Sharon Klein

Sharon Klein

Pepper Hamilton LLP

Contact  |  View Bio  |  RSS

Latest Posts › Data Breach

Share:

Connecticut Supreme Court Allows Plaintiffs to Circumvent HIPAA’s No Private Right of Action Clause

In an opinion released on November 11, the Connecticut Supreme Court ruled on whether the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and its implementing regulations preempt a common law claim for...more

11/26/2014 - Breach of Contract Class Action Data Breach Health Care Providers HIPAA Negligence Negligent Infliction of Emotional Distress Patient Confidentiality Breaches PHI Popular Private Right of Action

California Data Breaches Require Identity Protection Services (and More)

On September 30, 2014, Gov. Edmund G. Brown signed AB 1710 into law, amending existing law to impose even stricter regulation on businesses with access to personal information about California residents. California has long...more

10/9/2014 - Breach Notification Rule Data Breach Electronically Stored Information Personally Identifiable Information

Ignoring XP End Of Life May Make Your Company An Attractive Target

On April 8, Microsoft officially ended all support and ceased providing updates for their Windows XP operating system. This “end of life” (EOL) announcement is not uncommon with software platforms, where continued support of...more

5/14/2014 - Compliance Cybersecurity Data Breach Data Protection Microsoft Technology

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

12/19/2013 - ADA ADEA Bring Your Own Device Cybersecurity Data Breach Data Protection Discovery Discrimination Document Productions Employer Liability Issues GINA Mobile Device Management Mobile Devices NLRA Over-Time Protected Concerted Activity Stored Communications Act Title VII

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately  [Video]

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

12/19/2013 - ADA Bring Your Own Device Cybersecurity Data Breach Discovery Discrimination Document Productions Employer Liability Issues GINA Mobile Device Management Mobile Devices NLRA Over-Time Protected Concerted Activity Stored Communications Act Title VII

The Reports Of The Death Of Privacy Were Exaggerated: California Breathes New Life Into The Privacy Rights Of Its Residents

In a series of new bills amending existing California privacy laws, the State of California increases the protections presently provided to its residents by broadening the requirements for reporting breach of personal data;...more

11/20/2013 - Breach Notification Rule CalOPPA Data Breach Internet Invasion of Privacy Privacy Laws Right to Privacy

Partly Cloudy With A Chance Of Data Breach

A report recently published by NIST sets forth steps federal agencies and the private sector providers who cater to them need to take to ensure the security of data stored and processed in the cloud....more

8/23/2013 - Cloud Computing Cybersecurity Data Breach Data Protection NIST

California Attorney General’s Report Reveals Millions Affected By Data Breaches In 2012

A report recently issued by the California Attorney General reveals that millions of Californians were the victims of a data breach in 2012, mostly due to intentional intrusions by outsiders or by unauthorized insiders....more

8/1/2013 - Attorney Generals Cybersecurity Data Breach Data Protection Encryption Notice Requirements Personally Identifiable Information

De-Identifying Protected Health Information: OCR Issues Long-Awaited Guidance

The HIPAA Privacy Rule is intended to protect individually identifiable health information by limiting its use and disclosure. But the Privacy Rule expressly permits the de-identification of that information, and in doing so...more

1/5/2013 - Data Breach Data Protection De-Identification Health Information Technologies HIPAA Life Sciences OCR Personally Identifiable Information PHI

9 Results
|
View per page
Page: of 1