Snell & Wilmer attorneys recently defended Phenix Transportation West and its driver Ray Jackson in a trucking accident case. The trial lasted eight days and was tried in Maricopa County Superior Court. Kelly Wilkins tried...more
The Arizona Supreme Court recently held that a defendant that used asbestos materials in its workplace before 1970 has no duty to protect the public from secondary asbestos exposure. Arizona only recognizes a duty in a...more
All U.S states have laws about data security and what to do when there’s a data breach. Here is what’s in the Arizona law.
Who The Law Applies To. The law applies to anyone who conducts business in Arizona and who owns or...more
8/3/2018
/ Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Encryption ,
Hackers ,
Notification Requirements ,
Personally Identifiable Information ,
Privacy Laws ,
State Data Breach Notification Statutes
The California Consumer Privacy Act of 2018 (“CCPA”) offers a new, very broad framework for data protection with increased obligations for businesses, and its reach is far and wide. It was passed in a whirlwind seven days. On...more
7/5/2018
/ Consumer Information ,
Cure Periods ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Rights ,
Encryption ,
Governor Brown ,
Opt-Outs ,
Personally Identifiable Information ,
Portability ,
Private Right of Action ,
State Data Breach Notification Statutes ,
Statutory Damages
Snell & Wilmer’s Breach Response Team regularly guides clients through all phases of data breach and cyber incident response, including leading internal investigations related to data breaches and cyber incidents in...more
6/7/2018
/ Corporate Counsel ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Notification Requirements ,
Personally Identifiable Information ,
State Data Breach Notification Statutes ,
Young Lawyers
All U.S states now have laws about data security and what to do when there’s a data breach. Alabama recently was the 50th state to add such a law, and it takes effect on May 1, 2018. Here are its highlights....more
Business email compromise (“BEC”) is a type of cyberattack that is increasing at an alarming pace. The U.S. Federal Bureau of Investigation estimated in a May 2017 alert that global losses due to BEC scams totaled more than...more
11/2/2017
/ Business E-Mail Compromise (BEC) ,
CEOs ,
Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Email ,
FBI ,
Fraudulent Wire Transfers ,
Hackers ,
Malware ,
Personally Identifiable Information ,
Policies and Procedures ,
Spam ,
Spoofing
Almost all U.S states have laws about data security and what to do when there’s a data breach. New Mexico recently added such a law for its state. Here is what’s in the New Mexico law....more
Colorado has adopted new rules that add cybersecurity requirements for certain entities with Colorado securities licenses. The rules are from the regulatory agency the Division of Securities. It licenses securities...more
8/9/2017
/ Broker-Dealer ,
Business Continuity Plans ,
Confidential Information ,
Cybersecurity ,
Cybersecurity Framework ,
Data Protection ,
Information Technology ,
Investment Adviser ,
New Rules ,
Risk Assessment ,
Risk Management ,
Security Breach
For the past 13 years, I’ve written the cover story of the state bar magazine, Arizona Attorney, about Arizona verdicts. The latest one is out. Here are 2016’s top Arizona verdicts, significant defense verdicts, punitive...more
Colorado has new proposed rules that add cybersecurity requirements for certain entities with Colorado securities licenses. The proposed rules are from the regulatory agency the Division of Securities. It licenses securities...more
The New York Department of Financial Services has new cybersecurity regulations “designed to promote the protection of customer information as well as the information technology systems of regulated entities [financial...more
3/7/2017
/ Banking Sector ,
Chief Information Security Officer (CISO) ,
Confidential Information ,
Cybersecurity ,
Cybersecurity Framework ,
Data Protection ,
Financial Institutions ,
Financial Services Industry ,
Gramm-Leach-Blilely Act ,
Information Technology ,
Insurance Industry ,
Notice Requirements ,
NYDFS ,
Personally Identifiable Information ,
Risk Assessment ,
Risk Management
The New York Department of Financial Services has proposed new cybersecurity regulations “designed to promote the protection of customer information as well as the information technology systems of regulated entities...more
10/20/2016
/ Banks ,
Covered Entities ,
Customer Protection Rule ,
Cybersecurity ,
Data Security ,
Department of Financial Services ,
Encryption ,
Financial Institutions ,
Information Security ,
Insurance Industry ,
Proposed Regulation ,
State Data Breach Notification Statutes
Arizona recently recognized a “legitimate expectation of privacy” in cell phones. The case was State v. Peoples, and the opinion was issued on September 12, 2016.
The Peoples case was about the police’s search of a cell...more
In response to increasing cybersecurity threats in vehicles, in 2015 the Automotive Information Sharing and Analysis Center (Auto-ISAC) was formed. Its member companies include all automakers operating in North America...more
Product liability cases show a strong defense trend in Arizona. Since 2011, Arizona juries have given twelve defense verdicts and three plaintiff’s verdicts. Here are all of the Arizona product liability verdicts over the...more
The Cybersecurity Act of 2015 became law on December 18, 2015. It’s the biggest piece of cybersecurity legislation passed by Congress in recent years. It authorizes and protects certain information-sharing for cybersecurity...more
In an era of ever-evolving ‘wired’ technology, increasing interconnectedness, and business and personal concerns about data security, we recently asked attorneys writing on JD Supra: What will be among the defining issues of...more
The Federal Bureau of Investigation is warning companies and the public to be aware of vulnerabilities that cybercriminals could exploit in connected devices, otherwise known as Internet of Things devices....more
If you accidentally “pocket dial” someone on your mobile phone, do you have a reasonable expectation of privacy about what’s said in that call? Here’s how courts looked at this issue recently.
What Happened? James Huff...more
What are the latest trends on product recalls in the United States?
Consumer Products. The Consumer Product Safety Commission has been proactive in recent years with consumer product regulations and recalls,...more
Almost all U.S states have laws about data security and what to do when there’s a data breach. California’s was the landmark law, first taking effect in 2003. Here is what California requires.
Who The Laws Apply To....more
Courage. Trial lawyers have lots of important traits and skills, and courage is at the top of the list. To be able to speak confidently to the jury who holds your client’s case in its hands, to tell that story in a way that...more
6/10/2015
/ Breach of Contract ,
Construction Defects ,
Counterclaims ,
Defamation ,
Jury Verdicts ,
Just Compensation ,
Medical Malpractice ,
Punitive Damages ,
Religious Discrimination ,
Takings Clause ,
Venue ,
Wrongful Death
Product liability cases show a strong defense trend in Arizona. Since 2011, Arizona juries have given ten defense verdicts and only one plaintiff’s verdict. That’s nearly 91% in favor of defendants over the last four years....more
Almost all U.S states have laws about data security and what to do when there’s a data breach. Here is what’s in the Arizona law.
Who The Law Applies To. The law applies to anyone who conducts business in Arizona and...more