Large companies holding sensitive data – including financial services, telecommunications, business process outsourcing, hospitality, and cryptocurrency firms – as well as their IT helpdesks, are increasingly being targeted...more
11/28/2023
/ Cyber Attacks ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Breach ,
Data Collection ,
FBI ,
NIST ,
Popular ,
Publicly-Traded Companies ,
Ransomware ,
Reporting Requirements ,
Securities and Exchange Commission (SEC) ,
Sensitive Business Information
On July 7, 2022, three federal agencies – the Federal Bureau of Investigation, the Cybersecurity and Infrastructure Security Agency, and the Department of the Treasury – issued a joint alert regarding Maui Ransomware, which...more
7/27/2022
/ Cyber Attacks ,
Cybersecurity ,
Data Security ,
FBI ,
Healthcare ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
North Korea ,
Popular ,
Ransomware ,
Sanctions ,
U.S. Treasury
Editors’ Note: This is the second in our fifth-annual end-of-year series examining important trends in data privacy and cybersecurity in the coming year. Read our previous post on Energy.
Though the final results of the...more
12/30/2020
/ California Consumer Privacy Act (CCPA) ,
Cannabis Products ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
EU ,
General Data Protection Regulation (GDPR) ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Legalization ,
Medical Marijuana ,
State and Local Government
Editors’ Note: This is the fourth in our fourth-annual end-of-year series examining important trends in data privacy and cybersecurity in the coming year. Our previous entry discussed the CCPA, energy, and Brexit. Up next:...more
12/19/2019
/ California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Subjects Rights ,
Department of Health and Human Services (HHS) ,
EU ,
General Data Protection Regulation (GDPR) ,
Health Care Providers ,
Health Information Technologies ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Legislative Agendas ,
Member State ,
OCR ,
Patient Privacy Rights ,
Personally Identifiable Information ,
PHI ,
Popular ,
Privacy Laws ,
Regulatory Agenda
On October 1, 2019, China’s new regulation to protect personal data related to children – called the “Measures on Online Protection of Children’s Personal Data” – went into effect.
As we wrote in June, when a draft of the...more
10/3/2019
/ China ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
Internet Service Providers (ISPs) ,
New Regulations ,
Online Platforms ,
Online Safety for Children ,
Parental Consent ,
Personal Data ,
Personally Identifiable Information
In early June, the Cyberspace Administration of China released for public comment new draft regulations applicable to the collection of personal information relating to children under 14 by online service providers.
The...more
6/7/2019
/ China ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Use Policies ,
Encryption ,
Internet Service Providers (ISPs) ,
Online Safety for Children ,
Parental Consent ,
Personal Data ,
Personally Identifiable Information ,
Proposed Regulation ,
Security Risk Assessments
In 2018, privacy and data security crossed a number of thresholds. In the public mind, through high-profile data breaches and revelations about unexpected uses of personal information, questions of privacy became much more...more
4/26/2019
/ Attorney General ,
California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
COPPA ,
Cryptocurrency ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Energy Sector ,
Enforcement Actions ,
FCC ,
FERC ,
General Data Protection Regulation (GDPR) ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HIPAA Privacy Rule ,
Political Advertising ,
Popular ,
Privacy Concerns ,
Securities and Exchange Commission (SEC)
"Open the pod door, HAL"
• Commercial voice-activated intelligent personal assistants from Amazon, Apple, Google, and Microsoft, among others, are growing in popularity.
• A report from NPR and Edison Research states...more
2/28/2019
/ Confidential Communications ,
Connected Items ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
Electronic Medical Records ,
Electronic Protected Health Information (ePHI) ,
Health Care Providers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Hospitals ,
Mobile Apps ,
Oral Communications ,
Patient Privacy Rights ,
Personal Assistants ,
Physicians ,
Privacy Concerns ,
Security Rule ,
Smart Devices ,
Technology Sector ,
Telecommunications
Like many things in Washington, the HIPAA landscape in 2018 will be shaped by the shifting priorities of President Trump’s new administration. Early signs point to less funding for the Office of Civil Rights (“OCR”) within...more
Introduction -
Cybersecurity was a prominent factor in 2016 in all aspects of government, business and personal affairs. Russian and other foreign national hacking has the potential to spark a new form of cold...more
2/16/2017
/ Cloud Computing ,
Cloud Service Providers (CSPs) ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Cybertheft ,
Energy Sector ,
Federal Trade Commission (FTC) ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Information Sharing ,
Internet of Things ,
Popular ,
Ransomware ,
Trade Secrets
Editor’s Note: This is the third in a continuing end-of-year series.
The year ahead promises to be a busy one for those with responsibility for HIPAA compliance, as the Office of Civil Rights (OCR), charged with...more
On July 6, 2016, the European Union adopted Directive (EU) 2016/1148, “concerning measures for a high common level of security of network and information systems across the Union,” otherwise known as the Network and...more
In Case You Missed It -
The FTC settled with mobile advertising company InMobi for $950,000 in civil penalties, along with the implementation of a privacy program, based on the FTC’s charges that InMobi impermissibly...more
In an era of ever-evolving ‘wired’ technology, increasing interconnectedness, and business and personal concerns about data security, we recently asked attorneys writing on JD Supra: What will be among the defining issues of...more
Over one year ago, our colleague Chris Hart argued that the District of New Jersey court’s decision in FTC v. Wyndham Worldwide Corp. et. al., No. 13-1887-ES, “point[ed] to the possibility that the FTC has potentially broad...more
8/28/2015
/ Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Due Process ,
Enforcement Actions ,
Federal Trade Commission (FTC) ,
FTC Act ,
FTC v Wyndham ,
Hackers ,
Personally Identifiable Information ,
Unfair or Deceptive Trade Practices ,
Wyndham
The first ever Summit on Cybersecurity and Consumer Protection was convened today at Stanford University, keynoted by President Obama. The purpose of the summit: to “bring[] together major stakeholders on consumer financial...more
2/16/2015
/ American Express ,
Apple ,
Bank of America ,
Banking Sector ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data-Sharing ,
NCCIC ,
Popular ,
Right to Privacy