Navigating “Pen Register” Law in the Digital Age:  Court Rules the Law Applies to Website Tracking Technologies

Written by Albina Gasanbekova and Lucy Holmes Plovnick, AIGP, CIPP/US On February 20, 2025, the United States District Court for the Southern District of New York recognized that online tracking technologies that collect IP addresses may fall under California’s “Pen Register” law, known as Section 638.51 of the California Invasion of Privacy Act (“CIPA”), which prohibits the use of physical recording devices for telephone communications without … Continue reading Navigating “Pen Register” Law in the Digital Age:  Court Rules the Law Applies to Website Tracking Technologies

New Adequacy Decision for the EU-US Data Privacy Framework

Written by Susan Kohn Ross, Stacey Chuvaieva, and Lucy Holmes Plovnick Yesterday, July 10, 2023, the European Commission adopted a new adequacy decision entitled the EU-US Data Privacy Framework. It provides a new mechanism designed to permit the transfer of personal data from the European Union to the United States (“Framework”) in a manner that adequately protects the privacy rights of those individuals whose personally identifiable … Continue reading New Adequacy Decision for the EU-US Data Privacy Framework

More States Enact Privacy Laws

Written by Susan Kohn Ross, Lucy Plovnick, Stacey Chuvaieva and Albina Gasanbekova Iowa and Indiana now become the sixth and the seventh states, respectively, to provide comprehensive privacy protection to those living in those states, following the lead of California, Virginia, Connecticut, Colorado, and Utah (in that order). Those who do business in Iowa or have Iowa consumers as customers/users have until January 1, 2025 … Continue reading More States Enact Privacy Laws

Is Your Computer System Safe from Internal Misuse?

Written by Susan Kohn Ross and Stephen C. Franz On June 3, 2021, the U.S. Supreme Court issued its decision in Van Buren v. U.S., No. 19-783. The issue for the Court was relatively straight forward – did a police officer with authorized access to his department’s license-plate database exceed his authorized access when he was given money to run a license plate and shared the results … Continue reading Is Your Computer System Safe from Internal Misuse?