Posts

mlat subpoena response: what EU service providers need to know

MLAT Subpoenas: What EU Service Providers Need to Know

Imagine a U.S. prosecutor is investigating a criminal matter and needs to obtain data or information stored in a suspect’s smartphone application. The problem is, the app was developed by a small tech startup in Denmark. In order to obtain access to the relevant information, the prosecutor would need toImagine a U.S. prosecutor is investigating a criminal matter and needs to obtain data or information stored in a suspect’s smartphone application. The problem is, the app was developed by a small tech startup in Denmark. In order to obtain access to the relevant information, the prosecutor would need to

Cloud Act Compliance

CLOUD Act Compliance & Relationship to GDPR

For domestic criminal investigations, law enforcement often wants to gain access to data that is stored beyond its borders. The problem is that data access across borders is sometimes not in harmony with international human rights agreements and the data protection rules of specific nations. To allow criminal law enforcementFor domestic criminal investigations, law enforcement often wants to gain access to data that is stored beyond its borders. The problem is that data access across borders is sometimes not in harmony with international human rights agreements and the data protection rules of specific nations. To allow criminal law enforcement

Service Providers, Subpoenas, and the GDPR

Hi everyone. My name is John Di Giacomo and I am an attorney and a partner with Revision Legal, which is an internet and intellectual property law firm. And in that role I represent a lot of service providers. These service providers range from software as a service providers, appHi everyone. My name is John Di Giacomo and I am an attorney and a partner with Revision Legal, which is an internet and intellectual property law firm. And in that role I represent a lot of service providers. These service providers range from software as a service providers, app

sim swap scams

SIM Swap Scams Targeting Cryptocurrency Investors

SIM swap scams are nothing new, and are back in the news with high profile SIM swap attacks on Twitter’s CEO. Telecommunications providers such as Verizon, AT&T, T-Mobile, and Sprint have been aware for over ten years that unauthorized third parties regularly attempt to obtain access to customer subscriber accountsSIM swap scams are nothing new, and are back in the news with high profile SIM swap attacks on Twitter’s CEO. Telecommunications providers such as Verizon, AT&T, T-Mobile, and Sprint have been aware for over ten years that unauthorized third parties regularly attempt to obtain access to customer subscriber accounts

FOSTA-SESTA

FOSTA-SESTA for Internet Service Providers

FOSTA-SESTA for Internet Service Providers The Allow States and Victims to Fight Online Sex Trafficking Act (FOSTA) and the Stop Enabling Sex Traffickers Act of 2017 (SESTA) are two bills that were passed by the House and Senate. The combination of the bills, referred to as FOSTA-SETSA was signed intoFOSTA-SESTA for Internet Service Providers The Allow States and Victims to Fight Online Sex Trafficking Act (FOSTA) and the Stop Enabling Sex Traffickers Act of 2017 (SESTA) are two bills that were passed by the House and Senate. The combination of the bills, referred to as FOSTA-SETSA was signed into

report child pornography

Internet Server Provider Requirements to Report Child Pornography

Internet Server Provider Requirements to Report Child Pornography Internet service providers (ISPs) occupy a unique place in modern society. They provide internet access to millions of people across the United States, which allows instantaneous communication, exchange of ideas, and, unfortunately, a new haven for criminal activity. Because of their uniqueInternet Server Provider Requirements to Report Child Pornography Internet service providers (ISPs) occupy a unique place in modern society. They provide internet access to millions of people across the United States, which allows instantaneous communication, exchange of ideas, and, unfortunately, a new haven for criminal activity. Because of their unique

data privacy news

2018’s Biggest Data Privacy News Stories

2018’s Biggest Data Privacy News Stories As the year draws to a close, we wanted to take a moment to review the biggest data privacy news stories of 2018 and discuss what we can learn from them as we move into the new year. 1.   Europe’s GDPR Probably the biggest2018’s Biggest Data Privacy News Stories As the year draws to a close, we wanted to take a moment to review the biggest data privacy news stories of 2018 and discuss what we can learn from them as we move into the new year. 1.   Europe’s GDPR Probably the biggest

manage data breaches

How to Manage Data Breaches Under GDPR

How to Manage Data Breaches Under GDPR In recent weeks, we have posted about the requirements of personal data protection under Europe’s General Data Protection Regulation (GDPR) that companies must now follow. Today we will look into what a company must do in the event of a data breach underHow to Manage Data Breaches Under GDPR In recent weeks, we have posted about the requirements of personal data protection under Europe’s General Data Protection Regulation (GDPR) that companies must now follow. Today we will look into what a company must do in the event of a data breach under

gdpr processing personal data

When is it “Necessary” to Process Personal Data Under GDPR?

Last week I wrote about the EU’s new General Data Protection Regulation (GDPR) consumer-friendly approach to personal data collection and storage. This regulation, which went into effect earlier this year, requires that companies only collect, store, or process personal data when there is consent or when it is necessary. CompaniesLast week I wrote about the EU’s new General Data Protection Regulation (GDPR) consumer-friendly approach to personal data collection and storage. This regulation, which went into effect earlier this year, requires that companies only collect, store, or process personal data when there is consent or when it is necessary. Companies

personal data processing

Personal Data Processing Under the GDPR

In May 2018, the European Union’s General Data Protection Regulation (GDPR) went into effect. To read the regulation in its entirety, visit click here. The GDPR standardized personal data protection requirements across the 28 EU countries. Although the regulation is broad, advocates for GDPR applaud its consumer-friendly approach to personalIn May 2018, the European Union’s General Data Protection Regulation (GDPR) went into effect. To read the regulation in its entirety, visit click here. The GDPR standardized personal data protection requirements across the 28 EU countries. Although the regulation is broad, advocates for GDPR applaud its consumer-friendly approach to personal