European Commission’s update on GDPR after 8 months of its application (with list of member states’ harmonization laws)

  On January 25, 2015, the European Commission released a statement with an update about the effects of the adoption of Regulation 2016/679/EU (GDPR). See: Joint Statement by First Vice-President Timmermans, Vice-President Ansip, Commissioners Jourová and Gabriel ahead of Data Protection Day Since its entry into force on May 25, 2018, “citizens have become more […]

Tags:

Advocate General opined that embedding a Facebook “Like” button on websites could determine a situation of joint control

On December 19, 2018, Advocate General Bobek, published his opinion in case C-40/17, deeming that anyone who enters the Facebook “Like” button on his website can be considered a joint controller. In this case, a German fashion online retailer embedded a Facebook’s ‘Like’ button in its website. As a result, when users landed on the […]

Tags: ,

Illinois Supreme Court found improper collection and retention of handprints constitutes injury-in-fact sufficient to grant standing

    On January 25, 2019, the Illinois Supreme Court found that data subjects do not need to allege a concrete injury in order to sue under the Biometric Information Privacy Act (Act) (740 ILCS 14/1 et seq., BIPA). Contrary to the appellate court’s view, the Illinois Supreme Court found that “actual injury or adverse […]

Tags:

Computer-assisted legal research is a necessity for the contemporary practice of law but shall be carried out with competence

    Two courts in Canada recently dealt with excessive legal fees charged for performing legal research and found out that computer-assisted legal research is a necessity for the contemporary practice of law but shall be carried out with competence. In both Cass v. Ontario and Drummond v. Cadillac the Ontario Superior Court commented on artificial intelligence and […]

Tags: ,

After Alabama passed its data breach law, there is no American jurisdiction without a data breach statute

On March 28, 2018, Alabama was the last State, after South Dakota, to adopt a data breach notification statute. The Alabama Data Breach Notification Act of 2018 (S.B. 318) went into effect on June 1, 2018. According to the Alabama Statute, any “covered entity” and “third-party agent” must comply. Written notification must be made to all affected […]

Tags:

EU Commission adopts adequacy decision on Japan

On 23 January 2019, the EU Commission adopted its adequacy decision on Japan, allowing personal data to flow freely between Europe and Japan. The adequacy decision started to apply as of January 23. The same will happen on the Japanese side. The adequacy decision includes: a set of Supplementary Rules to strengthen the protection of sensitive data, […]

EUR 50 million GDPR sanction issued against Google for lack of transparency, valid legal basis, and lack of consent

On January 21, 2019, the CNIL (Commission Nationale de l’Informatique et des Libertés, the French Data Protection Authority), restricted committee, for the first time applies the new sanctions limit provided by the GDPR and sanctions Google for EUR 50 million for two GDPR violations: 1. “violation of the obligations of transparency and information“ “First, the restricted […]

Advocate general suggest to limit global de-listing approach related to right to be forgotten

On January 10, 2018, Advocate General Maciej Szpunar of the Court of Justice of the European Union (CJEU) issued his opinion in the case of Google v. CNIL (Case C-507/17). In the opinion, the Advocate General stresses that the right to be forgotten must be balanced against other fundamental rights, such as the legitimate public […]

Tags: ,

NY A.G. settled with five companies whose mobile apps were not secure

On December 14, 2018, New York Attorney General Barbara D. Underwood announced settlements with Western Union Financial Services, Inc., Priceline.com, LLC, Equifax Consumer Services, LLC, Spark Networks, Inc., and Credit Sesame, Inc., “for having mobile apps that failed to keep sensitive user information secure when transmitted over the Internet.” No fraud had happened with those […]

Tags: ,

1 9 10 11 12 13 80