Canadian privacy law (PIPEDA) applies extraterritorially, Federal Court of Canada holds

On January 30, 2017, the Federal Court of Canada found Globe24h.com, a Romanian based website and its sole owner and operator, in violation of the Personal Information Protection and Electronic Documents Act (PIPEDA). By way of background, the Romanian based website indexed and reposted Canadian court and tribunal decisions that were also available on Canadian legal […]

Tags:

House of Representatives voted to repeal FCC’s Broadband Privacy Rules

On March 28, 2017, the US House of Representatives approved 215 to 205 a joint resolution to repeal the order “Protecting the Privacy of Customers of Broadband and Other Telecommunications Services” (“Order”) published on November 2016. See here. The joint resolution (S.J.RES34) passed by the US Senate and the House of Representatives disapproves the Order submitted […]

Tags: ,

The House to vote today to repeal Internet Privacy Rules

The House is voting today on a bill to repeal Obama Administration’s internet privacy rules. The Senate already voted last Thursday (March 23, 2017) to repeal those rules. The rules that protect consumers’ online activity (Protecting the Privacy of Customers of Broadband and Other Telecommunications Services” (81 Fed. Reg. 87274 (December 2, 2016) were passed last year […]

Tags: ,

Sanction Granted for Spoliation when Defendant Relied on Third Party to Preserve ESI

On February 24, 2017, the US District Court for the Northern District of California imposed sanction on a party failing to preserve electronically stored information (ESI) transferred in the sale of business. In this action for breach of duties under ERISA, the Court granted Plaintiffs’ motion for sanctions for spoliation of evidence. An insurance company […]

Tags: ,

Compelling password production does not violate the Fifth Amendment

  On March 20, 2017, the Third Circuit affirmed a ruling of contempt over an Appellant’s claimed inability to remember his drive-decryption passwords. The issue in appeal was whether the Government has the right to compel owners to cooperate in the decryption of digital devices after the Government seizes those devices pursuant to a valid […]

Tags:

Use of a file-sharing site without password was found to constitute a waiver of attorney-client privilege and work product protection

On February 9, 2017, a Virginia District Court deemed that the posting of privileged information on the web without protection results in a waiver. In this case, Harleysville Insurance Company, (“Harleysville”) sued the defendants, Holding Funeral Home, Inc. seeking a declaratory judgment that it did not owe them fire loss claim. (Incidentally, the District Court […]

Tags: , ,

ECJ holds dynamic IP addresses are personal data if additional information allowing user identification can reasonably be obtained from third parties

On October 19, 2016, the European Court of Justice (“ECJ”) presented its conclusions in Patrick Breyer v. Bundesrepublik Deutschland (case C‑582/14). According to the ECJ The dynamic internet protocol address of a visitor constitutes personal data, with respect to the operator of the website, if that operator has the legal means allowing it to identify […]

Tags: , ,

Italian DPA issues fines totaling 11 million to group for a data breach

In February 2017, the Italian Data Protection Authority (Garante per la protezione dei Dati Personali)  fined five companies over 11 million euros for the unlawful processing of personal data. The companies, which operate in the money transfer field, unlawfully processed the personal data of over 2 millions people. To avoid money laundering legislation, the companies would use […]

Tags:

Privacy Shield certification does not mean compliance needs to extend beyond European data

When a US organization decides to self-certify under the EU-U.S. Privacy Shield, compliance with Privacy Shield principles becomes compulsory. This may be a problem for many US organizations because certain processing activities that they perform – which are perfectly lawful under American law — are unlawful under a Privacy Shield’s perspective. Why? And what to do? Let’s step […]

Tags: ,

1 23 24 25 26 27 80