News & Analysis as of

Consumer Protection Privacy Science, Computers & Technology

Read Consumer Protection updates, news, and legal commentary from leading lawyers and law firms:

Cybersecurity, A-Z: D is for Drones

Unmanned aerial vehicles, or “drones,” as they’re commonly called, touch on numerous hot-button cybersecurity issues. As devices connected to networks, they are important when considering the “internet of things.” As used...more

Target Reaches $18.5 Million Dollar Settlement in Data Breach with States

It seems as though we have been writing about this case for a lifetime. Target Corporation’s data breach saga came one step closer to a conclusion this week. On Tuesday, Target reached an $18.5 million settlement with 47...more

Governor Signs Amendment to Tennessee Data Breach Notification Law

by Bass, Berry & Sims PLC on

During the recent 110th Regular Session of the Tennessee General Assembly, Governor Bill Haslam signed into law an amendment to the Tennessee Identity Theft Deterrence Act of 1999....more

Ultrasonic Cross-Device Tracking: A Consumer Management Tool with FTC Warnings

A consumer’s television or computer may be emitting silent signals that her smartphone can hear, recognize and answer back, but the consumer can’t sense them at all. These signals are telling retailers about their customer’s...more

Financial Services Weekly News - May 2017 #4

by Goodwin on

Editor's Note - Memorial Day. On Memorial Day, we will be celebrating the men and women whose service and sacrifice ensures the preservation of freedom and opportunity across the United States. Rather than summarize the...more

China's Cybersecurity Law and Draft Implementation Rules

by Morgan Lewis on

The law applies to all “network operators” and introduces cybersecurity mechanisms. On November 7, 2016, the Chinese government released a draft version of the Cybersecurity Law (CSL) that will govern China’s cyberspace...more

Federal Court Stands By Earlier Decision Holding Financial Institutions To Higher Standard Than Customers When Pursuing Data...

by King & Spalding on

On May 1, 2017, an Illinois federal district judge dismissed data breach-related claims brought by financial institutions against a grocer. The court distinguished the case from similar lawsuits aimed at Home Depot and...more

Monthly TCPA Digest - May 2017

by Mintz Levin on

We are pleased to present the latest edition of our Monthly TCPA Digest, providing insights and news related to the Telephone Consumer Protection Act (TCPA). This month’s issue features updates on the latest regulatory...more

OIG Report Continues Criticism of CFPB Enforcement Data Security Practices

by Ballard Spahr LLP on

On May 15, 2017, the Federal Reserve Office of Inspector General – which also oversees the CFPB – released a report finding deficiencies in the CFPB Office of Enforcement’s (Enforcement) processes for securing sensitive...more

HIPAA Settlement With Wireless Health Services Provider Is Less Than Meets The Eye

by King & Spalding on

On April 24, the U.S. Department of Health and Human Services Office for Civil Rights (“OCR”) announced a $2.5 million HIPAA settlement with CardioNet, a wireless health services provider. CardioNet provides remote mobile...more

President Trump's Executive Order on Cybersecurity

by King & Spalding on

On May 11, 2017, President Trump signed a long-awaited Executive Order that aims to bolster the cybersecurity of federal networks and critical infrastructure. In an effort to fulfill the President’s promise to get “tough on...more

New Duties for Lawyers? The ABA Weighs In on Cybersecurity.

Recently, the ABA Standing Committee on Ethics and Professional Responsibility issued Formal Opinion 477, which aims to provide guidance and clarity to lawyers as they consider what level of security to give communications...more

WannaCry Ransomware Cyberattack Raises Legal Issues

by Morgan Lewis on

The recent cyberattack highlights the need for firms to engage in proactive prevention and protection. Ransomware (malware that encrypts data pending an extortion payment) is a recurring cyber threat that is growing more...more

Privacy Perils: Strong Passwords IV: The Phrase Awakens

by Bass, Berry & Sims PLC on

Previous Tips have warned of the use of easily-guessed passwords, and have provided suggested methods to strengthen them, including use of...more

Self-Sovereign Identity and Distributed Ledger Technology : Framing the Legal Issues

by Perkins Coie on

Purpose - Distributed ledger technology (“DLT”), including the use of blockchain technology, has been touted as a way to create and validate digital identities that serve many of the same purposes that physical forms of...more

The FTC Seeks Comment: How Trusty Is The TRUSTe Plan For COPPA Certification?

by King & Spalding on

The Federal Trade Commission (FTC) is currently seeking comment on proposed changes to TRUSTe’s safe harbor program under the agency’s Children’s Online Privacy Protection Rule (COPPA). Per the Federal Register notice, the...more

Are Healthcare Systems Being Held Hostage by Ransomware?

by Revision Legal on

Healthcare ransomware is one of the biggest cybersecurity concerns in existence and it may have particularly serious implications for healthcare systems. Ransomware is a form of malicious software code that is somehow...more

Is the Government Protecting Your Private Information?

by Reed Smith on

We were not affected by the recent ransomware attack that disabled computers worldwide, including in multiple public hospitals in the UK. At least not yet. For those who have never had the pleasure or who otherwise do not...more

Data Security Under Commissioner Ohlhausen: What You Need to Know

The Federal Trade Commission (FTC) has been a critically important regulator of cybersecurity practices in the US, using its authority under Section 5 of the FTC Act to bring enforcement actions against companies for failing...more

Australia And China Establish Cybersecurity Agreement

by King & Spalding on

On April 21, 2017, Australia and China forged an agreement to expand their cybersecurity cooperation. This agreement emerged as part of the Australia-China High-Level Security Dialogue held in Sydney. ...more

Cybersecurity, A-Z: C is for CFAA

The Computer Fraud and Abuse Act, or CFAA, is the federal “anti-hacking” statute (or sometimes referred to as a “computer trespass” statute). In essence, the CFAA prohibits intentional unauthorized access into another...more

NIST Plans To Examine Internet of Things (IoT) For Its Cybersecurity Framework

by Dentons on

The National Institute of Standards and Technology (NIST) is holding a Cybersecurity Framework Workshop this week at its headquarters in Gaithersburg, Maryland. The purpose of the workshop is to discuss issues related to its...more

Yesterday, #WannaCry. Today, #DocuSignPhish

Another day, another data incident. If you use DocuSign, you’ll want to pay attention. The provider of e-signature technology has acknowledged a data breach incident in which an unauthorized third party gained access to...more

President Trump Signs Executive Order Holding Agency Directors Accountable for Cybersecurity

Five months after rejecting a less detailed executive order on cybersecurity, Trump signed one on May 11, 2017 (Order). The Order notifies federal agencies that the “President will hold heads of executive departments and...more

Senator To Propose ISP Consumer Privacy Bill

by King & Spalding on

On Friday, April 14, 2017, Senator Richard Blumenthal (D-Conn.) announced his plan to introduce a bill that would allow the Federal Trade Commission (“FTC”) to regulate consumer privacy protections regarding Internet service...more

3,770 Results
|
View per page
Page: of 151
Cybersecurity

Follow Consumer Protection Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!