Cynthia Larose

Cynthia Larose

Mintz Levin

Contact  |  View Bio  |  RSS

Latest Posts › Data Security

Share:

March Fadness: Wearable Tech in the Workplace

Wearable technology continues to do a full court press on the marketplace and in the process, the step counters of the world and health apps tied to devices capable of tracking real-time biostatistics, are revolutionizing the...more

3/28/2017 - Data Collection Data Security Electronic Protected Health Information (ePHI) Employment Policies Hackers HIPAA Privacy Concerns State Data Breach Notification Statutes Wearable Technology Wellness Programs

Avoiding Employee Data Breaches Has Nothing to Do With Luck .....

You may have already had your bracket busted by now…..but you should have Mintz Levin’s Third Annual Employment Law Summit on your schedule and the panel on Cybersecurity and Employee Data Breaches may help you avoid a...more

3/20/2017 - Chief Technology Officer (CTO) Cybersecurity Data Security Employee Privacy Rights Human Resources Professionals

The February 2017 Update – The Mintz Matrix

During 2016, amendments to breach notification laws in five states went into effect (California, Nebraska, Oregon, Rhode Island and Tennessee). And by the end of last year, well over twenty states had introduced or were...more

2/17/2017 - Breach Notification Rule Data Breach Data Security Encryption Notification Requirements Personal Data Personal Information Protection Act Safe Harbors Security Breach State Data Breach Notification Statutes

The Cyber President? What To Expect From the Trump Administration On Cybersecurity And Privacy

Even president-elect Donald Trump has been the victim of a data breach. Several times actually. The payment card system for his Trump Hotel Collection was infected by malware in May 2014 and 70,000 credit card numbers were...more

11/17/2016 - Cybersecurity Cybersecurity Information Sharing Act (CISA) Data Security EU Data Protection Laws EU-US Privacy Shield Internet of Things Presidential Elections Trump Administration US-EU Safe Harbor Framework

California AG Guidance for the Ed Tech Industry: 6 Recommendations to Protect Student Data Privacy

Developers and operators of educational technology services should take note. Just before the election, California Attorney General Kamala Harris provided a document laying out guidance for those providing education...more

11/16/2016 - Data Collection Data Privacy Data Security Data Use Policies Privacy Policy Safeguards Rule Students Transparency

3 Guidelines to Maximize Value of Data

Imagine you are the CEO of company sitting across from an interviewer. The interviewer asks you the age old question, “So tell me about your company’s strengths and weaknesses?” You start thinking about your competitive...more

10/24/2016 - Cybersecurity Data Breach Data Collection Data Protection Data Security

Three Steps to the Right Cloud for Your Business

The term “cloud computing,” — a process by which remote computers are used to store, manage and process data — is no longer an unfamiliar term. According to at least one estimate, “approximately 90 percent of businesses...more

10/4/2016 - Cloud Computing Cloud Storage Data Privacy Data Security Personal Data

TechConnect - Your Law Firm Link to Industry News - September 2016

Letter from the Editors - Dear Readers, The world of raising capital for emerging companies has experienced a revolution. Prior to the enactment of the JOBS Act in 2012, raising capital for private companies was...more

9/29/2016 - Capital Raising Crowdfunding Crowdsourcing Data Breach Data Security Dwolla E-2 Entrepreneurs FinTech Good Faith H-1B Innovation IPO JOBS Act Parole Privacy Laws Private Placements Public Offerings Rule 506 Visas

Summer Round-Up: Four States Bolster Data Breach Notification Laws and More Changes on the Way

As has become typical in the data security space, there was quite a bit of activity in state legislatures over the previous year concerning data breach notification statutes. Lawmakers are keenly aware of the high profile...more

9/6/2016 - Attorney Generals Breach Notification Rule Data Breach Data Security Encryption Personally Identifiable Information Safe Harbors Security Breach State Data Breach Notification Statutes State Legislatures

FTC Plants A Flag With LabMD Ruling: What This Means for Enforcement

On Friday, the heads of the Federal Trade Commission overruled the decision of the Administrative Law Judge (“ALJ”) in In the Matter of LabMd., Inc. The FTC concluded that the ALJ had erred in dismissing the Commission’s case...more

8/1/2016 - Actual Injuries ALJ Corporate Counsel Data Security Enforcement Actions FTC FTC Act LabMD Risk Assessment Section 5 Unfair or Deceptive Trade Practices

EU-US Privacy Shield to Launch August 1, Replacing Safe Harbor

I. Introduction: Privacy Shield to Go Live August 1 (at Last) - The replacement for Safe Harbor is finally in effect, over nine months after Safe Harbor was struck down by the Court of Justice of the EU in the Schrems...more

7/25/2016 - Consent Data Protection Authority Data Security EU EU-US Privacy Shield European Commission European Court of Justice (ECJ) FTC International Data Transfers Notice Requirements Personal Data Surveillance U.S. Commerce Department US-EU Safe Harbor Framework

Pokémon Go in the Workplace: Oh Look There’s a Pikachu!

Did you know that the world is now inhabited by creatures called Pokémon? (Or maybe they’ve always been there?) Some run across the plains; others fly through the skies; and some live in the mountains….and some, yes, some,...more

7/21/2016 - Data Security Distracted Driving Employee Engagement Employee Handbooks Games Innovation Technology Video Games Workplace Communication Workplace Safety

FinTech Companies Face Big Privacy Challenges in 2016

According to the FBI, “there are only two types of companies: those that have been hacked and those that will be.” It does not take an actual data breach, however, for a company to be liable for its data security practices. ...more

7/20/2016 - CFPB Cybersecurity Data Breach Data Collection Data Privacy Data Security Dwolla FinTech FTC v Wyndham Hackers Personal Data Privacy Laws

Colorado Student Data Privacy Bill – What EdTech software providers need to know

Colorado is the latest state to revisit, and expand upon, its laws pertaining to the use and protection of student data. Colorado Governor John Hickenlooper recently signed into law House Bill 16-1423 (the “Bill”) designed to...more

6/28/2016 - Cybersecurity Data Collection Data Protection Data Security Educational Institutions Personally Identifiable Information Public Schools Software Student Privacy

OCR Warns of HIPAA Risks in Third-Party Apps

The U.S. Department of Health and Human Services Office for Civil Rights (OCR) recently issued a warning regarding vulnerabilities in third-party applications used by entities covered by HIPAA. The OCR warning applies...more

6/22/2016 - Business Associates Covered Entities Data Protection Data Security Health Information Technologies HIPAA Mobile Health Apps OCR Risk Management Third-Party

PCI DSS 3.2: It’s here, what does it mean for you?

The Payment Card Industry Security Standards Council (PCI SSC) has released a new version of its data security standard for the protection of cardholder data, the Payment Card Industry Data Security Standard (PCI DSS). PCI...more

5/9/2016 - Cyber Attacks Cybersecurity Data Security Debit and Credit Card Transactions Fraudulent Charges PCI-DSS Standard SSL

State Data Security Breach Notification Laws - April 2016

The general definition of “personal information” used in the majority of statutes is: An individual’s first name or first initial and last name plus one or more of the following data elements: (i) Social Security number, (ii)...more

4/4/2016 - Breach Notification Rule Corporate Counsel Cybersecurity Data Breach Data Security Personally Identifiable Information Popular Young Lawyers

The Problem With Data Security is not the Hardware or the Software, It’s the Wetware

Remember this? - “Wetware” – coder slang for biological life forms (i.e., people) – is the weak link in most companies’ data security protections, according to a new data security report issued by the Association of...more

1/13/2016 - Cybersecurity Data Breach Data Security Employee Training Popular

Wyndham and FTC Settle Case Over “Unfair” Data Security Practices

The years-long saga of the Federal Trade Commission’s suit against Wyndham Hotels over data breaches that occurred at least as early as April 2008 is finally coming to an end with a proposed settlement filed today with the...more

12/11/2015 - Data Breach Data Security FTC FTC v Wyndham Settlement Unfair or Deceptive Trade Practices Wyndham

Data Breach Planning in 10 Easy Steps: How to Think Like A Litigator

For the first Tuesday in November, we have 10 easy steps to make sure that your data breach incident response planning is viewed from that pesky point of view of a litigator....more

11/3/2015 - Cyber Incident Reporting Cybersecurity Data Breach Data Breach Plans Data Privacy Data Protection Data Security Email Policies Personally Identifiable Information Popular Tone At The Top Training

More Dominos Fall on the Data Protection Table

As all of our readers know by now, as of October 6, the US-EU Safe Harbor Framework is no more. Safe Harbor was the mechanism on which thousands of US companies (and thousands of companies based in the European Union)...more

10/22/2015 - Data Privacy Data Protection Data Protection Authority Data Security EU EU Data Protection Laws European Court of Justice (ECJ) International Data Transfers Israel Model Contracts Personal Data SCC Schrems v Data Protection Commissioner Switzerland US-EU Safe Harbor Framework

EU Data Protection Authorities Issue Joint Statement on Invalidation of Safe Harbor: Not Much Help Here

The so-called “Article 29 Working Party” of EU Data protection officials from the 28 EU member states today released a much-anticipated press release regarding the Court of Justice of the European Union (CJEU) landmark...more

10/19/2015 - Article 29 Working Group Binding Corporate Rules Data Privacy Data Protection Authority Data Security Enforcement Actions EU EU Data Protection Laws European Commission European Court of Justice (ECJ) International Data Transfers Model Contracts Personal Data SCC US-EU Safe Harbor Framework

Privacy Monday, September 28, 2015: More on US-EU Safe Harbor — what’s next?

We will be following up our post last week regarding the latest US-EU Safe Harbor decision out of Europe with further analysis both from the Mintz Privacy team and our international network of privacy specialists. Our...more

9/28/2015 - Advocate General Consent Data Privacy Data Protection Authority Data Security Edward Snowden EU EU Data Protection Laws European Court of Justice (ECJ) Facebook FTC International Data Transfers U.S. Commerce Department US-EU Safe Harbor Framework

27 Results
|
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×