to computer intrusions has increased by 80 percent since 2002, and that to counter this threat, the FBI requested a $10M budget increase to support its cyber efforts.
Jones Day
On March 23, the Privacy and Civil Liberties Oversight Board issued a request for public comment on the privacy and civil liberties implications of the federal government's counterterrorism activities.
Jones Day
On April 1, President Obama issued Executive Order 13964, in which he declared a national emergency relating to foreign "malicious cyber-enabled activities."
Latest Video
Most Popular Recent Articles
Holding Redlich
Australian ISPs and telcos will be required to retain prescribed consumer metadata for a minimum period of two years.
TMF Group
In July 2014 the Lower Chamber of the Russian Parliament ("Duma") passed Federal Law No. 242-FZ of 21 July 2014, sub-titled: "On introduction of amendments into certain legislative acts of the Russian Federation relative to clarification of procedure of processing of personal data in information and communication networks".
Bennett Jones LLP
In University of Calgary v JR, 2015 ABCA 118, the Alberta Court of Appeal strongly affirmed the central importance of solicitor-client privilege to the proper functioning of the legal system.
Marque Lawyers
Here is a handy list of tips for those who don't want the metadata or the wells of their virtual existence to be tapped.
Borden Ladner Gervais LLP
How much cybersecurity is enough? This question is as legal as it is technical. In legal terms, the question is answered by the applicable standard of care.
Clark Wilson LLP
The Canadian anti-spam law came into effect on July 1, 2014 and includes the ability to levy severe administrative monetary penalties of up to $10 million for one violation of CASL.
Blaney McMurtry LLP
The blending of work and personal use on a single device raises a number of employment and privacy related issues.
Torkin Manes LLP
There is no doubt the world can be a scary and threatening place in which to do business. Cyber attacks are on the rise.
Miller Thomson LLP
Two recent decisions by the CRTC have prompted us to include a CASL update for the education sector in this month’s newsletter.
Norton Rose Fulbright Canada LLP
The Canadian Radio-television and Telecommunications Commission (the CRTC) recently issued another notice of violation under Canada’s anti-spam law (CASL), this time against Plentyoffish Media Inc., a corporation offering dating services to nearly 100 million users, some of which are located in Canada.
Article Search Using Filters
Related Topics
Mondaq Advice Centre (MACs)
Popular Authors
Popular Contributors
Font Size:
Mondaq on Twitter