This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Our top five European dataprotection developments from June are: Non-material damage under GDPR: The CJEU clarified the scope of compensation for non-material damage in the context of identity theft and data subjects’ fear that their personal data had been exposed. These developments, and more, are covered below.
million fine against Austrian Post for channelling electronic dataprotection-related inquiries to a web form and not offering an additional email address, irrespective of the data subject option to also use non-electronic postal mail or customer service.
The concept of necessity has an independent meaning in European Union law, which must reflect the objectives of dataprotection law. Thus, investigating the issue of processing sensitive data for advertising purposes, the court determined in paragraph 13.14 of the Dutch Telecommunications Act.
In this post, we look back at the 2020 European dataprotection landscape and five trends that help companies understand not only where we are, but where dataprotection enforcement, litigation, and practice may be headed. million against Marriott for its 2018 data breach When you dig deeper though, two key points emerge.
. : Business may want to revisit their cross-border data transfer arrangements following the new adequacy decision for the EU-U.S. Data Privacy Framework, assess whether they are eligible to self-certify and, if they are, whether it makes sense to. Data Privacy Framework (the “DPF”). Data Privacy Framework (the “DPF”).
This is the third investigation carried out under the FCO’s new powers; it announced investigations into Facebook and Amazon earlier this year, and also previously conducted a similar investigation into Facebook in 2019 (see our updates here and here ). The Act enters into force on 1 December 2021.
The EU’s General DataProtection Regulation 2016 (the “GDPR”) changed the global privacy landscape, and has been called the “gold standard” for dataprotection regulation. Recently, a number of U.S. Recently, a number of U.S. Thus far, only the CCPA has regulations in force and has been enforced.
Fortunately, there are a number of software programs designed specifically for legal practice data management. These programs can help lawyers to keep track of important information, find relevant documents quickly, and share data with other members of their team.
Fortunately, there are a number of software programs designed specifically for legal practice data management. These programs can help lawyers to keep track of important information, find relevant documents quickly, and share data with other members of their team.
Marketing: In the retail context, facial recognition or “facial detection” technologies can scan shoppers for features such as age, gender, and mood—then deliver tailored advertisements in real time. Particularly scrutinized is the use of “real-time” facial recognition to scan crowds in public places, such as marches and protests.
Recent Data Minimization Enforcement Actions In January 2022, the New York Attorney General (“NYAG”) reached a $600,000 settlement with EyeMed related to a 2020 data breach in which attackers gained access to an EyeMed email account that contained sensitive customer data for a period of six years. The companies agreed to pay $1.5
Commissioners have previously voted to allow dataprotection law violators to retain algorithms and technologies that derive much of their value from ill-gotten data. In 2019, the FTC ordered Cambridge Analytica to destroy algorithms derived from information collected from consumers through allegedly deceptive means.
We applied for and were awarded Innovate UK funding in 2019. Most positively, I think this has helped widen openness to new technology, and to adopting the right tech at the right time and in the right place for the right reasons. One of my favourite quotes from our research was that lawyers are paid for time, not ideas.
In that position, he helped organize oversight hearings on mobile location tracking and biometric privacy. This provision is irrelevant for first-time offenders not subject to an existing FTC order or decree. Litigation is costly, time- and resource-intensive, and can play out over many years before resolution. 18] In FTC v.
To underscore these risks, DOJ cited real-world cases of unregulated access to sensitive data. Investigators demonstrated vulnerabilities by purchasing digital advertising data from brokers to track U.S. Engaging in data-mapping exercises may alleviate this burden. This rule implements E.O. 2] 28 C.F.R.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content