14 Matching Annotations
  1. Mar 2024
    1. Does submitting a request mean my data will get deleted?Nope. Deletion requests are subject to some broad exemptions. Some companies — like financial services — have to hold on to certain data for legal compliance and reporting. The CCPA also allows companies to keep your data if they’re using it for security, debugging or fraud protection, or “to enable solely internal uses that are reasonably aligned with the expectations of the consumer based on the consumer’s relationship with the business.”
  2. Dec 2021
    1. Generally speaking, there are two main ways in which exceptions and limitations are written into copyright law. The first is by listing specific activities that are excluded from the reach of copyright. For example, Japanese copyright law has a specific exemption allowing classroom broadcasts of copyrighted material. This approach, which is more commonly found in civil law countries, has the benefit of providing clarity about precisely what uses by the public are allowed and not considered infringing. However, it can also be limiting because anything not specifically on the list of exceptions may be deemed restricted by copyright. The other approach is to include more flexible guidelines about what is allowed. Courts then determine exactly what uses are allowed without the permission of the copyright holder. While this enables the law to adapt to new technologies and situations, the downside to flexible guidelines is that they leave more room for uncertainty.
  3. Jul 2020
    1. Lastly, in order for a statement to be defamatory, it must be unprivileged. You cannot sue for defamation in certain instances when a statement is considered privileged. For example, when a witness testifies at trial and makes a statement that is both false and injurious, the witness will be immune to a lawsuit for defamation because the act of testifying at trial is privileged.
  4. Jun 2020
    1. there’s a bill tiptoeing through the U.S. Congress that could inflict the backdoor virus that law enforcement agencies have been trying to inflict on encryption for years... The choice for tech companies comes down to weakening their own encryption and endangering the privacy and security of all their users, or foregoing protections and potentially facing liability in a wave of lawsuits.
  5. May 2020
    1. users must also be informed of the breach (within the same time frame) unless the data breached was protected by encryption (data rendered unreadable for the intruder), or, in general, the breach is unlikely to result in a risk to individuals’ rights and freedoms.
    2. they are processed by a natural person in the course of a purely personal or household activity. Practically speaking, the only relevant exception is the latter: for instance, if you collect your friends’ personal data for your own personal phone-book you’re not bound to the GDPR.
    1. Explicit Form (where the purpose of the sign-up mechanism is unequivocal). So for example, in a scenario where your site has a pop-up window that invites users to sign up to your newsletter using a clear phrase such as: “Subscribe to our newsletter for access to discount vouchers and product updates!“, the affirmative action that the user performs by typing in their email address would be considered valid consent.
    2. These exemptions include emails in which the primary purpose is: Transactional: These are emails relating to already-agreed-upon transactions, or emails that deliver goods or services as a part of a transaction that the user already agreed to (e.g. License key or E-book delivery).Relationship: These are emails that update users (that already have a relationship with your service) about changes in product / service terms, features or account information; this also includes warranty, recall, safety, or security information about a product or service.Other (Non-commercial) emails.
    3. Soft opt-in (where the recipient provided their email address while purchasing a product or service). If the email address was collected as part of a previous sales process on your site, then you may use the details collected to send promotional emails related to similar products and services
    1. The banner is not necessarily required in this specific instance if the cookie policy is easily accessible and visible from every page of the site.
    1. Implementing prior blocking and asynchronous re-activation Our prior blocking option prevents the installation of non-exempt cookies before user consent is obtained (as required by EU law) and asynchronously activates (without reloading the page) the scripts after the user consents.To use, you must first enable this feature: simply select the “Prior blocking and asynchronous re-activation” checkbox above before copy and pasting the code snippet into the HEAD as mentioned in the preceding paragraph.
  6. Mar 2020
    1. If other third-party tools guarantee not to use cookies, perhaps by providing specific configuration options, they too can be considered to be exempt from prior blocking. This is the case namely with YouTube, which provides a specific feature to prevent the user from being tracked through cookies.
    2. This depends on the legal jurisdiction applicable to your site. In Europe, you’re legally required to block cookie scripts until user consent is obtained. All cookies must be blocked except for those that are exempt.