This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Image: Shutterstock Although I post my blog content on WordPress, I usually use MS Word to draft my content initially. Little did I know that, according to the blogsite and forum nixCraft, Microsoft recently (September Privacy update) switched on a feature that allows them … Continue reading "Writers!
In an interesting development, the CIC recently rejected an RTI application concerning information on IPRS’ compliance with the Copyright Act, upholding privacy for private organizations and confidentiality of inquiry reports that have not been tabled in front of the Parliament. Kartikeya is a second-year law student of the LL.B.
In summer 2018, I wrote a short primer on the California Consumer Privacy Act (CCPA) soon after its passage. The passage of the California Privacy Rights Act (CPRA) in November 2020 necessitated a complete revamp. That primer proved to be quite popular, and I posted annual updated versions in summer 2019 and 2020.
Instacart purports to bind consumers to its privacy policy via this screen: (Sorry for the poor image resolution. The court says Instacart creates an enforceable sign-in-wrap (ugh): The Court finds Instacart’s privacy policy conspicuous and obvious for several reasons. Airbnb , the green font for the privacy policy link is NBD.
The AI revolution has brought about significant concerns about the privacy of big data. Thankfully, over the past decade, big tech has found a solution to this problem: differential privacy, which actors have implemented in various ways. government has implemented differential privacy for their 2020 census data.
Photo by Ricardo Gomez Angel on Unsplash Since 22 May 2024, Meta has notified to European users of Instagram and Facebook – through in-app notifications and emails – an update of its privacy policy, linked to the upcoming implementation of artificial intelligence (AI) technologies in the area.
One contentious point from the Bracing for Impact Conference: AI for the Future of Health session was synthetic data’s potential to solve the privacy concerns surrounding the datasets needed to train AI algorithms. Data augmentation is typically not useful in the privacy context. This results in more complete datasets.
California passed the California Age-Appropriate Design Code (AADC) nominally to protect children’s privacy, but at the same time, the AADC requires businesses to do an age “assurance” of all their users, children and adults alike. Doing age assurance/age verification raises substantial privacy risks.
While AI-generated prompts streamline our daily lives, they also pose significant privacy risks. Challenges emerge when AI systems not only retain data but also process and potentially share it with third parties without consent, placing data privacy at the forefront of AI governance. Rajagopal v. State of Tamil Nadu.
I’m Eric Goldman, a law professor at Santa Clara University School of Law, where I direct the school’s Privacy Law Certificate. My blog posts about the CCPA have all featured the “dumpster fire” GIF. 24 is the Wrong Policy Approach, at the Wrong Time, via the Wrong Process”. * Over 50 Privacy Professionals & Experts Oppose Prop.
On August 11, 2022, the Office of the Privacy Commissioner of Canada (OPC) published a report on its survey of Canadian businesses regarding privacy related-issues (the Survey). The Survey findings are used by the OPC to provide privacy guidance to the public and improve outreach efforts with businesses.
On behalf of a putative class, the plaintiffs asserted privacy claims—including for wiretapping—under California law. As an initial matter, the court says that Nike’s privacy policy does not undermine plaintiff’s claims. The Cookie Crumbles for Amazon Privacy Plaintiffs – Del Vecchio v. Nike, Inc., Specific Media. Interclick.
But before we get there, AR filters are in jeopardy due to an old-school privacy law, the Illinois Biometric Information Privacy Act (BIPA). To some privacy lawyers, this is a prima facie violation of BIPA. Selected BIPA Blog Posts AWS Can’t Shake BIPA Lawsuit for Providing Services to NBA 2K–Mayhall v. The complaint.
IP Osgoode would like to congratulate the winners of the Gowling WLG Best Blog in IP Law and Technology Prize for 2020-2021. Four prizes in total are awarded each year to Osgoode students and the winning blog posts are featured in the IPilogue. Best Blog Comment : We did not award a winner for this category.
On October 27, 2021, the Office of the Privacy Commissioner of Canada (the OPC) released observations following a series of international engagements between data protection and privacy authorities around the world and four of the biggest video teleconferencing (VTC) companies: Microsoft, Cisco, Zoom, and Google (the Organizations).
Instead, the allegations recount Microsoft’s numerous (robust) privacy-related representations made to customers. Claim under Washington’s CPA : The court says first that plaintiffs “overpayment theory” (that they would not have paid as much in price had they known of Microsoft’s lax privacy practices”) states a cognizable injury.
In August, Apple made headlines by introducing new privacy features in their upcoming software updates. Over the years, Apple has cultivated a strong reputation as a protector of consumer privacy. One of their core values and popular marketing point s is that “privacy is a fundamental human right.”
Best Blog in IP Law and Technology Prize for 2021-2022. Four prizes in total are awarded each year to Osgoode students and the winning blog posts are featured in the IPilogue. Gowling WLG Best Blog in IP Law and Technology Prize? Best Blog: Kwangil (David) Park: What is a Method of Medical Treatment? . Gowling WLG ?Best
Privacy has been a reoccurring issue debated across the world as virtual communication is no longer seen as an option but essential to working remotely during a pandemic. Not only does this violate our privacy rights, but it also creates a bigger ethical dilemma within the economic market. Zoom: The 2020 Icon of Remote Work.
Online privacy is, without a doubt, an area of growing concern. How would successful implementation of the proposal negatively impact privacy rights? Emily Laidlaw, the Canada Research Chair in Cybersecurity Law at the University of Calgary, agrees that the obligation to monitor websites creates a privacy risk.
Plaintiffs have not met their burden to allege facts demonstrating an injury-in-fact sufficient to confer standing for their privacy-based claims. Plaintiffs’ claims for breach of the GitHub Privacy Policy and Terms of Service, violation of the CCPA, and negligence are dismissed with leave to amend. But not so, says the court.
Privacy breaches are becoming commonplace in today’s business landscape and cybersecurity is top of mind for many organizations— and for good reason. This situation is exacerbated by the risk of litigation, as lawsuits are a legitimate consequence of a privacy breach. The privilege terminates once the respective litigation ends.
After the parties failed to informally resolve the matter, the Claimant brought a case before the Court claiming numerous causes of action, including the Defendant’s breach of applicable privacy laws. Under Section 2 of the DPA, the privacy of individuals is protected by the Regulations.
On September 22, 2021, Quebec’s major privacy reform bill, An Act to modernize legislative provisions as regards the protection of personal information (Bill 64), received royal assent after being adopted by the Quebec National Assembly the day before.
A thorough analysis of the selected EdTech products showed that a vast majority of the government-endorsed online learning platforms risked children’s privacy and violated children’s rights. Part 2 will discuss the HRW report’s recommendations and the initiatives being taken to address the risks that EdTech poses to child privacy.
“ Privacy. * Prior blog post. * The post 2H 2022 Quick Links, Part 1 (Marketing, Privacy) appeared first on Technology & Marketing Law Blog. In re Meta Pixel Healthcare Litigation, 2022 WL 17869218 (N.D. ” * Williams v. The settlement agreement.
The convicted individual contended that the police’s action of requesting IP address information without a warrant breached their privacy rights, as stipulated by the Canadian Charter of Rights and Freedoms. The claimant’s subjective expectation of privacy. The claimant’s interest in the subject matter.
. * The Anticipated Domino Effect: Virginia Passes Second State “Comprehensive” Privacy Law (Guest Blog Post). * SF Chronicle Op-Ed: “Prop. 24 is the Wrong Policy Approach, at the Wrong Time, via the Wrong Process”. * Over 50 Privacy Professionals & Experts Oppose Prop. 24. * Californians: VOTE NO ON PROP.
This post is part of MoFos 2025 Intersection of AI and Life Sciences blog series. In this blog series, we explore how artificial intelligence is revolutionizing research, innovation, and patient care in the life sciences.
This slightly opens the door for other platforms to claim that their ToS protect different interests, such as users’ privacy. Contracts designed solely to control the flow of information are distinguished from those protecting other values, such as privacy. Standard form agreements can be separated from negotiated contracts.
On June 27, 2022, the Office of the Privacy Commissioner of Canada, along with fellow members of the Global Privacy Assembly’s International Enforcement Cooperation Working Group (IEWG), released guidance documents to help individuals and organizations protect against credential stuffing attacks.
Prior to the Covid-19 pandemic, academic discussions indicated that artificial intelligence (AI) would signify the fourth industrial revolution with tangible economic benefits and potential privacy concerns. Nowadays, privacy concerns exceed personal information protection. .
On May 2, 2022, Canada’s privacy regulatory authorities (the Regulators) issued a joint statement calling for a legal framework that clearly establishes the acceptable circumstances for police to use facial recognition technology (FR). Imtiaz Karamat is an IP Osgoode Alumnus and Associate Lawyer at Deeth Williams Wall LLP.
The Plan also recognizes that eliminating the use of fax machines would promote patient privacy, which aligns with the Information and Privacy Commissioner of Ontario’s (IPC’s) initiative to modernize Ontario’s health communication infrastructure. Joseph’s Healthcare Hamilton caused by misdirected faxes.
Indeed, ephemeral messaging offers many benefits for enterprises, particularly in the areas of information governance and compliance with data protection and privacy statutes. The post Messaging Apps Raise Tricky E-Discovery Issues (Guest Blog Post) appeared first on Technology & Marketing Law Blog.
On September 29, 2022, the Office of the Privacy Commissioner of Canada (the OPC) published the results of its investigation into the 2018 data breach involving Marriott International, Inc. Marriott), finding many of the hotel giant’s privacy controls inadequate and recommending remedial steps to prevent future breaches.
It’s “burn-down-the-Internet” week on the blog, during which I will recap three bad California bills that the California legislature is poised to enact. For background on the bill and its voluminous problem, see this lengthy blog post. Today’s bill is AB 2273, the most pernicious of the three.
Imtiaz Karamat is an IP Osgoode Alumnus and Associate Lawyer at Deeth Williams Wall LLP. This article was originally posted on E-TIPS For Deeth Williams Wall LLP on June 1, 2022.
This is not the first time my blog has been subject to right-to-be-forgotten (RTBF) takedowns. But every time the RTBF is applied to my blog, it’s probably a wrongful application of a misguided policy and worth relaying here. It is critical information, even if the blog is just a bit player in the matter.
See, e.g., In re Ring LLC Privacy Litigation (C.D.Cal., JustAnswer (Guest Blog Post) appeared first on Technology & Marketing Law Blog. The post California Appellate Court Rejects Poorly Executed “Sign-In Wrap”–Sellers v.
However, as privacy concerns grew, new interfering technologies have emerged. Encrypted Client Hello A few days ago, Internet infrastructure company Cloudflare implemented widespread support for Encrypted Client Hello (ECH), a privacy technology that aims to render web traffic surveillance futile.
Marketa Trimble [Eric’s introductory note: I briefly addressed the DSA in this blog post , along with the attached meme. the California Consumer Privacy Act is a prime example of GDPR spillover. Intermediaries (Guest Blog Post) appeared first on Technology & Marketing Law Blog. by guest blogger Prof.
And, of course, no post about the California Privacy Rights Act (CPRA) (which the AADC purports to amend) would be complete without this GIF: * * *. The post Some Memes About California’s Age-Appropriate Design Code (AB 2273) appeared first on Technology & Marketing Law Blog.
Bykovets , 2024 SCC 6, the Supreme Court of Canada ruled that for Charter of Rights purposes, a person being investigated by the police has a reasonable expectation of privacy in an IP address in the possession of a third person, in this case a payment processor, even when not linked to any personally identifying information.
We organize all of the trending information in your field so you don't have to. Join 9,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content