Consumer Protection Business Organization Science, Computers & Technology

Read Consumer Protection updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

FTC Releases Data Breach Response Guide

On October 25, the Federal Trade Commission (FTC) released new guidance for businesses that outlines recommended actions to take when facing a data breach. This data breach response guide (Guide) follows the FTC's prior...more

FFIEC Releases Answers To FAQs About Cybersecurity Assessment Tool

On October 17, 2016, the Federal Financial Institutions Examination Council (“FFIEC” or the “Council”) released a set of answers to frequently asked questions about its cybersecurity assessment tool (the “CAT”). The FFIEC, an...more

Bitcoin: Cybersecurity Regulations on the Horizon?

As legislators grapple with creating legislation intended to bring virtual currencies, such as bitcoin, within the scope of anti-money laundering regulations, the vulnerability of Bitcoin exchanges to theft and other cyber...more

New Economy Businesses Need New Insurance: Can the Insurance Industry Keep Up?

The sharing economy and new technology innovations have disrupted the traditional underwriting and risk assessment models....more

Coal Plant Shutdowns: Operators Have Cyber Protection Obligations Even After Closing

As Yogi Berra used to say: “It ain’t over till it’s over.” Coal plant operators shutting down their plants should remember this phrase. Even after they throw the breakers, go off the grid, are no longer contributing to the...more

PCI DSS v. 3.2: New Requirements Coming to Protect Your Customers’ Wallets

The Payment Card Industry (PCI) Security Standards Council (PCI Council) released Version 3.2 of the PCI Data Security Standard (PCI DSS), containing several new requirements for merchants, acquirers, and other entities that...more

PowerPoint Slides: Could My Company's Website Violate the Americans with Disabilities Act?

Under the Americans with Disabilities Act (ADA), places of public accommodation must ensure equal access to the goods and services they offer to disabled individuals. Is a company website subject to the ADA? The answer to...more

Webinar: Could My Company's Website Violate the Americans with Disabilities Act? [Video]

Under the Americans with Disabilities Act (ADA), places of public accommodation must ensure equal access to the goods and services they offer to disabled individuals. Is a company website subject to the ADA? The answer to...more

Cyber Security Takes Centre Stage in UK Government’s Strategy

The UK Department for Culture, Media and Sport recently released a statement on cyber security, in which it urged businesses to take better care to protect against cyber criminals. This statement follows publication of its...more

Cybersecurity Advice to CEOs and Boards “Take more responsibility”!

The White House and its top security advisors are regularly advised about cyberintrusions and as a result the “time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security”...more

Tennessee Amends Its Data Breach Notification Laws

Removes the Encryption Safe Harbor, Limits the Timing of Notice, and Expands “Unauthorized Persons” - Effective July 1, 2016, Tennessee becomes the first state to remove the encryption safe harbor from its data breach...more

OCC Introduces Framework for Responsible Innovation

On March 31, 2016 the Office of the Comptroller of the Currency (OCC) issued a white paper setting forth its vision of responsible innovation, and signaling its increasing involvement in the financial technology (Fintech)...more

OSTP Blog Item Notes Recent Reports Highlighting Continued Federal Commitment To NanoEHS

The Office of Science and Technology Policy (OSTP) posted on April 11, 2016, a blog item, authored by Lloyd Whitman, OSTP, and Dr. Treye Thomas, Consumer Product Safety Commission (CPSC), entitled “Supporting Responsible...more

Is Data Really a “Toxic” Asset?

In his “Data Is a Toxic Asset” blog post, Bruce Schneier argues that data is a toxic asset and that the lesson all the recent data breaches are teaching us is that storing this asset is “dangerous,” because it makes companies...more

Information Security and Privacy Group News: Cities and Towns Being Targeted by Hackers: Connecticut Municipalities Must Follow...

In the world of data breaches, John Chambers, CEO at Cisco, explained it best: "There are only two kinds of companies. Those that were hacked and those that don’t yet know they were hacked." With the ever increasing rate of...more

CFTC Intermediaries to Adopt and Implement Cybersecurity Programs by March 1, 2016

Commencing March 1, 2016, all commodity pool operators, commodity trading advisors, futures commission merchants, retail foreign exchange dealers, investment brokers, major swap participants and swap dealers that are National...more

DHS/DOJ Issue Guidance on Cyber Threat Info Sharing

On February 16, 2016, the Department of Homeland Security (DHS) and Department of Justice (DOJ) issued “guidance” to assist federal agencies and non-federal entities in implementing the Cybersecurity Act of 2015.  The Act was...more

FDIC & Cyber: Words of Warning to Financial Institutions and their Boards

Financial institutions sit atop a wealth of personal information – not to mention money. In an interconnected world in which sensitive customer information is stored on servers and in the cloud – and online and mobile...more

FDIC "Framework for Cybersecurity" Highlights How Financial Institution Information Security Programs Can Better Respond to...

In February, 2016, the Division of Risk Management Supervision of the Federal Deposit Insurance Corporation (“FDIC”) published “A Framework for Cybersecurity.” The article provides a good “sanity check” for financial...more

New Cybersecurity and Privacy Initiatives Announced In President Obama’s Final Budget

On February 9, 2016, in connection with his annual budget request, President Obama announced a $19 billion Cybersecurity National Action Plan (CNAP) that the White House has described as a “capstone” to seven years of...more

Best Practices for Sharing Threat Indicators with the Government

After a security incident is identified organizations often consider whether to share information concerning the incident with government agencies. If the incident involved criminal conduct, federal law enforcement agencies –...more

In Case You Missed It: Launch Links - Week of January 31, 2016

Some interesting links we found across the web this week: The State of Venture Capital - How much VC money is out there, and where is it coming from? Click through to the full presentation for a detailed...more

How to Obtain EU Binding Corporate Rules (BCR) Approval

The following provides background concerning the approved Binding Corporate Rules ("BCR") procedure. BCRs are in-kind privacy rules and standards that allow multinational groups of companies to transfer personal data within...more

FTC’s PrivacyCon Highlights Consumer Privacy Perceptions and Targeting

The Federal Trade Commission is currently the most aggressive enforcement agency on privacy and data security. The agency kicked off 2016 with PrivacyCon on January 14, which put the spotlight on academic research on consumer...more

International Data Privacy: How to Navigate the Challenges

Hardly a day goes by when the news doesn't include some privacy-related story or scandal. To name just a few recent examples, we've seen: ..Highly publicized losses of customer credit card data by household-name...more

96 Results
View per page
Page: of 4

Follow Consumer Protection Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.