News & Analysis as of

Communications & Media Privacy General Business

Read need-to-know updates, commentary, and analysis on Communications & Media issues written by leading professionals.

Protecting Data: Vendors May Be Your Weakest Link

by Murtha Cullina on

A Verizon Communications vendor misconfigured a cloud server that caused the information of 6 million Verizon customers to be exposed on-line. When a cyber incident or data breach occurs on your vendor’s watch, regardless of...more

VTech Escapes Class Action Case Over Breach of 11 Million Toy Users’ Information

In November 2015, VTech Electonics North America LLC (VTech) announced that an unauthorized party infiltrated its network and gained access to the personal information of 5 million adults and 6.5 million children through its...more

Ransomware is taking the world by storm; does insurance respond?

On June 27, 2017, the world had its second major ransomware attack in two months, and experts are predicting more to come. The first, named WannaCry, began May 12, and quickly spread to over 400,000 machines, the vast...more

How Connected Cars and Autonomous Vehicles Will Change and Shape the Future of How We Move

by Hogan Lovells on

In this hoganlovells.com interview, Hogan Lovells partner Lance Bultena talks about the impact connected cars and autonomous vehicles (AVs) will have on America’s infrastructure and environment; the services associated with...more

You Can’t Always Get What You Want—Second Circuit Affirms Parties Can Bargain Away TCPA Right To Revoke Consent To Automated Calls

As the Rolling Stones famously sing, “You can’t always get what you want.” And in the ever treacherous world of the Telephone Consumer Protection Act (“TCPA”), 47 U.S.C. § 227, et seq., the Second Circuit has ruled that means...more

The Remedy for the New Cyber Threat Posing Major Coverage Problems: “Fake President” E-mails

by Nossaman LLP on

In the last few weeks, we have seen yet another widespread ransomware attack that hit nearly one hundred companies around the world. It reminded me of a recent request from a client, made just after news broke of the...more

Changing Cybersecurity Threats in the Context of the Internet of Things: Don’t Blink or You’ll Miss It

by Hogan Lovells on

In this hoganlovells.com interview, Washington, D.C.-based Hogan Lovells senior associate Paul Otto talks about security issues created by the exponential growth of the Internet of Things (IoT). ...more

Second Circuit: You Agreed to be Called When They Loaned You the Money, So Now Live With It

In a case of first impression, the Second Circuit recently ruled that the TCPA does not permit a consumer to unilaterally revoke bargained-for consent to be contacted by autodialer and pre-recorded voice calls on a mobile...more

When CASL Consents Expire

I’ve been getting a lot of emails from law firms and other professional services firms warning me that if I do not confirm my subscription to their newsletters, they will stop sending them to me. These firms have...more

Petya Global Ransomware Attack Shows Why Businesses Should Prepare for Loss or Unwanted Encryption of Key Data

by Lathrop Gage on

What is it? This new variation of Petya (“Little Peter” in Russian) is more robust ransomware than last month’s North Korean WannaCry ransomware. It has no kill switch, and it encrypts entire hard drives, not just individual...more

Second Circuit Holds Consumers Cannot Revoke Consent Given as Consideration in Bilateral Contract in TCPA Case

by Fenwick & West LLP on

The U.S. Court of Appeals for the Second Circuit held that a consumer who agrees to be contacted via telephone call or text messages as bargained-for consideration in a bilateral contract cannot subsequently revoke his or her...more

Second Circuit Holds That TCPA Does Not Permit Unilateral Revocation of Consent Obtained Contractually

by Ballard Spahr LLP on

The U.S. Court of Appeals for the Second Circuit recently held, in Reyes v. Lincoln Automotive Financial Services, that the Telephone Consumer Protection Act (TCPA) "does not permit a consumer to revoke its consent to be...more

Construction E-Note - June 2017

by Burr & Forman on

With online retailers challenging brick and mortar stores, the importance of online transactions and the terms of the contracts they create has never been greater. In the context of arbitration, courts are increasingly being...more

Hogan Lovells Obtains Major TCPA Consent Revocation Victory

by Hogan Lovells on

On June 22, 2017, in Reyes v. Lincoln Automotive Financial Services, the U.S. Court of Appeals for the Second Circuit agreed with Hogan Lovells attorneys representing the defendant and held that the Telephone Consumer...more

Could Your Website Be Collecting Information from Kids? Federal Trade Commission Issues 6-Step Plan for Complying with the...

by Balch & Bingham LLP on

This month, the Federal Trade Commission (FTC) issued guidance for businesses operating websites and online services looking to comply with the Children’s Online Privacy Protection Act (“COPPA”). COPPA addresses the...more

AICPA Releases Cybersecurity Risk Management Reporting Fact Sheet for CPAs Without a Key Recommendation

The American Institute of CPAs (AICPA), has released a risk management reporting framework that is intended to “establish a common, underlying language for Cybersecurity risk management reporting—almost akin to US GAAP or...more

The EU’s New General Data Privacy Regulation (GDPR) – Global Companies New Compliance Test

by Michael Volkov on

Global companies face a daunting array of risks – anti-corruption, trade compliance, antitrust, and money laundering are just a few. The European Union, however, has escalated the data privacy issue right into the corporate...more

Court Applies Work Product Protection to Breach Investigation Reports

One of the most significant questions in data security law is whether reports created by forensic firms investigating data breaches at the direction of counsel are protected from discovery in civil class action lawsuits. ...more

Record-Setting Target Settlement Changes Expectations for Institutional Data Security

On May 24, 47 state attorneys general settled with Target for $18.5 million regarding its 2013 data breach. The implications of the agreement may be more far-reaching than many companies realize. The fact that nearly all...more

Privacy Tip #90 – Payment Card Breaches - Both Sides of the Story

We hear daily about another payment card breach at a retail store, restaurant chain or hotel line. The response to a payment card breach differs from company to company. I get a lot of questions about payment card breaches...more

Corporate E-Note - May 2017

by Burr & Forman on

Starting on Friday, May 12th, computers in countries around the world have fallen victim to the latest ransomware attack. As of May 15th, it is estimated that more than 150 countries have infected systems, totaling over...more

SEC Urges Investment Firms to Better Prepare for Ransomware Attacks

by Nossaman LLP on

On May 17, 2017, the SEC’s Office of Compliance Inspection and Examination (“OCIE”) issued a risk alert urging broker-dealers, investment advisors and investment companies to safeguard themselves against ransomware in light...more

Rite Aid’s Online Store Breached

Rite Aid has admitted that its online eCommerce platform was accessed by unauthorized individual(s) from January 30, 2017, through April 11, 2017, and their customers’ names, addresses and payment card information, including...more

The Countdown Continues: One Year to the GDPR

by Latham & Watkins LLP on

The General Data Protection Regulation (GDPR or Regulation) will become applicable in one year, as of May 25, 2018. A lot has happened since we set out the key provisions of the Regulation last year....more

Obtaining Counsel from a Mobile App Attorney Is a Must

by Klein Moynihan Turco LLP on

Mobile App Attorneys Provide Necessary Guidance for Your Mobile App Business - Mobile applications, or “apps,” are becoming an indispensable tool for a wide range of businesses, from brick-and-mortar entities, to strictly...more

571 Results
|
View per page
Page: of 23
Cybersecurity

Follow Communications & Media Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.