General Business Privacy

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.
News & Analysis as of

Think Big Picture – minimize corporate export compliance risks while protecting your information security

Recently I have attended several cyber security conferences. What I have learned about protecting information has changed how I view export controls. Senior management and board members should think about the big picture as...more

Briefing on Russia Data Localisation Law

Russia has, today, implemented a Data Localisation Law. It requires information about Russian citizens to be stored in Russia and many businesses are concerned about how best to comply. There has also been some recent...more

More fines to come in Germany? Service provider engagements are under increased scrutiny.

Following a significant fine against the parties to an asset acquisition for illegally transferring customer information, the Bavarian Data Protection Supervisory Authority (Bavarian DPA) announced on August, 20, 2015 that it...more

State Law Claim for Invasion of Privacy Escapes ERISA Preemption: Rose v. HealthComp, Inc.

A federal court recently held that the plaintiff’s claims under state law survived ERISA preemption, and remanded the case to state court to determine the plaintiff’s claims for invasion of privacy and unfair business...more

The Legal Lessons of Data Breaches

Every business would love to find a fortune teller to give it insight into what trends to follow, which risks to take, and when “exposure” will convert to liability. Some clients might say that, unfortunately, their lawyers...more

Rocky Road Ahead for Ashley Madison after Widespread Damage Arising from Disclosure of Personal Information

Ashley Madison, the self-described “world's leading married dating service for discreet encounters” is the latest high-profile social media website to sustain a cyberattack. Established to provide an opportunity for married...more

3rd Circuit Says: FTC Can Take Action Against Companies That Suffer Data Security Breaches

Companies can be fined by the federal government for failing to properly safeguard consumer data, according to a decision this week by Pennsylvania's federal appellate court....more

School Districts and Charter Schools Must Address Student Data Privacy Concerns in Contracts

In working with school districts and charter schools, our firm has learned that many clients may have entered into agreements that lack key contract terms necessary to protect student data privacy. In other cases, we have...more

Cybersecurity and the Aviation Sector: Recent Incidents Highlight Unique Risks

Given the range of threats and the catastrophic impact an attack could have on an airline, strategizing to reduce the risk of breaches and implementing plans to deal with them once they occur should be prioritized at board...more

Corridors September 2015 - News for North Carolina Hospitals

This article will provide an outline of some of the most significant points for hospitals to use when confronted with a formal government investigation under the Criminal or Civil False Claims Act. As noted below, you should...more

A Guide for Insurers on Creating and Maintaining a Cybersecurity Plan

The intersection of valuable and personally identifiable digitized information and the increasing incidence of cybersecurity breaches makes the creation and maintenance of a cybersecurity plan one of the most pressing...more

New Potential Liability for Data Security: U.S. Court of Appeals for the Third Circuit Announces FTC has Authority to Scrutinize a...

The U.S. Court of Appeals for the Third Circuit announced that the Federal Trade Commission (FTC) has the authority to scrutinize a business’s data security protocol -- and to file a complaint if the FTC finds that protocol...more

Servicers Beware: RESPA Transfer of Servicing Letter May Trigger FDCPA Initial Debtor Communication Disclosure Requirement

In Hart v. FCI Lender Services, Inc., the Second Circuit made it clear that servicers should pay close attention to initial communications with borrowers upon commencing loan servicing when it determined in an August 12, 2015...more

United Kingdom: handling internal investigations

With so much potentially at stake, the initial steps and strategic decisions taken in any company investigation are critical to setting the tone for a focused, credible and effective inquiry. This is paramount not only for...more

Federal Trade Commission Joins with Industry Experts to Provide Start-Ups and Developers with Practical Advice at “Start with...

The FTC has a history of offering practical advice to organizations and consumers to protect against security threats and related concerns, and is continuing this practice with the upcoming – and very first – “Start with...more

Rising Conflict Among Federal Courts – Whether an Account Number Visible on a Debt Collection Envelope Violates the FDCPA

Section 1692f(8) of the Fair Debt Collection Practices Act (“FDCPA”) prohibits the use of any language or symbol, other than the debt collector’s address, on any envelope when communicating with a consumer by mail. The...more

NIST Guide Highlights Cybersecurity Considerations for Utilities and Manufacturing Companies

In 2013 alone, the U.S. Department of Homeland Security (DHS) and its Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to more than 256 cyber-incident reports—more than half of them in the energy...more

Shareholders sue mobile security firm for failing to disclose hacking incident before IPO

MobileIron, Inc. was sued late last week by shareholders in a proposed class action for allegedly failing to disclose a hacking incident just weeks before its initial public offering (IPO). The suit, filed on behalf of...more

Credit Card Fraud Liability Shift Looms for Retail Industry

On October 1, 2015, a substantial portion of the liability associated with in-store fraudulent credit card purchases will shift from credit card issuers, such as banks or credit unions, to retail merchants. Credit card...more

Breaking News: Target to Settle Data Breach Claims of Visa Card Issuers for $67 Million

Target has announced that it has entered into a settlement with Visa to resolve claims of issuers of Visa credit and debit cards arising from Target’s November 2013 data breach. The proposed settlement will pay issuers of...more

International Hacking and Insider Trading Scheme Exposes Cybersecurity Vulnerabilities at Third-Party Vendors

On August 11, 2015, the SEC announced that it was bringing fraud charges against 32 defendants for their alleged participation in a five-year, international hacking and insider trading scheme. According to the SEC, two...more

Can You Videotape Someone Else’s Conversation?

Careful about protecting the safety of his customers, A.R. Remington, owner of Fishinabarrel Gun Range, installed surveillance cameras to blanket his premises, except the restrooms. Last week while target practicing with his...more

A Firewall for the Boardroom: Best Practices to Insulate Directors and Officers From Derivative Lawsuits and Related Regulatory...

Shortly after the massive 2013 Target data breach, shareholders filed four derivative lawsuits against the company’s directors and some of its officers (13 CARE 624, 3/20/15). The shareholders alleged that the defendants had...more

The Justice Department Has Some Things to Tell You about Cybersecurity

In April the Justice Department’s Computer Crime and Intellectual Property Section issued its Best Practices for Victim Response and Reporting of Cyber Incidents. It is an excellent guide for a business organization to...more

Are Your Trade Secrets Safe?

A few years back, we had a client – a manufacturing business – that decided to sue an ex-employee for stealing its trade secrets. Our client had developed a process that was unique. Using this process, it was able to...more

2,242 Results
|
View per page
Page: of 90

Follow General Business Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×