{"id":653,"date":"2019-04-19T14:48:44","date_gmt":"2019-04-19T18:48:44","guid":{"rendered":"http:\/\/blogs.duanemorris.com\/techlaw\/?p=653"},"modified":"2019-04-19T14:49:36","modified_gmt":"2019-04-19T18:49:36","slug":"what-is-personal-information-in-legal-terms-it-depends","status":"publish","type":"post","link":"https:\/\/blogs.duanemorris.com\/techlaw\/2019\/04\/19\/what-is-personal-information-in-legal-terms-it-depends\/","title":{"rendered":"What Is Personal Information? In Legal Terms, It Depends"},"content":{"rendered":"<p>In early March, cybersecurity professionals around the world filled the San Francisco Moscone Convention Center\u2019s sprawling exhibition halls to discuss and learn about everything infosec, from public key encryption to incident response, and from\u00a0<a href=\"https:\/\/threatpost.com\/machine-learning-dark-side\/142616\/\" target=\"_blank\" rel=\"noopener noreferrer\">machine learning<\/a>\u00a0to\u00a0<a href=\"https:\/\/threatpost.com\/rsac-2019-for-domestic-abuse-iot-devices-pose-new-threat\/142332\/\" target=\"_blank\" rel=\"noopener noreferrer\">domestic abuse<\/a>.<\/p>\n<p>[&#8230;]<\/p>\n<p>Companies should not overthink [data privacy and personal information]. Instead, data privacy lawyers said businesses should pay attention to what information they collect and where they operate to best understand personal data protection and compliance.<\/p>\n<p>As Duane Morris LLP intellectual property and cyber law partner <a href=\"https:\/\/www.duanemorris.com\/attorneys\/michellehondonovan.html\">Michelle Donovan<\/a> said:<\/p>\n<p>\u201cWhat it comes down to, is, it doesn\u2019t matter what the rules are in China if you\u2019re not doing business in China. Companies need to figure out what jurisdictions apply, what information are they collecting, where do their data subjects reside, and based on that, figure out what law applies.\u201d<\/p>\n<p>To read the full text of this article, please visit <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/04\/what-is-personal-information-in-legal-terms-it-depends\/\" target=\"_blank\" rel=\"noopener noreferrer\">the <em>MalwareBytes<\/em> website<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In early March, cybersecurity professionals around the world filled the San Francisco Moscone Convention Center\u2019s sprawling exhibition halls to discuss and learn about everything infosec, from public key encryption to incident response, and from\u00a0machine learning\u00a0to\u00a0domestic abuse. [&#8230;] Companies should not overthink [data privacy and personal information]. Instead, data privacy lawyers said businesses should pay attention &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blogs.duanemorris.com\/techlaw\/2019\/04\/19\/what-is-personal-information-in-legal-terms-it-depends\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;What Is Personal Information? In Legal Terms, It Depends&#8221;<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[651,757,823,664],"ppma_author":[878],"class_list":["post-653","post","type-post","status-publish","format-standard","hentry","category-infotechtelecom","tag-data-privacy","tag-gdpr","tag-michelle-hon-donovan","tag-personal-information"],"authors":[{"term_id":878,"user_id":6,"is_guest":0,"slug":"duanemorris3","display_name":"Duane Morris","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/843ff6e7a8fe5fc92109b47a45f34b6cf0ea499e6e788db23456c838b0ae6747?s=96&d=blank&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/posts\/653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/comments?post=653"}],"version-history":[{"count":0,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/posts\/653\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/media?parent=653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/categories?post=653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/tags?post=653"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.duanemorris.com\/techlaw\/wp-json\/wp\/v2\/ppma_author?post=653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}