Sharon Klein

Sharon Klein

Pepper Hamilton LLP

Contact  |  View Bio  |  RSS

Latest Posts › Data Protection

Share:

[Webinar] Data Protection Update: Joint Webinar with Travers Smith - March 9th, 12:00pm (EST) | 9:00am (PST)

The demise of the EU-US safe harbor arrangement has been bad news for many businesses in the US and the UK. A new "EU-U.S. Privacy Shield" deal in principle has just been announced as the replacement to the safe harbor but it...more

2/24/2016 - Cybersecurity Data Protection EU EU Data Protection Laws EU-US Privacy Shield Popular Safe Harbors UK US-EU Safe Harbor Framework Webinars

EU Court of Justice: Safe Harbor Decision Permitting EU-U.S. Personal Data Transfers Is Invalid

Ruling affects approximately 5,000 U.S. companies that have relied on the Safe Harbor to transfer personal data from the EU to the United States. Key Points - - The approach of the U.S. government to personal...more

10/7/2015 - Cybersecurity Data Protection Data Security Data Transfers European Court of Justice (ECJ) Facebook International Data Transfers NSA Privacy Laws Safe Harbors US-EU Safe Harbor Framework

Advocate General of the EU Court of Justice: EU-U.S. Safe Harbor Act Is Not Safe for EU Citizens

The decision could affect the thousands of U.S. companies in diverse industries that rely on the EU-U.S. Safe Harbor Agreement to legally transfer personal data of EU citizens from the EU to the United States....more

9/25/2015 - Advocate General Cybersecurity Data Privacy Data Protection Data Security Data Transfers Edward Snowden EU Data Protection Laws European Court of Justice (ECJ) NSA Personal Data PRISM Program Safe Harbors US-EU Safe Harbor Framework

How to Avoid and Respond to a Cybersecurity Breach

In light of numerous recent data breaches, cybersecurity has emerged as an issue impacting organizations ranging from the local hardware store to the largest multi-national firms in the world. In short, no industry is immune...more

9/17/2015 - Banking Sector Breach Notification Rule CAN-SPAM Act COPPA Cyber Attacks Cyber Crimes Cyber Threats Cybersecurity Data Breach Data Protection Data Security FERPA Financial Institutions Gramm-Leach-Blilely Act Hackers Healthcare HIPAA HITECH OCR Personally Identifiable Information Privacy Laws Verizon

[Webinar] Beam It Up Safely: Navigating Data Privacy and Security in Telemedicine's Uncharted Territory - Sept. 17, 12:00pm EDT

Science fiction programs once imagined a future where a doctor on a spaceship could treat a patient on a distant planet using groundbreaking technology. The health care industry may not yet have made this giant leap, but...more

9/2/2015 - Data Privacy Data Protection Data Security Electronic Medical Records Medical Records mHealth Popular Telemedicine Webinars

OCIE Cybersecurity Risk Alert: Keep Your Data Close and Your Third-Party Providers Closer

On February 3, the Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (OCIE) published a Risk Alert that summarizes the OCIE’s observations from its recent examinations of registered...more

2/10/2015 - Broker-Dealer Cybersecurity Data Protection Investment Adviser OCIE Popular Risk Alert SEC Third-Party Service Provider

Ignoring XP End Of Life May Make Your Company An Attractive Target

On April 8, Microsoft officially ended all support and ceased providing updates for their Windows XP operating system. This “end of life” (EOL) announcement is not uncommon with software platforms, where continued support of...more

5/14/2014 - Compliance Cybersecurity Data Breach Data Protection Microsoft Technology

SEC Issues Cybersecurity Initiative Risk Alert

On April 15, the U.S. Securities and Exchange Commission (SEC)’s Office of Compliance Inspections and Examinations (OCIE) issued a Risk Alert on its Cybersecurity Initiative. The Alert is intended to provide additional...more

4/29/2014 - Cybersecurity Data Protection OCIE SEC

New Jersey Federal Court Upholds The FTC’s Authority To Regulate Data Security

On April 7, a highly anticipated opinion was issued by New Jersey District Court Judge Esther Salas in a case that will likely have broad implications in the realms of privacy and data security. The case in question is FTC v....more

4/10/2014 - Data Protection FTC Jurisdiction Wyndham

Privacy And Data Security For Life Sciences And Health Care Companies

Pepper Hamilton Health Care-Life Sciences Webinar - The explosion of mobile technology and Web applications linking patients with doctors, pharmacies and medical devices is undergoing scrutiny by the FDA, FTC, HHS and...more

2/14/2014 - Compliance Cybersecurity Data Protection FDA FTC Healthcare HHS Life Sciences Mobile Devices Privacy Laws Technology

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

12/19/2013 - ADA ADEA Bring Your Own Device Cybersecurity Data Breach Data Protection Discovery Discrimination Document Productions Employer Liability Issues GINA Mobile Device Management Mobile Devices NLRA Over-Time Protected Concerted Activity Stored Communications Act Title VII

Partly Cloudy With A Chance Of Data Breach

A report recently published by NIST sets forth steps federal agencies and the private sector providers who cater to them need to take to ensure the security of data stored and processed in the cloud....more

8/23/2013 - Cloud Computing Cybersecurity Data Breach Data Protection NIST

California Attorney General’s Report Reveals Millions Affected By Data Breaches In 2012

A report recently issued by the California Attorney General reveals that millions of Californians were the victims of a data breach in 2012, mostly due to intentional intrusions by outsiders or by unauthorized insiders....more

8/1/2013 - Attorney Generals Cybersecurity Data Breach Data Protection Encryption Notice Requirements Personally Identifiable Information

NIST Proposes Privacy Control Roadmap For Organizations

In an age in which safeguarding the privacy of a person’s information is becoming increasingly challenging, the National Institute of Standards and Technology (NIST) encourages organizations to devote time and resources to...more

6/14/2013 - Cybersecurity Data Protection HIPAA HITECH NIST Personally Identifiable Information Risk Mitigation

U.S. Responding To Cyber-Espionage: White House Acknowledges Increasing Threat

No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more

3/15/2013 - Barack Obama China Critical Infrastructure Sectors Cyber Espionage Cybersecurity Data Protection National Security Trade Secrets

The Omnibus Final HIPAA Rule Is Here

On January 17, 2013, the Office of Civil Rights of the U.S. Department of Health and Human Services (HHS) announced the omnibus final rulemaking (Omnibus Rule). According to HHS, this Omnibus Rule is needed to strengthen...more

1/29/2013 - Business Associates Data Protection Electronic Medical Records HHS HIPAA HIPAA Omnibus Rule HITECH OCR Patient Privacy Rights PHI

FTC Strengthens Laws To Protect Children’s Privacy

On December 19, 2012, the Federal Trade Commission (FTC) made major changes to the Children’s Online Privacy Protection Act (COPPA) for the first time in nearly 15 years, by significantly amending the Children’s Online...more

1/7/2013 - Consent COPPA Data Collection Data Protection FTC Mobile Apps Notice Requirements Parental Consent Personally Identifiable Information Third-Party

FTC Survey: Disclosure Of Use Of Private Information In Mobile Apps For Children Is Insufficient

A report recently released by the Federal Trade Commission (FTC) reveals that mobile applications targeted at children often collect and share children’s private information with third parties but generally do not provide...more

1/7/2013 - COPPA Data Protection Disclosure Requirements FTC Mobile Apps Notice Requirements Parental Consent Personally Identifiable Information Privacy Policy

De-Identifying Protected Health Information: OCR Issues Long-Awaited Guidance

The HIPAA Privacy Rule is intended to protect individually identifiable health information by limiting its use and disclosure. But the Privacy Rule expressly permits the de-identification of that information, and in doing so...more

1/5/2013 - Data Breach Data Protection De-Identification Health Information Technologies HIPAA Life Sciences OCR Personally Identifiable Information PHI

19 Results
|
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×