PRIVACY + SECURITY BLOG

News, Developments, and Insights

high-tech technology background with eyes on computer display

Lawsuits for Wrongful Data Collection – Biometric Data and Beyond: An Interview with Katherine Heaton and Amanda Thai

Powered by recent privacy laws, lawsuits for wrongful data collection have been rapidly increasing. The result is a growing body of caselaw, many unanswered questions, and a new landscape for companies to navigate. I recently had the opportunity to discuss the expanding number of wrongful collection lawsuits with several experts at Beazley. Based in Denver, Katherine […]

The Future of Cybersecurity Insurance and Litigation: An Interview with Kimberly Horn

Cybersecurity litigation is currently at a crossroads. Courts have struggled in these cases, coming out in wildly inconsistent ways about whether a data breach causes harm. Although the litigation landscape is uncertain, there are some near certainties about cybersecurity generally: There will be many data breaches, and they will be terrible and costly. We thus […]

Of Sex Tapes, Pseudonymous Litigation, and Judicial Bungling

Video Camera

Lior Strahilevitz (law, Chicago) has a wonderful post over at the Chicago Law Faculty Blog about a very problematic Seventh Circuit opinion — and blunder. The case, Doe v. Smith, involves a teenage girl whose boyfriend secretly videotaped them having sex and then emailed the video to his friends. The issue is whether the plaintiff could proceed on […]

More on Pseudonymous Litigation

Pseudonymous Litigation

Howard Bashman offers these further thoughts about the issue of pseudonymous litigation and the sex tape case I blogged about earlier today : In terms of assessing blame, however, in my view it is the attorney for the pseudonymous party who bears the responsibility to ensure that the appellate briefs posted online — and surely the Seventh Circuit’s […]

Is Anonymous Blogging Possible?

Anonymity

Howard Bashman at How Appealing muses whether anonymous blogging is really possible: These days, however, most users of the internet understand that every bit of information communicated electronically leaves electronic fingerprints that can be used to trace the source of the information, even if the source hoped to remain anonymous. To be sure, there are ways […]