Odia Kagan

Odia Kagan

Pepper Hamilton LLP

Contact  |  View Bio  |  RSS

Latest Publications

Share:

What Your TV Wouldn’t Tell You and Your Fridge Didn’t Know: FTC Best Practices for Consumer-Facing IoT Devices

On January 27, the Federal Trade Commission (FTC) issued an FTC staff report titled “Internet of Things: Privacy & Security in a Connected World” (Report). The Report summarizes the FTC’s November 2013 workshop on the privacy...more

3/3/2015 - Best Practices Corporate Counsel FTC Information Reports Internet of Things Privacy Concerns

OCIE Cybersecurity Risk Alert: Keep Your Data Close and Your Third-Party Providers Closer

On February 3, the Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (OCIE) published a Risk Alert that summarizes the OCIE’s observations from its recent examinations of registered...more

2/10/2015 - Broker-Dealer Cybersecurity Data Protection Investment Adviser OCIE Popular Risk Alert SEC Third-Party Service Provider

Bank Board Director Alert: Banking on Cybersecurity

Prudential bank regulators and other supervisory authorities have put cybersecurity front and center in 2015 by issuing guidance that sets forth their expectations of improved cybersecurity and that incorporates cybersecurity...more

2/9/2015 - Banking Sector Banks Cyber Attacks Cybersecurity Industry Examinations JPMorgan Chase New Guidance NIST Prudential Regulation Authority

Virtual Currency, Real Risks

CSBS publishes Draft Model Regulatory Framework to promote consistent state regulation of virtual currency activities and protect consumers in the event of a breach. In March 2014, “Mt. Gox,” one of the largest and best-known...more

1/28/2015 - Banking Sector Bitcoin BitLicense BSA/AML Cryptocurrency Currency Exchange Cybersecurity Financial Institutions Licensing Rules Popular Regulatory Agenda Supervision Virtual Currency

Privacy and Data Security 2015: President Obama’s Mandate for a Strong Tight-Knit Legislative Framework

In his January 20 State of the Union address, President Obama said, “We are a strong, tight-knit family who has made it through some very, very hard times.” This statement was used as a theme for the economic initiatives set...more

1/23/2015 - Banking Sector Barack Obama Consumer Privacy Bill of Rights Cybersecurity Energy Sector FTC Information Sharing New Legislation Personal Data Notification and Protection Act Popular Student Digital Privacy Act

Conquering Spamalot: Canada’s New Anti-Spam Legislation

Canada’s Anti-Spam Legislation (CASL), considered the most restrictive in the world, became effective on July 1, 2014. The law, which applies to American businesses, requires businesses to obtain consent before sending...more

10/24/2014 - Anti-Spam Legislation Canada CASL Spam

Practice ‘Bring Your Own Device’? Here’s How to Avoid Legal Trouble

The "Bring Your Own Device" (BYOD) trend has risen dramatically in the last year, but with its increased use comes risks that employers and employees are not equipped to manage. Employers should practice the following in...more

4/8/2014 - Bring Your Own Device Employer Liability Issues

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

12/19/2013 - ADA ADEA Bring Your Own Device Cybersecurity Data Breach Data Protection Discovery Discrimination Document Productions Employer Liability Issues GINA Mobile Device Management Mobile Devices NLRA Over-Time Protected Concerted Activity Stored Communications Act Title VII

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately  [Video]

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

12/19/2013 - ADA Bring Your Own Device Cybersecurity Data Breach Discovery Discrimination Document Productions Employer Liability Issues GINA Mobile Device Management Mobile Devices NLRA Over-Time Protected Concerted Activity Stored Communications Act Title VII

The Reports Of The Death Of Privacy Were Exaggerated: California Breathes New Life Into The Privacy Rights Of Its Residents

In a series of new bills amending existing California privacy laws, the State of California increases the protections presently provided to its residents by broadening the requirements for reporting breach of personal data;...more

11/20/2013 - Breach Notification Rule CalOPPA Data Breach Internet Invasion of Privacy Privacy Laws Right to Privacy

Partly Cloudy With A Chance Of Data Breach

A report recently published by NIST sets forth steps federal agencies and the private sector providers who cater to them need to take to ensure the security of data stored and processed in the cloud....more

8/23/2013 - Cloud Computing Cybersecurity Data Breach Data Protection NIST

California Attorney General’s Report Reveals Millions Affected By Data Breaches In 2012

A report recently issued by the California Attorney General reveals that millions of Californians were the victims of a data breach in 2012, mostly due to intentional intrusions by outsiders or by unauthorized insiders....more

8/1/2013 - Attorney Generals Cybersecurity Data Breach Data Protection Encryption Notice Requirements Personally Identifiable Information

Unhack My Heart: FDA Issues Guidance To Mitigate Cybersecurity Threats In Medical Devices

A new guidance document from the FDA lists considerations and suggested steps to reduce the likelihood of cybersecurity breaches in medical devices....more

6/24/2013 - Cybersecurity Documentation FDA Medical Devices Security and Privacy Controls Software

NIST Proposes Privacy Control Roadmap For Organizations

In an age in which safeguarding the privacy of a person’s information is becoming increasingly challenging, the National Institute of Standards and Technology (NIST) encourages organizations to devote time and resources to...more

6/14/2013 - Cybersecurity Data Protection HIPAA HITECH NIST Personally Identifiable Information Risk Mitigation

Whose Social Media Account Is It, Anyway?

A detailed social media policy specifically addressing the ownership of social media accounts is key to a corporation’s ability to maintain ownership of an employee’s account after the employee leaves the corporation....more

5/16/2013 - Eagle v Edcomm Hiring & Firing Misappropriation Passwords Social Media Social Media Account Ownership Social Media Policy

U.S. Responding To Cyber-Espionage: White House Acknowledges Increasing Threat

No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more

3/15/2013 - Barack Obama China Critical Infrastructure Sectors Cyber Espionage Cybersecurity Data Protection National Security Trade Secrets

FTC Survey: Disclosure Of Use Of Private Information In Mobile Apps For Children Is Insufficient

A report recently released by the Federal Trade Commission (FTC) reveals that mobile applications targeted at children often collect and share children’s private information with third parties but generally do not provide...more

1/7/2013 - COPPA Data Protection Disclosure Requirements FTC Mobile Apps Notice Requirements Parental Consent Personally Identifiable Information Privacy Policy

17 Results
|
View per page
Page: of 1

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×