Charles McLellan, M2M and the Internet of Things: A guide

Article’s Summary: “The Internet of Things will consist primarily of machines talking to one another, with computer-connected humans observing, analysing and acting upon the resulting ‘big data’ explosion. Here’s how the next internet revolution is shaping up.” The full text is available at http://www.zdnet… On the IoT, you may also read: Article 29 Data Protection Working […]

Peter Swire, Nancy J. and Lawrence P. Huang, Peter Hustinx and Three Clichés About E.U.-U.S. Data Privacy

Data Protection Anno 2014: How to Restore Trust? Contributions in honour of Peter Hustinx, European Data Protection Supervisor (2004-2014), ISBN 978-1‐78068‐213‐6 Abstract This essay is in honor of the retirement of Peter Hustinx, who served as the first European Data Protection Supervisor, from 2004-2014. The essay suggests that key themes in Hustinx’ career show a […]

Bryan Choi, The Anonymous Internet

72 Maryland Law Review 501 (2013)   Abstract: “This Article argues in favor of regulating online anonymity, not from the standpoint that doing so will prevent harmful abuses or improve security, but instead that refusing to do so will ultimately harm other liberty interests. One principle that has emerged from cyberlaw scholarship is that we […]

Huron Consulting Group, Curtailing the Costs of E-Discovery

From the Article: “E-discovery practice continues to evolve, resulting in increasing complexity and, with it, greater risks. Recent cases and developments offer new insights and interpretations of existing issues, while new practices and technology, such as cloud computing, intelligent review technology, mobile devices/BYOD, and overpreservation add new challenges”. The full text can be downloaded at http://www.huroncon….

CTIA Wireless Association, Privacy

CTIA description from the website “CTIA advocates on behalf of its members at all levels of government. CTIA also coordinates the industry’s voluntary efforts to provide consumers with a variety of choices and information regarding their wireless products and services. This includes the voluntary industry guidelines; programs that promote mobile device recycling and reusing; and […]

Ernest Sasso, E-Mail and Client Confidentiality

[Note: date of publication unclear] From the Article: “Question No. 1: Is it necessary—for either ethics, privilege, or liability purposes—to encrypt communications on the Internet, except for matters so important that any threat of interception must be avoided? Question No. 2: Must lawyers communicate with or about clients on the Internet using only encryption software? […]

Nathan M. Crystal, New York City Bar approves Report providing guidance to lawyers in using cloud computing services.

“He has his head in the clouds,” – a familiar expression used to refer to someone who is theoretical, impractical, or dreamy.  However, for lawyers today being in the clouds is not only practical, it may be “inevitable.” Cloud computing seems to be everywhere lawyers turn, from email to legal research to data storage and […]

In re Google Inc. Cookie Placement Consumer Privacy Litig., 988 F. Supp. 2d 434, 2013 U.S. Dist. LEXIS 145727, 2013 WL 5582866 (D. Del. 2013)

On October 9, 2013, Delaware US District Court released a memorandum opinion dismissing charges against Google since plaintiffs did not demonstrate direct harm caused by the company’s actions. In this case, plaintiffs filed a consolidated amended complaint against Google and other companies providing internet services accusing them of having “tricked” their browsers into accepting unauthorized […]

Children’s Online Privacy – Calif. Bus. & Prof. Code §§ 22580-22582

Calif. Bus. & Prof. Code §§ 22580-22582 (2013 S.B. 568, Chapter 336) California’s Privacy Rights for California Minors in the Digital World Act, also called the “eraser” bill, will permit minors to remove, or to request and obtain removal of, content or information posted on an Internet Web site, online service, online application, or mobile application. It also prohibits […]