Exploiting loopholes in Internet users’ cookie-blocking settings while claiming to protect them from cookies is a serious and deceitful invasion of privacy, the Third Circuit held November 10.
CISA had just passed out of the public’s eye during the first half of November. But in light of the terrorist attacks on Paris, encryption—and how much—has taken center stage in U.S. politics.
Record Fine: Belgium’s Court orders Facebook to stop Data Protection law violation under forfeiture of a penalty of € 250,000 per day.
Spain’s Data Protection Authority, the Agencia Española de Proteccion de Datós (‘AEPD’), has issued a deadline of 29 January 2016, for the implementation of alternative mechanisms to Safe Harbor.
With an estimated 400,000 drones to be sold off the shelves this holiday season, the Federal Aviation Administration (FAA) task force recently released a list of recommendations for recreational drone use, which includes registering each drone with the FAA in a national database.
Who Exactly Qualifies As the Prevailing Party Entitled to Costs in a Mixed Judgment Case? and What Exactly Are Recoverable Production Costs?
In this patent infringement case, M-Tel contested a prior ruling by the District Court, which held that Samsung had not infringed upon patents owned by M-Tel. M-Tel claimed that Samsung was not the prevailing party as both the plaintiff and defendant won on certain of the underlying claims (MTel obtained a jury finding that its patents were not invalid, and Samsung obtained a jury verdict of no infringement), and, as a result, because both parties “prevailed” in part, M-Tel was entitled to recover on document production costs.
On November 2, 2015, the U.S. Federal Communications Commission issued two proposed fines related to Wi-Fi hotspot blocking.
Philadelphia Magazine just published an article I wrote examining common legal issues for startups.
The Internet of Things (IoT) has been identified as a disruptive technology, bringing with it both the promise of seamless interconnectivity of devices and, the flip side of that interconnectivity, single-point vulnerability of multiple systems.