News & Analysis as of

Privacy Updates

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:

DOL Temporarily Shuts Down OSHA Injury Reporting Portal Because of Possible Data Breach

by Fisher Phillips on

According to Bloomberg BNA, the Labor Department temporarily shut down OSHA’s (ITA) “Injury Tracking Application” portal for employers to report injuries and illnesses so that OSHA can investigate a “potential compromise” of...more

The Ninth Circuit Revives Consumer Class Action, Finding Intangible Harm Sufficient to Confer Article III Standing

by Hogan Lovells on

The six-year fight over the type of harm a plaintiff must allege to satisfy the “injury in fact” requirement for lawsuits alleging false reporting of credit information took its latest turn this week. On Tuesday, August 15,...more

Delaware Amends Data Breach Statute

by Ballard Spahr LLP on

Delaware has joined the growing list of states that have recently amended their data breach laws. With passage of the first significant amendments to its data breach law since 2005, Delaware continues a state-law trend of...more

SELF DRIVE Act Moves Unanimously From House Subcommittee To The Full U.S. House Of Representatives

by King & Spalding on

On July 27, 2017, the U.S. House of Representatives Energy and Commerce Committee unanimously approved the Safely Ensuring Lives Future Deployment and Research In Vehicle Evolution Act, or SELF DRIVE Act, on a 54-0 vote. The...more

Another step forward filling in blanks in the cyber security law or more questions than answers?

by Hogan Lovells on

Another step forward filling in blanks in the cyber security law or more questions than answers? On 11 July 2017, the China Cyberspace Administration ("CAC") released the draft Key Security ("Draft Regulations") for public...more

Another Key to HIPAA Compliance – Have Policies and Procedures and Implement Them, Too

by Williams Mullen on

On this blog, we have discussed the criticality of risk analyses – the assessment required by the Security Rule of the “risks and vulnerabilities” that an organization faces with respect to all of its electronic protected...more

CareFirst Data Breach Appeal Holds Three Key Lessons For Cyberattack Litigants

by Cozen O'Connor on

A recent federal appellate decision suggests that it might be getting easier for cyberattack plaintiffs to establish standing in a manner sufficient to survive a motion to dismiss. According to the U.S. Court of Appeals for...more

August 2017 FCC Meeting Recap: FCC Proposes Changes to Broadband Data Collection

by Kelley Drye & Warren LLP on

At its August Open Meeting, the Federal Communications Commission (“FCC” or “Commission”) voted unanimously in favor of a Further Notice of Proposed Rulemaking (“FNPRM”) that explores ways to improve the value of data,...more

Cyber Claims in Mexico: A Reactionary Evolution of an Insurance Sector

by Zelle LLP on

In the wake of numerous cross-border, well-publicized cyber-attacks, cyber-insurance has quickly become a hot issue. This area has also become a trending topic because of the abrupt and quick need for response in a generally...more

Divided NLRB Rules Employer Policy Protecting Customer Information Is Lawful

Employers can prohibit the use by employees of the names, social security numbers and credit card numbers of customers in furtherance of organizational activities. If this seems like it should have been a foregone conclusion,...more

Mistake in Your Credit Report? The Latest Spokeo Decision Suggests You May Have A Case.

In the 9th Circuit’s August 15, 2017 decision in Robins v. Spokeo, the latest in the long-running legal debate about when a consumer cause of action exists for a data breach, the 9th Circuit has declared that inaccuracies in...more

SEC Issues Risk Alert To Improve Cybersecurity Readiness

by King & Spalding on

On August 7, 2017, the U.S. Securities and Exchange Commission (“SEC”) published a risk alert directed to the financial advisory industry, identifying cybersecurity vulnerabilities that could make the industry’s networks...more

DJI Reports Enhanced Data Privacy for its Drones

We posted last week about the U.S. Army issuing a memorandum banning the use of DJI drones due to security concerns, but now, this week DJI reports that it is developing a new local data mode that stops internet traffic to...more

UK government publishes Statement of Intent on new Data Protection Bill

by Dentons on

On 7 August 2017, the UK Department for Digital, Culture, Media & Sport (DCMS) published a Statement of Intent outlining proposals for a new UK Data Protection Bill (the Bill). This is the UK's preparation for the General...more

All You Need to Know About Flying Your Drone During the Solar Eclipse

Next week, on August 21, a solar eclipse (or the alignment of the sun, moon and earth) will take place for the first time in 38 years. The last time this cosmic event occurred, there were no battery-powered...more

Part Two: Abandoned Mines and Data Retention Policies

by McGuireWoods LLP on

As discussed in Tuesday’s post, in addition to taking reasonable precautions to secure data, companies should consider whether they have an affirmative duty to destroy data in the United States – to clear the explosives out...more

Hackers Surveyed On Their Favorite Ways To Access Your Data

by Fox Rothschild LLP on

Cybercrooks’ preferred path to critical data is through privileged accounts, those held by users who have broad access and powers within the target’s network. That’s according to a recent survey conducted by the...more

OCIE Observations from the Second Round of Cybersecurity Examinations

by K&L Gates LLP on

On August 7, 2017, the Securities and Exchange Commission’s (“SEC”) Office of Compliance Inspections and Examinations (“OCIE”) released a risk alert (the “Risk Alert”) summarizing observations from the second round of...more

SEC Cybersecurity Risk Alert Emphasizes Proactive Compliance and Ongoing Vigilance

by BakerHostetler on

On August 7, 2017, the Securities and Exchange Commission (SEC) released its latest cybersecurity risk alert, detailing findings from the examination of 75 broker-dealers, investment advisers and investment companies carried...more

NY Cybersecurity Regulations for Financial Services Companies: Enforcement Begins Aug. 28

by McGuireWoods LLP on

August 17, 2017 The 180-day transitional period under the New York Department of Financial Services (NYDFS) Cybersecurity Requirements for Financial Services Companies is set to expire Aug. 28, 2017. Financial services...more

GDPR Update: Data Processors (Dutch)

by Dentons on

In this GDPR Update we address the position of the data processor. The position of the data processor will be analysed from the perspective of the processor itself, as well as from the perspective of the data controller....more

GDPR Update: Data Processors

by Dentons on

Distinction between the data controller and the data processor - In this GDPR Update we address the position of the data processor. The position of the data processor will be analysed from the perspective of the processor...more

China’s Cyberspace Administration announces first state level investigations under Cybersecurity Law

by Dechert LLP on

China’s Cyberspace Administration announced that it has commenced investigations into Tencent Wechat, Sina Weibo and Baidu Tieba for violation of China’s Cybersecurity Law late last week (11 August 2017). More particularly,...more

Supreme Court to Review Digital Privacy (Part 2)

by Miles & Stockbridge P.C. on

In our previous installment, we looked at the issues related to Carpenter. That discussion can be found here. Another case involving the Stored Communications Act may also come before the U.S Supreme Court in the...more

FBI's Fraud Complaints Indicate Most Damaging Cyber Schemes

by GB&A Insurance on

A look at the FBI’s Internet Complaint Center indicates Business Email Compromise (also known as CEO Fraud and Social Engineering Fraud) topped the list of fraud complaints by a huge margin....more

16,446 Results
|
View per page
Page: of 658
Cybersecurity

Follow Privacy Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.