<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Data Privacy and Protection Law</title><description></description><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><pubDate>Thu, 5 Sep 2024 21:12:41 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">4</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://data-privacy-and-protection-law.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:category text="Business"><itunes:category text="Business News"/></itunes:category><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>eSecurity Planet interviews Corporate Security Law's Miguel R. San Jose, Esq. CPP about PRISM</title><link>http://data-privacy-and-protection-law.blogspot.com/2013/07/esecurity-planet-interviews-corporate.html</link><author>noreply@blogger.com (Anonymous)</author><pubDate>Fri, 5 Jul 2013 11:05:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6863232733449845928.post-3068458592958198636</guid><description>See the article here: &amp;nbsp;&lt;a href="http://www.esecurityplanet.com/network-security/will-prism-impact-data-protection-strategies.html"&gt;http://www.esecurityplanet.com/network-security/will-prism-impact-data-protection-strategies.html&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Do Not Agree on "Do-Not-Track"</title><link>http://data-privacy-and-protection-law.blogspot.com/2013/05/do-not-agree-on-do-not-track.html</link><author>noreply@blogger.com (Anonymous)</author><pubDate>Wed, 8 May 2013 13:29:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6863232733449845928.post-3341545587834825651</guid><description>&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;With a showdown at the World Wide Web Consortium (WS3) going
on between the ad industry and privacy advocates, the world waits to see if a consensus
can be reached on a Do-Not-Track standard.&amp;nbsp;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Debate continues on whether its default state should be on
or off, or whether it should be a browser setting or a choice at installation
like Microsoft’s Internet Explorer.&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Privacy advocates like Jonathan Mayer, a graduate student
from Stanford University and member of the WS3’s tracking protection working
group, dismiss a document distributed by the Digital Advertising Alliance
called “&lt;i&gt;Draft Framework for DNT
Discussions Leading up to Face to Face”&lt;/i&gt; as a mere proposal.&amp;nbsp; Mayer believes that there should be a
universal choice built into browsers to which the user can create exceptions;
or a website can request (via pop-up) that a user make an exception to a
particular website.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Ad industry professionals argue the importance of
understanding consumer preferences online to facilitate free marketing of
products consumers show they are interested in based on the data collected.&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Privacy advocates rebut this by pointing out the success of
the Do Not Call List implemented several years ago, stating it shows how
consumers feel about their privacy.&amp;nbsp; It
should be noted, however, that even with Do Not Track turned on, information will
still be collected under certain exceptions.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>5 Quick Tips for Online Re-marketing</title><link>http://data-privacy-and-protection-law.blogspot.com/2013/05/5-quick-tips-for-online-re-marketing_3.html</link><author>noreply@blogger.com (Anonymous)</author><pubDate>Fri, 3 May 2013 12:27:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6863232733449845928.post-5197340354020321844</guid><description>&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;When online shoppers abandon their shopping carts before
completing their purchases, the information collected by the websites they were
visiting can be used to&amp;nbsp;re-market&amp;nbsp;the products they almost bought back to them.&amp;nbsp; This is called online&amp;nbsp;re-marketing.&amp;nbsp; Here are five tips online&amp;nbsp;re-marketers&amp;nbsp;should
know:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;First, make sure your website privacy policy contains the
required language covering data that has been captured for&amp;nbsp;re-marketing.&amp;nbsp; This should include sections on what
information is being collected and how that information will be used.&amp;nbsp; If you are collecting e-mail addresses, state that you are collecting e-mail addresses.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Second, instead of using a “catch-all” phrase like, “Information
collected shall be used for marketing and promotional purposes”, try to be more
specific in reference to&amp;nbsp;re-marketing.&amp;nbsp; Let
visitors know that you intend to follow up with abandoned shopping carts.&amp;nbsp; You can say, for example, that you wanted to
see if there was a problem using the website.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Third, make your privacy policy easily available and visible
in a spot next to where a choice will be made.&amp;nbsp;
The FTC has made it clear that website visitors need to be able to make
meaningful choices before they provide their personal information.&amp;nbsp; Note, however, it is not necessary to
specifically use the word “re-marketing”.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Fourth, make sure you comply with the CAN-SPAM Act if you
are&amp;nbsp;re-marketing&amp;nbsp;in the United States.&amp;nbsp;
Visit the FTC’s website for the &lt;a href="http://www.business.ftc.gov/documents/bus61-can-spam-act-compliance-guide-business"&gt;general guidelines&lt;/a&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;Finally, use an Opt-In box on the shopping cart if you are&amp;nbsp;re-marketing&amp;nbsp;in the European Union unless it is in France or the UK; there you can use an Opt-Out
box instead.&amp;nbsp; Note, however, in Germany, you
must send an email to the abandoner requiring a response to confirm their
Opt-In.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;For more information, contact &lt;a href="http://www.corporatesecuritylaw.com/"&gt;Corporate Security Law&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Welcome!</title><link>http://data-privacy-and-protection-law.blogspot.com/2013/04/welcome.html</link><author>noreply@blogger.com (Anonymous)</author><pubDate>Fri, 26 Apr 2013 02:37:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6863232733449845928.post-6476969462437990702</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: large;"&gt;&lt;b&gt;Corporate Security Law&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;i&gt;Advice Businesses Need&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/CbCUFSXhdfo?feature=player_embedded' frameborder='0'&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;If your business handles personal information in any way, you need a legal advisor who knows the privacy laws, regulations and guidelines to help keep your company safe. Call today for a consultation.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;Corporate Security Law is a federal privacy law practice serving clients around the country and around the world. We are licensed in New Jersey and are based in Charlotte, North Carolina.&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;i&gt;corporatesecuritylaw.com&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;i&gt;(704) 257-1087&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;i&gt;inquire@corporatesecuritylaw.com&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;i&gt;@CorpSecurityLaw&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif; font-size: x-small;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>