Mondaq All Regions: Privacy
Norton Rose Fulbright Australia
As the introduction of the Re-Identification Bill shows, privacy reform remains high on the legislative agenda.
Aird & Berlis LLP
We all hate passwords. Anyone who says s/he doesn't is fibbing.
Borden Ladner Gervais LLP
Le 22 septembre 2016, Yahoo Inc., en pleine négociation d'une opération de 4,8 milliards de dollars visant la vente de ses activités principales à Verizon Communications Inc., a révélé que certaines données de comptes d'utilisateurs, notamment des noms, des adresses électroniques, des dates de naissance et des mots de passe, avaient été récupérées illicitement à partir d'au moins 500 millions de comptes Yahoo en 20141.
Akin Gump Strauss Hauer & Feld LLP
The ruling could have implications for companies that provide dynamic IP addresses to users of their websites.
Jones Day
Mason Hayes & Curran
The Data Protection Commissioner ("DPC") recently published guidance on the use of data anonymisation and pseudonymisation techniques
Deloitte Luxembourg
Indeed, unlike a directive, a regulation does not have to be transposed into national law to become applicable.
Reed Smith (Worldwide)
The Court of Justice of the European Union ("CJEU") has ruled that dynamic IP addresses can constitute personal data.
Wedlake Bell
This month, the information commissioner' s office (ICO) fines TalkTalk for failing to adequately protect its customers' personal data.
Jones Day
This Emerging Issues video is the second in a series about Brexit - the June 2016 referendum in which the UK electorate voted to leave the EU.
Recently, Federal Communications Commission (FCC or Commission) Chairman Tom Wheeler circulated to the Commission a revised proposed order to regulate the data privacy and security practices of ISPs.
Poyner Spruill LLP
In our consulting days, a former boss – a retired Army Colonel – enjoyed sharing his Cold War recommendation for protecting sensitive documents from the KGB: fill up a fleet of tractor-trailers with every U.S. government document, and then dump the entire contents on the doorstep of the Soviet Embassy.
Fox Rothschild LLP
The FTC has issued an updated data breach response guide. The guide provides an outline of steps the FTC believes your company should follow in the event of a data breach. They fall into several broad categories: securing operations, fixing vulnerabilities, and notifying appropriate parties.
Reed Smith
Last week, the Office of Management and Budget created a new dedicated position for privacy within the Office of Information and Regulatory Affairs ("OIRA").
Holland & Knight
Foreign involvement in U.S. politics and policies has been in the news recently, with allegations of foreign governments hacking into email accounts and releasing politically sensitive materials...
Reed Smith
Lyft, Inc. – the popular ride hailing service featuring the iconic pink moustache – is facing a second class action lawsuit in California alleging violations under the Telephone Consumer Protection Act ("TCPA").
Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.
Mobile app creators should be aware that the Attorney General's office will not only be relying on consumers to identify non-compliant apps.
Yesterday, the Office of the Comptroller of the Currency (OCC), the Federal Reserve Board (Fed), and the Federal Deposit Insurance Corporation (FDIC) issued a joint advanced notice of proposed rulemaking (ANPRM) seeking comment on possible enhanced cybersecurity risk management standards for ..
Reed Smith
California Attorney General Kamala Harris is enlisting new enforcers in her efforts to get companies to comply with the state's privacy policy requirements: members of the public.
Data breaches are now big news. The hacking of Sony Pictures nearly caused an international incident when the US pointed the finger at North Korea.
Latest Video
Most Popular Recent Articles
Taylor English Duma LLP
On September 13, 2016, the New York Attorney General announced settlements with four major US toy and media companies regarding their use of online tracking of children who use their websites.
Blake, Cassels & Graydon LLP
Many fintech companies collect and process vast amounts of data in order to provide financial services quickly and inexpensively.
Brown Smith Wallace
A recent global study from Intel Security found that during the next year, 80 percent of IT budgets at organizations throughout the U.S. will go to cloud computing services.
Brown Smith Wallace
Social engineering – the act of manipulating people into disclosing sensitive data – is on the rise, and email phishing is the most prevalent form.
Jones Day
Data breach notification requirements in Arizona, Nebraska, and Tennessee took effect in July and August.
Kaye Scholer LLP
Cisco predicts that by the year 2020, there will be 50 billion devices connected to the internet, and some of those will be connected to other IoT devices as well.
Morgan Lewis
The EU-US Privacy Shield became operational on August 1, 2016; a nine-month grace period for compliance with the onward transfer requirements applies for organizations...
Kochhar & Co.
In the present era of cyber world, we have witnessed an increasing dependency on technology, which has left us open to threats of cyber crime.
McMillan LLP
International Data Transfers to and from Canada in the Era of the Trans-Pacific Partnership and the General Data Protection Regulation: Implementation of Robust Safeguards Measures...
Stikeman Elliott LLP
In the most recent enforcement decision relating to compliance with CASL, the CRTC has announced that Kellogg Canada has voluntarily entered into an undertaking respecting alleged non-compliance...
Article Search Using Filters
Related Topics
Mondaq Advice Centre (MACs)
Popular Authors
Popular Contributors
Up-coming Events Search
Font Size:
Mondaq on Twitter