Privacy Updates

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Employment Law Reporter - May 2016

The Age of The Data Breach : The Top 5 Best Practices - What will you do? We live in The Information Age. Increasingly, business success depends on the ability to obtain, maintain and intelligently utilize increasing...more

Senate hearing reviews ransomware in a school system

On May 18, the Senate Judiciary Committee Subcommittee on Crime and Terrorism heard from Charles C. Hucks, the Executive Director of Technology for the Horry County, South Carolina, School System. The 52 schools and the...more

Data Breaches: Are You Ready (for the inevitable)?

In 2015, identity theft occurred every two seconds, disrupting the lives of 13.1 million people, according to Javelin Strategy and Research. Year after year, U.S. data breaches have hit record highs, reports the Identity...more

Safe or Good? We All Have Choices to Make

I planned to write about the inspired, better-than-sliced-bread security option of using fingerprint authentication to protect our mobile devices. That imploded. In 2014, and earlier this year, courts in Virginia and...more

Also In the News - Data, Privacy, & Security Practice Report - May 2016 #2

K&S Client Alert: Third Try Is A Charm: Defend Trade Secrets Act Of 2015 Enacted Into Law—For the third consecutive year, Congress introduced legislation to create a federal civil cause of action for trade secret...more

Defence & Indemnity - April 2016: IV. PRACTICE ISSUES B.

B. Do police need a warrant to access the data on a vehicle’s airbag control module without the owner or driver’s permission? R. v. Fedan, 2016 BCCA 26, per Smith, J.A. [4176]...more

How to Draft an Effective Data Breach Incident Response Plan

The best way to handle any emergency is to be prepared. When it comes to data breaches, incident response plans are the first step organizations take to prepare. Furthermore, many organizations are required to maintain one....more

Europe Is Shifting, And It’s a Big Deal – The New GDPR

The clock is now ticking. On May 4th the European Parliament published the final text of the General Data Protection Regulation (“GDPR”), and the rules of the game have significantly changed – at least in the context of EU...more

Employee Data Security: Perquisite or Prerequisite?

One of the many costs of doing business in this day and age is the threat of a data breach. In the past several years data breach incidents have occurred with increasing frequency. From Target to eBay and Sony to Ashley...more

Mobile apps under close watch of the Kong Kong Privacy Commissioner

The Hong Kong Privacy Commissioner has taken a keen interest in promoting and ensuring the privacy compliance and security of mobile apps. On 21 April 2016, the Office of the Privacy Commissioner for Personal Data (the PCPD)...more

Liability of Cloud-Based Service Provider For Data Breach

Silverpop Systems provides digital marketing services through a cloud-based tool called ‘Engage’. Leading Market Technologies, Inc. (“LMT”) engaged Silverpop through a service agreement and during the course of that agreement...more

Illinois Enacts Sweeping Changes to the Illinois Personal Information Protection Act

On May 6, 2016, Illinois joined a growing number of states that have strengthened their data breach notification requirements and expanded the definition of protected personal information. Effective January 1, 2017, HB1260...more

Important Issues are yet to be corrected in the Right to be Forgotten

The recognition by the European Union of a “Right to be Forgotten” has caused much controversy, but seemingly progress is being made. The Right, which entitles Europeans to petition data controllers to prevent harmful...more

Recommendations for Evaluating Your Organization’s Use of Social Media

The majority of organizations utilize social media to market their products and services, interact with consumers, and manage their brand identity. Many mobile applications and websites even permit users to sign-in with their...more

FDA issues guidance on the use of EHRs in clinical investigations

The U.S. Food and Drug Administration (FDA) just issued draft guidance on the Use of Electronic Health Record Data in Clinical Investigations for comment within the next 60 days. The guidance is intended to assist all...more

Think you’re covered? Think again

Commercial General Liability policies (CGL) typically do not include data protection loss coverage, although some insurers offer additional data protection endorsements. Normally those additional endorsements only cover data...more

Will Spokeo Impact Standing In Data Breach Cases?

Despite months of anticipation, the majority opinion in Spokeo, Inc. v. Robins reads more like a teacher (the Supreme Court) telling a student (the Ninth Circuit) to go back and show the work behind a long division answer...more

Dual Decisions Provide Narrow Path for Plaintiffs to Establish Standing in Data Breach and Cybersecurity Suits

Last week, decisions by the United States Supreme Court and the Northern District of Georgia provided further guidance regarding the narrow path required for a class action plaintiff to successfully establish Article III...more

A Weak Link In Financial Data Security? Congress Presses FDIC On Its Data Breach Prevention And Response

On Thursday, May 12, the House of Representatives’ Science, Space, and Technology Committee scrutinized the FDIC’s data, privacy and security measures and response plans in a hearing, after the FDIC suffered a spate of data...more

Competitors in the Courtroom: When to Exclude a Party’s Designated Representative from Hearing a Competitor’s Trade Secrets

“You sued them. They stay, period.” This is the conclusion a Texas trial court came to when asked to exclude the designated representative of a party from a hearing where an employee of the other party, a direct competitor,...more

Check Your Inbox: OCR Continues to Verify Entity Contact Information for Phase 2 HIPAA Audits

Covered Entities need to continue to check their inboxes for emails from the HHS Office for Civil Rights (“OCR”) requesting verification of contact information in connection with Phase 2 of the HIPAA Audit Program. OCR...more

Federal Defend Trade Secrets Act Takes Effect

Employers Should Immediately Revise Confidentiality Agreements to Comply - The Defend Trade Secrets Act, signed into law by President Obama last week and effective immediately, provides a new federal remedy for trade...more

Tough New EU-Wide Cybersecurity Rules in Prospect: The Network and Information Security Directive

Two-thirds of large UK companies have come under cyber attack in the past year, according to the UK Government, and a quarter have been attacked at least once a month. But only half have taken any recommended actions to...more

Privacy Tip #35 – Employees still careless—don’t be that employee

According to a study by Softchoice, 1-in-5 employees still keep their passwords in plain sight (like a Post-it Note on their desk or in the top drawer of their desk—now that’s original), have accessed work files from a device...more

Supreme Court: ‘Actual Injury’ Needed to Establish Standing to Sue for Violations of Fair Credit Reporting Act

Plaintiffs must show they suffered from an actual injury, not just a “bare procedural violation,” in order to sue in federal court, the U.S. Supreme Court has ruled in its long-awaited decision in Spokeo, Inc. v. Robins, No....more

12,736 Results
|
View per page
Page: of 510

Follow Privacy Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×