Jim Halpert

Jim Halpert

DLA Piper

Contact  |  View Bio  |  RSS

Latest Publications

Share:

Amendments to California’s security breach notification bill head to governor: key action points for businesses

In what has become almost an annual ritual, California is poised to tweak its security breach notice law. Last year, in language DLA Piper lawyers helped to draft on behalf of the State Privacy & Security Coalition, the...more

9/2/2014 - Breach Notification Rule Data Breach Data Protection

Intellectual Property and Technology News - Issue 22, Q2 2014

In This Issue: - Celebrity Endorsements on Social Media: 7 Tips For Navigating The Right Of Publicity - Landmark Privacy Ruling In Europe - US Congress May Act Again On Patent Reform - Supreme Court...more

7/1/2014 - ABC v Aereo Celebrity Endorsements CLS Bank v Alice Corp Highmark v. Allcare Legislative Agendas Limelight v Akamai Marketing Nautilus Inc. v. Biosig Instruments Octane Fitness v. ICON Patent Reform Patents Petrella v. MGM Popular Right of Publicity SCOTUS Search Engines Social Networks

Contractors affected by the US cybersecurity requirements: take part in the GWAC comment process

The US General Services Administration is seeking comments from the private sector on draft Alliant II Government Wide Acquisition Contract (GWAC) cybersecurity requirements (available here). The Alliant GWAC provides...more

4/22/2014 - Contractors Cybersecurity Federal Contractors GSA Public Comment Risk Management Subcontractors

Executive Branch acts on cybersecurity - what you need to know about this groundbreaking effort

Yesterday, the White House released the National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity, which is a key step in the implementation of Executive Order 13636 on...more

2/13/2014 - Compliance Critical Infrastructure Sectors Cybersecurity Cybersecurity Framework Data Protection Executive Orders NIST

Report deems NSA telephone records program illegal

The Privacy and Civil Liberties Oversight Board issued a report today concluding that the National Security Agency’s bulk collection of telephone call records is illegal and should be ended. ...more

1/24/2014 - FISA NSA PRISM Program Surveillance

Is Your Safe Harbor Certification Really Safe?

The Federal Trade Commission has announced 12 proposed settlements with companies accused of falsely claiming that they complied with the US-EU Safe Harbor Framework....more

1/24/2014 - FTC Safe Harbors

President Obama announces surveillance reforms: key points for businesses

In a speech that garnered worldwide attention, President Barack Obama has announced important reforms in the ways the US government will gather, store, use and retain signals-related information. These changes will quickly...more

1/23/2014 - Barack Obama NSA PRISM Surveillance

New PRC Consumer Rights Law fills legal void governing data privacy protections – get ready for 3/15/2014 effective date

The newly revised Consumer Rights and Interests Protection Law of the People’s Republic of China (the Consumer Rights Law, promulgated on October 25, 2013 and becoming effective March 15,2014) is the first revision of China’s...more

12/18/2013 - China Consent Data Protection Notice Requirements Personally Identifiable Information Retailers

EU-US Safe Harbor Continues to be Questioned by EU Leaders

Discussions at the European Parliament level continue to call into question the validity of the EU Safe Harbor Program in the wake of the NSA scandal. Amidst continuing discussions over Safe Harbor, it is possible that the...more

11/12/2013 - EU NSA Safe Harbors

The Cybersecurity Framework: Administration, Congress move to incentivize private-sector cooperation, strengthen federal...

The White House has announced its eight preliminary incentives to encourage private sector owners and operators of critical infrastructure (CI) to adopt the final Cybersecurity Framework, now under development by the...more

9/13/2013 - Acquisitions Critical Infrastructure Sectors Cybersecurity Cybersecurity Framework Executive Orders NIST

Technology & Sourcing News - August 2013

Is gambling law about to liberalise in the Czech Republic? - Foreign entrepreneurs may benefit from the Czech Government's approval of new gambling regulations needed to comply with EU requirements. Data Centre Risk...more

8/30/2013 - Charitable Organizations China Cybersecurity Databases EU Gambling Gaming Mobile Devices NGOs Risk Management Warrantless Tracking

Attack of the Killer Initiative?: Opt-in Privacy Regime on Deck for a California Ballot Initiative

On July 17th, former California State Senator Steve Peace (director of the film, “Attack of the Killer Tomatoes”) and trial lawyer Michael Thorsnes filed a potentially revolutionary draft ballot initiative with the California...more

7/25/2013 - Ballot Measures CAN-SPAM Act FTC Internet Mobile Devices Opt-In Privacy Laws Privacy Policy Proposed Legislation

WellPoint agrees to pay $1.7M in HIPAA penalties: what this tells you

The Department of Health and Human Services (HHS) Office for Civil Rights (OCR) has announced that WellPoint, Inc. agreed to pay $1.7 million to settle potential violations of the Health Insurance Portability and...more

7/16/2013 - Health Insurance HHS HIPAA Insurers OCR Penalties Settlement WellPoint

Congress, The Administration Move Forward To Secure Critical US Infrastructure

Cyber-attacks by both private actors and nation states against US critical infrastructure and individual communications users are on the rise. In Washington, DC, policy makers are increasing their focus on cyber threats on...more

7/12/2013 - Barack Obama Critical Infrastructure Sectors Cyber Attacks Cybersecurity Data Protection Executive Orders

Tales from the (En)crypt(ed): What Happens to Your Online Account Information When You Die?

Have you ever wondered what happens to your online account information when you die? Well, in a few days, the Uniform Law Commission (ULC) will be considering this very issue – fiduciary access to digital assets – at its...more

7/10/2013 - Email Estate Planning Facebook Internet Social Media Social Media Account Ownership Uniform Law Commission

Data Protection Laws of the World Handbook: Second Edition

The handbook offers a quick overview of those aspects of data protection law that have the most practical significance to businesses, including: - International data transfer restrictions - Security...more

6/10/2013 - Breach Notification Rule Cybersecurity Data Breach Data Collection Data Protection International Data Transfers Personally Identifiable Information Predictive Coding

Rights in Data Handbook: Protecting and exploiting IP in data and databases internationally

INTRODUCTION - The value of data and databases to business is undeniable and continues to increase. As a result the laws which enable data to be protected and exploited are crucial to many industries, from horseracing to...more

1/7/2013 - Data Protection Databases EU Intellectual Property Litigation Privacy Laws

17 Results
|
View per page
Page: of 1