General Business Privacy

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.
News & Analysis as of

Preparing for Increased Cybersecurity Information Sharing

Cybersecurity remains a top focus of government regulators, and the prevailing trend is to encourage information sharing between the government and private entities to combat cybersecurity threats. In line with this theme, on...more

Strict and far-reaching new EU data protection regime comes into force

The EU General Data Protection Regulation ("GDPR") is now in force, and the clock is officially ticking for businesses to bring their operations into line with its sweeping changes. On 4 May 2016, after more than four...more

Employer breached OHSA, collective agreement by sharing employee’s medical information with another employer

An arbitrator has decided that an operator of a long term care facility violated both the Occupational Health and Safety Act and the collective agreement by sharing an employee’s medical information with another employer,...more

O’Charley’s diners warned of payment card data breach

Diners who used credit and debit cards at the Tennessee based O’Charley’s restaurants between March 18, 2016, and April 8, 2016, were notified by O’Charley’s of a data breach that affected its point of sale systems. Consumers...more

The End of the “Safe Harbor” Rule for E.U./U.S. Data Transfer: How Can Companies Transfer Personal Data and Remain Compliant?

Directive 95/46/EC of 24 October 1995 - Articles 25 and 26 - The transfer of personal data to a third country is allowed: ..if the third country ensures an adequate level of protection; the Commission can...more

European Parliament: EU-U.S. Privacy Shield Needs Further Improvement

Earlier today, the European Parliament passed a non-legislative resolution saying the EU Commission should go back to negotiating with the United States to remedy “deficiencies” in the proposed EU-U.S. Privacy Shield for EU...more

Data Privacy Considerations for Starting or Evaluating a Bounty Program

Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate,...more

CSBS Publishes Annual Report

Recently, the Conference of State Bank Supervisors (CSBS) published its 2015 Annual Report to provide an overview of its activities and initiatives in 2015. The report highlights that, throughout 2015, state regulators (i)...more

Recent Investment Management Developments - May 2016

Below is a summary of recent investment management developments that affect registered investment companies, private equity funds, hedge funds, investment advisers, and others in the investment management...more

Europe Counts Down to the General Data Protection Regulation

Businesses have two years to comply with Europe’s new privacy regime. On 24 May 2016, after more than four years of debate, the General Data Protection Regulation (GDPR, or the Regulation) enters into force. The GDPR...more

Data Breaches: Are You Ready (for the inevitable)?

In 2015, identity theft occurred every two seconds, disrupting the lives of 13.1 million people, according to Javelin Strategy and Research. Year after year, U.S. data breaches have hit record highs, reports the Identity...more

Europe Is Shifting, And It’s a Big Deal – The New GDPR

The clock is now ticking. On May 4th the European Parliament published the final text of the General Data Protection Regulation (“GDPR”), and the rules of the game have significantly changed – at least in the context of EU...more

Liability of Cloud-Based Service Provider For Data Breach

Silverpop Systems provides digital marketing services through a cloud-based tool called ‘Engage’. Leading Market Technologies, Inc. (“LMT”) engaged Silverpop through a service agreement and during the course of that agreement...more

Recommendations for Evaluating Your Organization’s Use of Social Media

The majority of organizations utilize social media to market their products and services, interact with consumers, and manage their brand identity. Many mobile applications and websites even permit users to sign-in with their...more

Think you’re covered? Think again

Commercial General Liability policies (CGL) typically do not include data protection loss coverage, although some insurers offer additional data protection endorsements. Normally those additional endorsements only cover data...more

Competitors in the Courtroom: When to Exclude a Party’s Designated Representative from Hearing a Competitor’s Trade Secrets

“You sued them. They stay, period.” This is the conclusion a Texas trial court came to when asked to exclude the designated representative of a party from a hearing where an employee of the other party, a direct competitor,...more

Privacy Best Practices for Commercial and Private Drone Use Adopted in NTIA Process

Consensus was reached in a proceeding of the National Telecommunications and Information Administration (NTIA) of the U.S. Department of Commerce on a set of privacy best practices for the commercial and recreational use of...more

[Event] CLE for In-House Counsel - A 2016 Update on Current Issues Relating to Your Business - June 2nd, Chicago, Ill

Please join us for a complimentary CLE seminar on current issues affecting your business. Taught by leading practitioners at Locke Lord, the seminar offers three hours of CLE credit, including one hour of Professional...more

"Big Data Enters the Agenda of EU Antitrust Authorities"

On May 10, 2016, the French Competition Authority and German Federal Cartel Office published “Competition Law and Data,” a joint report on big data and its implications for competition law. The paper identifies issues that...more

Cyber Security

Roughly one million pieces of malware—computer viruses or malicious software—are released every day. In recent years, we’ve witnessed an unprecedented level of activity in the cyber arena, both in the form of increased...more

How to Evaluate a Credit Monitoring Service

Organizations are not, generally, required to offer services to consumers whose information was involved in a breach. Nonetheless, many organizations choose to offer credit reports (i.e., a list of the open credit accounts...more

Supreme Court’s Spokeo Decision Erects Barriers for Privacy and Data Security Plaintiffs

On May 16, 2016, the United States Supreme Court in Spokeo, Inc. v. Robins confirmed that a “concrete” injury is required of all private parties seeking to assert claims in federal court, even those alleging violations of a...more

Recent Settlements and Upcoming Audits Highlight the Continuing Need to Focus on Core HIPAA Compliance Measures

Recent settlements and initiatives conducted by the Office for Civil Rights ("OCR") at the U.S. Department of Health and Human Services highlight the continuing need for focus on compliance with the privacy and security...more

Reworked EU-U.S. Privacy Shield Still Undergoing Growing Pains

When the European Union’s highest court issued its October 2015 ruling striking down the U.S.-EU Safe Harbor framework, shock waves rippled on both sides of the Atlantic. For thousands of U.S. companies handling the...more

Tennessee Enacts Changes to Data Breach Statute

Businesses in the State of Tennessee should take note of several significant changes to Tennessee's data breach statute that take effect for data breaches occurring on or after July 1, 2016. Currently, Tennessee Code...more

2,950 Results
|
View per page
Page: of 118

Follow General Business Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×