Header graphic for print
Privacy Law Blog

Privacy Law Blog Archives

Archives by Date

Archives by Topic

Archives by Tag

"executive order", 110th Congress, 111th Congress, 201 CMR, 201 CMR 17.00, 1747.08, AB 779, aba, access to the employees' personal emails or files, Act to Prevent Predatory Marketing Practices against Minors, address discrepancies, address discrepancies rules, administration, Adobe, advertising, affiliate, Affiliate Marketing Rule, Affiliate Sharing, affirmative consent, affirmative express consent, age verification, Alaska, amendment, american association of advertising agencies, american medical association, ameritrade, Anderson v. Hannaford, Anthem breach, application, appreciable harm, apps, Arch Wireless, Arizona, Arkansas, Article 29, Article 29 Working Party, association of national advertisers, Assurance of Discontinuance, attorney general, attorneys general, authentication, autodialer, automatic dialer, backdating, Bankruptcy, behavioral, behavioral advertising, behavioral advertising online behavioral advertising personally identifiable information privacy targeted advertising tracking data clickstream data cookies deep packet inspection ip addresses interne, behavioral targeting, behavioral tracking, Belmont Savings Bank, bill of rights, binding corporate rules, blocking statutes, blood spots, border search, Borings, Boucher, breach, breach notification, breach of contract, Brill, broker-dealers, broker-dealers Gramm-Leach-Blilely Act investment companies, BYOD, CAFA, Cajani, CalFIPA, California, California Online Privacy Protection Act, California Penal Code § 502(c), california privacy, CalOPPA, camera, CAN-SPAM, Card, card issuer, CDA, CDT, celebrities, cell phone, cellular privacy, center for digital democracy, certify, CGL, Chamber of Commerce, check-out, Chevron, children, choice, class action, Class Action Fairness Act, cloud, cloud computing, CNIL, cognizable injury, collection, Colorado, Commerce, Commerce Committee, Committee on Civil Liberties Justice and Home Affairs, Communications, Communications Decency Act, comprehensive privacy program, computer, Computer Fraud and Abuse Act, computers, computer usage policies, computing, Computing in the Cloud, concurrence, confidential information, Congress, Connecticut, Connecticut's data security laws, Connecticut Attorney General, consent order, consumer control, consumer report, consumer reports, contract, contractors, cookie notice, cookies, COPPA, corporate privacy, cost of data breach, coupon settlement, covered account, Credit and Debit Card Receipt Clarification Act, credit card, credit check, credit freeze, credit monitoring, creditor, credit report, criminal, Criminal Justice and Immigration Act, crm, Cross-border data transfers, CTIA, Cuomo, custodian, customer relationship management, cyber-bullying, Cyber Attacks, cyber insurance, cyber risk, Cyber Security, cybersecurity, Cybersecurity Examination Initiative, damages, data, Data Accountability and Trust Act, data breach, data breaches, data breach litigation, data collector, data disposal, data privacy, Data Privacy Day, Data Privacy Laws, data processing, data protection, Data Protection Act, Data Protection Directive, data protection reform, data retention, Data Retention Directive, data security, data security breach, data sharing, data storage device, De-identification, deadline, debit card, Debix, deceptive, deep packet inspection, defamation, Delaware, delay, destruction, DHS, Directive 95/46/EC, direct marketing, disclosure, Disclosure Laws, discovery, dismiss, Disposal Rule, dissent, District of Columbia, DMV record, DNA, DNC, do-not-call, doing business, do not track, DPA, dpi, DPPA, driver's privacy, driver's privacy protection act, Dubai, e-card, e-commerce, e-discovery, e-mail, e-mail addresses, e-Reputation, E-Verify, EBR, economic loss rule, ECPA, education, Ehavioral Advertising, Ehavioral Advertising FTC FTC Town Hall Federal Trade Commission Online Privacy PII, electronic communications, Electronic Communications Privacy Act, electronic storage device, electronic transmission, email, email harvesting, Emergency, employee, employees, employer, employers, employment, EMV, encrypt, encryption, Enforcement, enforcement action, EPIC, EU, EU Data Directive, Euopean Directive, EU regulation, European, European Commission, European Court of Justice decision of May 13 2014, European Directive 95/46/EC, European Directive of October 24 1995, European Union, European Union Data Protection Directive, exceptional damage to property, existing business relationship, expediently, expiration date, Facebook, Facebook MySpace privacy COPPA, FACTA, Fair and Accurate Credit Transactions Act, Fair and Accurate Transactions Act, Fair Credit Reporting Act, Fair Housing Council, fair information practices act, FAQs, Fax Advertisements, FBI, FCC, FCRA, FDIC, federal, Federal Communications Commission, Federal Trade Comission, Federal Trade Commission, FERPA, Fifth Amendment, Financial Institution, Financial Privacy, Financial Services Authority, fines, FINRA, FIOA, FIPS, firewall, First Amendment, Flash, Flash cookies, Flores, Florida, FOIA, foreign citizens, foreign relations, forum selection clause, Fourth Amendment, France, frca, FRCP, Freedom of Information Act, free text, French data protection, French Data Protection Authority, FTC, FTC Report, FTC Town Hall, Gamesradar.com, genetic, Genetic Information Privacy Act, genetic privacy, Georgia, Germany, GLBA, GLBA Privacy Rule, GLBA Safeguards Rule, global, Global outsoursing, Google, government contract, GPS, Gramm-Leach-Blilely Act, Gramm-Leach-Bliley, Gramm-Leach-Bliley; Privacy Notice, Gramm-Leach-Bliley Act, GSMA, guidance, hackers, harm, Hawaii, Health, health care, health information, Health Insurance Portability and Accountability Act, heartland, HHS, HIPAA, hiring, HITECH, HITECH Act, Homeland Security, Hurricane Sandy, hypothetical, IAPP, IAS, ICO, Iconix Brand Group, Idaho, identity exposure, identity theft, Illinois, immunity, increased risk, India, Indiana, Indian Privacy Rules, information, Information Commissioner, Information Commissioner's Office, information security program, injury-in-fact, inspector general, Institution, insurance, interagency, international, International Association of Privacy Professionals, international litigation, international practice, international privacy, Internet, Internet of Things, internet privacy, Invasion of Privacy, investigation, investment companies, IoT, Iowa, ip addresses, ISP, ISPs, Israel, Italian court, Italy, Jerry Brown, Judge Preska, Junk Fax Prevention Order, Kansas, Keylogger, Kleimann Communication Group, labor relations, laptop, law360, law enforcement, lawsuit, legal hold, legislation, less intrusive means, Levy-Hastak, LifeLock, list rental, litigation, litigation hold, location-based marketing, logistep, Los Angeles, Louisiana, Luis Aguilar, M-payment, Maine, Maine's Act to Prevent Predatory Marketing Practices Against Minors, marketing, Marshalls, Maryland, Massachusetts, material adverse retroactive change, material changes, medical, medical privacy, merchandise returns, merchant, Michigan, Minnesota, misappropriation, missing data, mississippi, missouri, MMA, MMS, MOBIbucks, mobile, Mobile Device, mobile marketing, mobile marketing association, mobile privacy, model contracts, model form, monitoring, Montana, MySpace, national security, national security letter, NCUA, Nebraska, negligence, network, Nevada, New Hampshire, New Jersey, New York, New York Attorney General, New York Attorney General Connecticut Attorney General age verification children online predators parental controls sex offenders social networking, Ninth Circuit, NIST, No-Match Rule, North Carolina, North Dakota, notice, notice of address discrepancy, notification, NSL, Obama, OCABR, OCC, OCR, Office for Civil Rights, Office of Compliance Inspections and Examinations (OCIE), Ohio, on, online, online behavioral advertising, online behavioral marketing, online content, online marketing, online predators, online privacy, Online Privacy Protection Act, online privacy rights, online safety, opt-out, opt in, Oregon, OTC, outsourcing, paperless, parental consent, parental controls, Parliament, particularly offensive, patriot act, pay-at-the-pump, payment card data, Payment Card Industry Data Security Standard, Payment Cards, PCI, PCI DSS, penalties, Pennsylvan, Pennsylvania, personal, personal data, personal data data transfers, personal identification information, personal identifying information, personal indentification information, personal information, personally identifiable information, personally identifying information, PHI, phishing, physical controls, PII, Pisciotta, policies, Politico, Ponemon, predatory, predatory marketing, preempt, preemption, prerecorded, president, print, prior notice, privacy, Privacy After Hours, privacy by design, privacy disclosure, privacy disclosures, privacy interests, privacy litigation, privacy notice, privacy policy, privacy principles, Privacy Rights Clearinghouse, Privacy Rule, privacy settings, private right of action, probable cause, processing, production, Proskauer, proskauerguide, Proskauer Rose, protected health information, protection, Puerto Rico, Quon, Rand, reasonable expectation of privacy, reasonable security, reasonable suspicion, receipt, red flag, red flag rule, red flag rules, red flags, red flags rule, Regulation, regulations, Regulation S-P, relevant advertising, RemoteSpy, report, Resolution 103, response, retailer, retailers, retail privacy, retention, Rhode Island, right to be forgotten, right to seclusion, Riley v. California, robocall, RockYou, Ruiz, S.B. 1, S.B. 949, safeguard, Safeguards Rule, safe harbor, SAFETY Act, safety online, SCA, search engines, search queries, SEC, SEC Guidance Update, Section 5, Section 230, secure system of the business, Securities and Exchange Commission Guidance Update, Securities Exchange Commission, security, security breach, Security Breach Notification Laws, security freeze, security questions, Security Rule, self regulatory principles, sensitive authentication data, sensitive data, service providers, settlement, settlements, sex offenders, sharing personal information, Shine the Light, shopping, Smart Grid, SMS, social media, social networking, social security number, Social Security numbers, song-beverly, Song-Beverly Credit Card Act, South Carolina, southern district, spam, speculative, spokeo, Spyware, SSN, SSNs, Standard of Care, STANDARDS FOR THE PROTECTION OF PERSONAL INFORMATION OF RESIDENTS OF THE COMMONWEALTH, standing, state, State Guidance, statute of limitations, Stearns, stengart, stimulus legislation, stolen data, Stollenwerk, storage, Stored Communications Act, Street view, student, student privacy, subcontractors, summary judgment, supreme court, surveillance, survey, swine flu, Switzerland, takedown, targeted advertising, tcpa, telemarketers, telemarketing, telephone consumer protection act, telephone purchase binding, tell-a-friend, Tennessee, terms of use, Texas, text messages, text messaging, TheDollPalace.com, TJX, tracking data, transaction form, transparency, travel, Trojan Emails, truncation, TSR, tweet, Twitter, U.S. Dept. of Health & Human Services, U.S. PIRG, U.S. Public Interest Research Group, UK, UK Information Commissioner's Office, unencrypted, unfair, Unfair Trade Practices Act, United Kingdom, United States v. Jones, US CERT, users of consumer reports, Utah, UTPA, Vermont, Video Privacy Protection Act, Virginia, warrant, Washington, webinar, web site, website operator, website privacy, wep, West Virginia, whistleblower, whistleblowing, whistleblowing system, White House, wireless network security, Wisconsin, WISP, without unreasonable delay, Working Party, workplace, workplace privacy, wpa, Wyoming, zip code