article thumbnail

Legal Tug-Of-War: Protecting Privilege in Privacy Breach Disputes

IPilogue

Privacy breaches are becoming commonplace in today’s business landscape and cybersecurity is top of mind for many organizations— and for good reason. This situation is exacerbated by the risk of litigation, as lawsuits are a legitimate consequence of a privacy breach. Kaplan v Casino Rama Services Inc.

Privacy 106
article thumbnail

Minnesota’s Attempt to Copy California’s Constitutionally Defective Age Appropriate Design Code is an Utter Fail (Guest Blog Post)

Technology & Marketing Law Blog

by guest blogger Jess Miers, Legal Advocacy Counsel at Chamber of Progress [Eric’s intro: last year I blogged about Minnesota’s flirtation with mandatory age verification. In an attempt to address this concern, Minnesota offers some protection by maintaining the confidentiality of information subject to attorney-client privilege.

Copying 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to Incorporate Privacy by Design Into Your Business

Olartemoure Blog

Privacy by Design is the integration of data processing procedures to every stage of business practices. In this article we will explore the different guidelines that govern the world of Privacy by Design: The European guidelines that hold the standard, and how Privacy by Design works in Colombia. European guidelines.

Privacy 98
article thumbnail

Infographic | Privacy enhancing technologies

Olartemoure Blog

Privacy-enhancing technologies are tools and techniques designed to protect users’ personal data and privacy by enabling the analysis and sharing of insights within data, without sharing the data itself. What are PETs? They minimize the use of data as they maximize its control. Why are they useful? They can take many forms.

Privacy 59
article thumbnail

A Hospital Mailed a Patient’s Confidential Diagnosis to a Rando. You’ll Never Guess What Happened Next–ZD v. Community Health

Technology & Marketing Law Blog

Why did Jonae post ZD’s confidential diagnosis on Facebook? There were two obvious breakdowns that led to this bizarre and highly unfortunate set of events: (1) the hospital sending confidential medical information to a non-patient, and (2) the letter recipient publicizing the confidential medical information.

article thumbnail

Hey—You’re Muted! Privacy in the Zoom-Era

IPilogue

Privacy has been a reoccurring issue debated across the world as virtual communication is no longer seen as an option but essential to working remotely during a pandemic. Not only does this violate our privacy rights, but it also creates a bigger ethical dilemma within the economic market. Zoom: The 2020 Icon of Remote Work.

Privacy 106
article thumbnail

Around the IP Blogs

The IPKat

Take shelter in this post and check what was published last week around the IP blogs. A Kat being extra careful while Mercury is retrograde Copyright SpicyIP analysed a recent decision from the Bombay High Court, in which it was decided that ideas cannot be copyrighted but can be protected through the application of confidentiality law.