Consumer Protection Science, Computers & Technology Business Organization

Read Consumer Protection updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Nevada Broadens Definition of Personal Information for Purpose of Encryption and Breach Notices

On May 13, Nevada passed a new law (A.B. 179) expanding the definition of “personal information” to include a natural person’s first name or initial and last name in combination with: 1) medical and health insurance...more

The DOJ’s New Cyber Security Best Practices — Creating a Standard of Care?

On April 29, 2015, the U.S. Department of Justice Computer Crime and Intellectual Property Section (“DOJ”) issued version 1.0 of its “Best Practices for Victim Response and Reporting of Cyber Incidents.” It draws on “lessons...more

Cybersecurity Oversight: What is a Board of Directors to Do?

Cybersecurity and the risks of data breaches figured prominently at the 35th Annual Ray Garrett Corporate and Securities Law Institute held April 30, 2015, at Northwestern Law School in Chicago. Participating in a panel...more

[Webinar] Compliance Agility: Managing Privacy in a Dynamic Environment - June 9, 1:00-2:00 pm Eastern

Privacy risk, legislation, and regulation is growing at an exponential rate. Organizations – themselves in constant states of change – are struggling to keep up and fearful because a single organizational change, be it...more

Justice Department Provides Cybersecurity Guidance

In late April, the Department of Justice’s Cybersecurity Unit provided a set of voluntary best practices for companies faced with the prospect of data breaches. The DOJ’s best practices were expressly developed with smaller...more

Planning for Breach Notification Requirements in Your Customer Contracts

At the San Francisco “Exchange” Data Privacy and Cyber Security Forum on April 26, a spirited debate arose whether a federal breach notification law will/should be enacted to bring uniformity to the patchwork of breach...more

Blog: HIPAA FAQ Series: Do You Need a BAA with Your Cloud Storage Provider?

This week, the HIPAA FAQ series continues with another topic about business associate agreements (BAAs). As most Covered Entities and Business Associates know, in the event that a Covered Entity utilizes a service provider...more

Data Privacy and Security Considerations in M&A Transactions

By some estimates, cybercrime costs the global economy $445 billion annually. If cybercrime were a single country, this dollar amount would place it within the world’s top 30 countries in terms of gross domestic product, and...more

JD Supra Thought Leaders On: TCPA

Meet some of the top writers providing insight and analysis on the Telephone Consumer Protection Act and TCPA-related matters on JD Supra during the past 30 days. ...more

Too Small to be Hacked?

We are not the size of Target or Home Depot, we won’t be a target of cyber-attack. This is a dangerous assumption. Recently reported in the news was that ISIL (a terrorist organization) had hacked and taken over certain...more

California Set to Consider Virtual Currency Guidelines

On February 27, California Assembly Member Matt Dababneh introduced AB 1326, which would provide guidelines for individuals or businesses who conduct business using virtual currency. The legislation would prohibit a person...more

President Obama’s Proposed Privacy Bill of Rights - Part 6: FTC Enforcement Powers

In this post, we look at the additional powers given to the Federal Trade Commission (FTC) to enforce the Consumer Privacy Bill of Rights (CPBR) and what it may mean for the agency that already enjoys significant authority to...more

What Obama's Proposed Anti-Hacking Legislation Means for Entrepreneurs

The slew of highly publicized data breaches over the past few years has brought the issue of cyber-security truly to the mainstream -- most recently reaching our living rooms through President Barack Obama’s State of the...more

Delaware Data Destruction Law Highlights the Necessity of Data Destruction Plans

The list of states requiring the disposal or destruction of personal data is growing, and companies need to respond accordingly by adopting data destruction plans. Delaware recently became the latest in a series of states to...more

Cyber Risks for the Boardroom Part 1: The Recent Increase in Focus on Privacy Issues

Each day this week, we are going to explore some of the issues in the rapidly growing area of cyberliability. We will examine the recent increase in focus on privacy issues, why directors should be concerned, the top...more

5 Things Every Company's Data Security Program Should Include

What's the one thing every company's data security program must include? That's the question we put recently to experts in the field, knowing that, especially after Heartbleed, the diversity of responses would create an...more

California Attorney General Urges Companies to Be Prepared for Cyber Attacks and Security Breaches

Kamala Harris, California's Attorney General, issued a set of recommendations for preventing and responding to cyber attacks and security breaches. The recommendations, called Cybersecurity in the Golden State, are directed...more

The New Cybersecurity Framework—A Roadmap for All Companies

The recent string of well-publicized data breaches has demonstrated that cyber criminals are targeting companies of all sizes and in all industries. Even companies with the most sophisticated security systems admit that the...more

INVESTIGATIVE REPORT FOR THE MASSACHUSETTS GAMING COMMISSION: APPLICANT: Sterling Suffolk Racecourse, LLC PRINCIPALS: Joseph...

Executive Summary: On January 15, 2013, Sterling Suffolk Racecourse, LLC (“Applicant” or “SSR”) filed an application for a Category 1 gaming license with the Massachusetts Gaming Commission (“Commission”). The proposed...more

Unique Privacy Concerns for Mobile Apps [Video]

With the rise of BaaS (or Backend as a service) platforms, it is easier than ever to create a mobile app on the fly. But Fenwick privacy co-chair Tyler Newby advises that companies should be aware of some important privacy...more

Bitcoin: A Peer-to-Peer Electronic Cash System (Satoshi Nakamoto "White Paper"))

Satoshi Nakamoto Abstract re Bitcoin White Paper: A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution....more

Nevada SB 346 (SEN BROWER): AN ACT relating to gaming; revising provisions governing the acceptance of certain wagers by a...

Legislative Counsel’s Digest: Under existing law, the Nevada Gaming Commission and the State Gaming Control Board are required to perform various acts relating to the regulation and control of gaming. (NRS 463.140)...more

New Jersey Division of Gaming Enforcement Announces Temporary Adoption of Regulations for Fantasy Sports Tournaments in Atlantic...

The New Jersey DGE regulations on fantasy sports games (N.J.A.C. 13:69 P ) can be found at: http://www.nj.gov/oag/ge/temporaryorders.html ...more

CA SB 678 (Correa) Authorization and Regulation of Internet Poker and Consumer Protection Act of 2013

An act to add Chapter 5.2 (commencing with Section 19990) to Division 8 of the Business and Professions Code, relating to gambling. Legislative Counsel’s Digest: Senate Bill No. 678, as introduced, Correa, February 22,...more

Hawaii SB768: Bill for an Act relating to Internet Gaming

Hawaii SB768: Bill for an Act relating to Internet Gaming. --- "BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF HAWAII: [Excerpts] SECTION 1. The legislature finds that internet wagering on games of chance and...more

37 Results
|
View per page
Page: of 2

Follow Consumer Protection Updates on:

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×