article thumbnail

The Burden of Privacy In Discovery

Data Matters

With the proliferation of social media platforms and other new technologies has come a renewed legal focus on privacy. Could a party, for instance, decline to produce, review, or even collect certain types of data due to privacy concerns? But what about other contexts? In this essay, Robert D.

Privacy 97
article thumbnail

STEPS FORWARD: How the Middle East led the U.S. to adopt smarter mobile security rules

The Last Watchdog

When it comes to securing mobile computing devices, the big challenge businesses have long grappled with is how to protect company assets while at the same time respecting an individual’s privacy. BYOD threw a monkey wrench into IT operations starting in 2010 or so. BYOD tensions Some historical context is needed here.

Security 205
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Companies’ Right to Privacy

Data Protection Report

Constitution—infringing the privacy rights of the companies , rather than the users. The local law derived from a 2010 New York State law that prohibited rental of most apartments for less than 30 days unless a permanent resident remained on the premises. Airbnb, Inc. at 18 (citations omitted).) Note that, in 2015, the U.S.

Privacy 40
article thumbnail

Microsoft sued North Korea-linked Thallium group

Security Affairs

The group is charges of violations of the Computer Fraud & Abuse Act and Electronic Communications Privacy Act; federal trademark infringement, dilution, and false designation of origin; cyber squatting; com mon law trespass to chattels; unjust enrichment; conversion; intentional interference with contracts. 27 in the U.S.

article thumbnail

Regulating Privacy Across Borders in the Digital Age

Hunton Privacy

On November 10, 2010, the American Bar Association’s Section of Antitrust Law’s International Committee and Corporate Counseling Committee hosted a webinar on “Regulating Privacy Across Borders in the Digital Age: An Emerging Global Consensus or Vive la Difference?”.

Privacy 40
article thumbnail

Privacy Settings on Social Networking Sites May Determine Protection Under Stored Communications Act

Hunton Privacy

On May 26, 2010, the court in Crispin v. The court left open the question of whether Crispin’s wall postings and comments should be disclosed pending a more thorough review of his online privacy settings. Christian Audigier, Inc. quashed portions of subpoenas seeking the disclosure of private messages sent through Facebook and MySpace.

article thumbnail

Failure to Secure Wireless Network Defeats ECPA Claims

Hunton Privacy

A computer user’s failure to secure his wireless network contributed to the defeat of his claim that a neighbor’s unwelcome access to his files violated the Electronic Communications Privacy Act (“ECPA”). The ECPA places restrictions on unauthorized interception of, and access to, electronic communications.