Mondaq All Regions: Privacy
Holley Nethercote commercial & financial services lawyers
The most persuasive incentive to adopt a 'privacy by design' approach is the competitive edge it may give a mobile app.
Holding Redlich
Earlier this year, significant changes to the Australian Privacy Act came into operation.
Holley Nethercote commercial & financial services lawyers
When any personal information is collected from users, entities must notify users of the matters set out in APP 5.
Holley Nethercote commercial & financial services lawyers
Businesses launching or updating a mobile app should take steps to incorporate better privacy practices in their apps.
Stikeman Elliott LLP
The Supreme Court of Canada found that a police request to an Internet service provider for subscriber information constituted a search under the Charter of Rights and Freedoms.
Torkin Manes LLP
In many respects, today’s new cars are essentially mini-computers on wheels, containing vast amounts of computer chips, sensors, and nanotechnology.
McMillan LLP
A group insurance policy often involves several parties, namely the insurance company, the plan administrator and the insured employee (or "member" of the plan), who rarely however has any negotiating power in this regard.
Borden Ladner Gervais LLP
The Adjudicator considered whether hiring, paying and managing employees constitutes a "commercial activity" under Alberta’s Personal Information Protection Act.
Mason Hayes & Curran
The Minister for Justice recently commenced three previously inactive sections of the Irish Data Protection Acts 1988 and 2003 ("DPA").
Jones Day
Japan's IT Strategy Headquarters within the Cabinet Office announced its "Policy Outline of the Institutional Revision for Utilization of Personal Data".
Sayenko Kharenko
New trends of personal data protection in credit relations while transferring debt information to the third parties.
BakerHostetler
The Secret Service, which investigates financial crimes, issued a security Alert on July 31, 2014, warning of malware named "Backoff".
Fox Rothschild LLP
Mark McCreary was featured in the Legal Current article, "Should Law Firms Build Apps." Full text can be found in the August 19, 2014, issue, but a synopsis is below.
Fox Rothschild LLP
Scott L. Vernick was quoted in the Law360 article, "Community Health Heist Pulls Hospitals into Cyberthreat Fold."
Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.
The National Institute of Standards and Technology have published a Request for Information in the Federal Register.
Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.
Some weeks ago, we wrote a piece called "What You Need to Know About Backoff Malware: The New Threat Targeting Retailers".
BakerHostetler
For merchants, long gone are the days of using a card reader with a dial-up connection to their payment processor.
BakerHostetler
Last week it was reported that a small group of Russian computer hackers illegally obtained an unprecedented quantity of internet credentials, including 1.2 billion username and password combinations, and over 500 million unique email addresses
Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.
Wearable devices, including health and activity monitors, video and audio recorders, location trackers, and other interconnected devices in the form of watches, wristbands, glasses, rings, bracelets, belts, gloves, earrings and shoes are being heavily promoted in the next wave of consumer electronics.
Mayer Brown
While data privacy—especially data breach—cases in the United States have been on the rise for years now, most cases never make it past the pleading stage.
Latest Video
Most Popular Recent Articles
Singh & Associates
Due to immense increase in the use of Internet and dependency of individuals in every field, a number of new crimes related to Computer and other gadgets based on internet have evolved in the society.
BakerHostetler
Although HIPAA does not create a private cause of action, a recent Indiana Superior Court jury verdict indicates that HIPAA could still play an important role in private causes of action in state court based on negligence and professional liability as it relates to confidentiality.
DLA Piper Australia
Concerns about privacy and data control are often cited as major impediments to the growth and wide adoption of Cloud.
Sheppard Mullin Richter & Hampton
Plaintiffs frequently sue businesses in class actions for violation of the Telephone Consumer Protection Act of 1991, 47 U.S.C. § 227 (the "TCPA").
Norton Rose Fulbright Canada LLP
Bill S-4, the Digital Privacy Act, was recently passed by the Senate and has received first reading in the House of Commons.
Proskauer Rose LLP
Judge Holderman of the Northern District of Illinois preliminarily approved the settlement in late July.
Morrison Brown Sosnovitch
We all despise the proliferation of phishing, hacking, malware, spyware and data mining for personal information.
McGuireWoods LLP
No business is safe from privacy breaches and cyber attacks, and hackers grow more sophisticated each day.
Jones Day
In December 2013, a U.S. national retail store announced that credit and debit card data for more than 40 million consumers may have been compromised.
Fox Rothschild LLP
It is midway through 2014 and there have been updates to four existing, and one new, state breach notification laws.
Article Search Using Filters
Related Topics
Popular Authors
Popular Contributors
Tools
Font Size:
Translation
Channels
Mondaq on Twitter