Remove 2012 Remove 2015 Remove Exercises
article thumbnail

UK Supreme Court Grants Google Permission to Appeal Class Action Claim in Lloyd vs Google LLC

Data Matters

million iPhone users in a lawsuit alleging that between 2011 and 2012 Google had used its “DoubleClick cookie” technology to track the internet activity of its iPhone users and then collate, use and sell the data to advertisers, in breach of the former Data Protection Act, 1998 (“ DPA ”). Court of Appeal’s decision. to the U.S.

article thumbnail

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

The first Cyber Range training and testing hub opened at Eastern Michigan University in late 2012. In 2015, construction began on a dedicated facility located a 12-acre business incubator campus, called the Velocity Collaboration Center , in Sterling Heights, a Detroit suburb. They answered, yes. Shoring up weak links.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK: Lloyd -v- Google: a good day for claimant lawyers; a bad day for Google and organisations defending privacy group litigation

DLA Piper Privacy Matters

The High Court ought to have exercised its discretion to allow this representative action to proceed. He brings his claim on behalf of more than 4 million Apple I-Phone users; allegedly affected by Safari Workaround in the period from 9 April 2011 to February 2012. At first instance, Warby J exercised this discretion.

Privacy 40
article thumbnail

Draft Cybersecurity Law Published for Comment in China

Hunton Privacy

On July 6, 2015, the Standing Committee of the National People’s Congress of the People’s Republic of China published a draft of the country’s proposed Network Security Law (the “Draft Cybersecurity Law”). A public comment period on the Draft Cybersecurity Law is now open until August 5, 2015.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

The 2015 amendments to Rule 26(b)(1), however, were meant to resolve any doubt, returning the proportionality factors to their original place as part of the very definition of what is discoverable. 15 These changes were intended to “enable the court[s] to keep a tighter rein on the extent of discovery.”16.

Privacy 94
article thumbnail

Predictions 2016: Apple, Tesla, Google, Medium, Adtech, Microsoft, IoT, and Business on a Mission

John Battelle's Searchblog

Twelve years of making predictions doesn’t make writing them any easier, regardless of my relatively good showing in 2015. And given that more than 125,000 of you read my post summarizing how I did in 2015 (thanks Medium and LinkedIn!), Ouch, 2015 was not kind to Twitter, especially if you were a stockholder.

IoT 75
article thumbnail

How to prioritize your resources from a risk management perspective

CGI

Thu, 10/08/2015 - 08:00. According to a survey of state government Chief Information Security Officers (CISOs) by the National Association of State CIOs (NASCIO), more funding was made available for cybersecurity programs in 2014 than in 2012. How to prioritize your resources from a risk management perspective.

Risk 40