Jim Halpert

Jim Halpert

DLA Piper

Contact  |  View Bio  |  RSS

Latest Publications


Senate Passes Cybersecurity Information Sharing Act of 2015 – Next Steps as Bill Moves to Conference

The US Senate has passed the Cybersecurity Information Sharing Act of 2015 (CISA), S. 754, by a vote of 74-21, despite opposition from privacy and civil liberties groups and a handful of tech companies. CISA gives the...more

11/10/2015 - Cybersecurity Information Sharing Act (CISA) Pending Legislation

Data Protection, Privacy and Security Alert: Canada’s Anti-Spam Regulator Continues to Issue Advisories, Hunt for Infringers: Key...

This fall, more than a year after Canada’s anti-spam legislation (CASL) came into force, it is abundantly clear that the regulator, the Canadian Radio-television and Telecommunications Commission, is taking its new...more

9/22/2015 - Anti-Spam Legislation Canada CASL CRTC Email New Guidance Prior Express Consent Private Right of Action Strategic Enforcement Plan

State Breach Notification Laws – Updates From the 2015 Legislative Sessions, 6 Action Steps for Companies

This is proving to be a banner year for new breach notice requirements. In the period between 2006 and 2009, most US states enacted data breach notice laws. This year, we are seeing a wave of “second-generation” breach notice...more

7/21/2015 - Best Practices Breach Notification Rule Corporate Counsel Cybersecurity Data Protection Encryption New Legislation Pending Legislation Proposed Legislation Risk Management Security and Privacy Controls

Effective cybersecurity: 8 questions for you and your team

Cybersecurity has become a top-tier risk for US and multinational organizations. It is only a matter of time before a determined hacker will penetrate your organization’s system and successfully exfiltrate some data. (Indeed,...more

3/27/2015 - Acquisitions Bring Your Own Device Corporate Counsel Corporate Governance Cyber Attacks Cyber Insurance Cybersecurity Cybersecurity Framework Data Breach Internet of Things Mergers Multinationals NIST Popular Risk Assessment Supply Chain

Executive order "promoting private sector cybersecurity information sharing": top points

In conjunction with the recent White House Summit on Cybersecurity and Consumer Protection Summit, President Barack Obama has issued a much-anticipated cybersecurity information sharing Executive Order, "Promoting Private...more

3/1/2015 - Cybersecurity Executive Orders Information Sharing NCCIC Obama Administration

New student data privacy laws: top points for school contractors and K-12 education sites, apps and online services

According to the Data Quality Campaign, 36 states considered 110 student data privacy bills in 2014, and 20 states enacted 28 such bills into law. At least eight of these new laws may have significant implications for...more

1/20/2015 - Mobile Apps Online Education Public Schools School Districts Student Privacy Vendors

New student data privacy laws: top points for school contractors and K-12 education sites, apps and online services

According to the Data Quality Campaign, 36 states considered 110 student data privacy bills this year, and 20 states enacted 28 such bills into law. At least eight of these new laws may have significant implications for...more

1/7/2015 - Data Protection Minors Mobile Apps Online Education Popular Privacy Laws Public Schools School Districts SOPIPA Students Third-Party Service Provider Vendors

Sports, Media and Entertainment Intelligence - November 2014 (Global)

China: Guidelines for developing sports into a RMB 5 trillion-per-annum sector released - China's Cabinet, the State Council, has issued new guidelines which, amongst other things, aims to grow output of China’s...more

11/11/2014 - Broadcasting China EU FIFA Gambling Gaming Online Gaming Sports Gambling

Amendments to California’s security breach notification bill head to governor: key action points for businesses

In what has become almost an annual ritual, California is poised to tweak its security breach notice law. Last year, in language DLA Piper lawyers helped to draft on behalf of the State Privacy & Security Coalition, the...more

9/2/2014 - Breach Notification Rule Data Breach Data Protection

Intellectual Property and Technology News - Issue 22, Q2 2014

In This Issue: - Celebrity Endorsements on Social Media: 7 Tips For Navigating The Right Of Publicity - Landmark Privacy Ruling In Europe - US Congress May Act Again On Patent Reform - Supreme Court...more

7/1/2014 - ABC v Aereo Celebrity Endorsements CLS Bank v Alice Corp Highmark v. Allcare Legislative Agendas Limelight v Akamai Marketing Nautilus Inc. v. Biosig Instruments Octane Fitness v. ICON Patent Reform Patents Petrella v. MGM Popular Right of Publicity SCOTUS Search Engines Social Networks

Contractors affected by the US cybersecurity requirements: take part in the GWAC comment process

The US General Services Administration is seeking comments from the private sector on draft Alliant II Government Wide Acquisition Contract (GWAC) cybersecurity requirements (available here). The Alliant GWAC provides...more

4/22/2014 - Contractors Cybersecurity Federal Contractors GSA Public Comment Risk Management Subcontractors

Executive Branch acts on cybersecurity - what you need to know about this groundbreaking effort

Yesterday, the White House released the National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity, which is a key step in the implementation of Executive Order 13636 on...more

2/13/2014 - Compliance Critical Infrastructure Sectors Cybersecurity Cybersecurity Framework Data Protection Executive Orders NIST

Report deems NSA telephone records program illegal

The Privacy and Civil Liberties Oversight Board issued a report today concluding that the National Security Agency’s bulk collection of telephone call records is illegal and should be ended. ...more

1/24/2014 - FISA NSA PRISM Program Surveillance

Is Your Safe Harbor Certification Really Safe?

The Federal Trade Commission has announced 12 proposed settlements with companies accused of falsely claiming that they complied with the US-EU Safe Harbor Framework....more

1/24/2014 - FTC Safe Harbors

President Obama announces surveillance reforms: key points for businesses

In a speech that garnered worldwide attention, President Barack Obama has announced important reforms in the ways the US government will gather, store, use and retain signals-related information. These changes will quickly...more

1/23/2014 - Barack Obama NSA PRISM Surveillance

New PRC Consumer Rights Law fills legal void governing data privacy protections – get ready for 3/15/2014 effective date

The newly revised Consumer Rights and Interests Protection Law of the People’s Republic of China (the Consumer Rights Law, promulgated on October 25, 2013 and becoming effective March 15,2014) is the first revision of China’s...more

12/18/2013 - China Consent Data Protection Notice Requirements Personally Identifiable Information Retailers

EU-US Safe Harbor Continues to be Questioned by EU Leaders

Discussions at the European Parliament level continue to call into question the validity of the EU Safe Harbor Program in the wake of the NSA scandal. Amidst continuing discussions over Safe Harbor, it is possible that the...more

11/12/2013 - EU NSA Safe Harbors

The Cybersecurity Framework: Administration, Congress move to incentivize private-sector cooperation, strengthen federal...

The White House has announced its eight preliminary incentives to encourage private sector owners and operators of critical infrastructure (CI) to adopt the final Cybersecurity Framework, now under development by the...more

9/13/2013 - Acquisitions Critical Infrastructure Sectors Cybersecurity Cybersecurity Framework Executive Orders NIST

Technology & Sourcing News - August 2013

Is gambling law about to liberalise in the Czech Republic? - Foreign entrepreneurs may benefit from the Czech Government's approval of new gambling regulations needed to comply with EU requirements. Data Centre Risk...more

8/30/2013 - Charitable Organizations China Cybersecurity Databases EU Gambling Gaming Mobile Devices NGOs Risk Management Warrantless Tracking

Attack of the Killer Initiative?: Opt-in Privacy Regime on Deck for a California Ballot Initiative

On July 17th, former California State Senator Steve Peace (director of the film, “Attack of the Killer Tomatoes”) and trial lawyer Michael Thorsnes filed a potentially revolutionary draft ballot initiative with the California...more

7/25/2013 - Ballot Measures CAN-SPAM Act FTC Internet Mobile Devices Opt-In Privacy Laws Privacy Policy Proposed Legislation

WellPoint agrees to pay $1.7M in HIPAA penalties: what this tells you

The Department of Health and Human Services (HHS) Office for Civil Rights (OCR) has announced that WellPoint, Inc. agreed to pay $1.7 million to settle potential violations of the Health Insurance Portability and...more

7/16/2013 - Health Insurance HHS HIPAA Insurance Industry OCR Penalties Settlement WellPoint

Congress, The Administration Move Forward To Secure Critical US Infrastructure

Cyber-attacks by both private actors and nation states against US critical infrastructure and individual communications users are on the rise. In Washington, DC, policy makers are increasing their focus on cyber threats on...more

7/12/2013 - Barack Obama Critical Infrastructure Sectors Cyber Attacks Cybersecurity Data Protection Executive Orders

Tales from the (En)crypt(ed): What Happens to Your Online Account Information When You Die?

Have you ever wondered what happens to your online account information when you die? Well, in a few days, the Uniform Law Commission (ULC) will be considering this very issue – fiduciary access to digital assets – at its...more

7/10/2013 - Email Estate Planning Facebook Internet Social Media Social Media Account Ownership Uniform Law Commission

Data Protection Laws of the World Handbook: Second Edition

The handbook offers a quick overview of those aspects of data protection law that have the most practical significance to businesses, including: - International data transfer restrictions - Security...more

6/10/2013 - Breach Notification Rule Cybersecurity Data Breach Data Collection Data Protection International Data Transfers Personally Identifiable Information Predictive Coding

Rights in Data Handbook: Protecting and exploiting IP in data and databases internationally

INTRODUCTION - The value of data and databases to business is undeniable and continues to increase. As a result the laws which enable data to be protected and exploited are crucial to many industries, from horseracing to...more

1/7/2013 - Data Protection Databases EU Intellectual Property Litigation Privacy Laws

25 Results
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.