Privacy General Business

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Blog: How Student Privacy and California’s SOPIPA May Affect You

California recently passed the Student Online Personal Information Protection Act (“SOPIPA” a.k.a. “so-peep’-ah”), which is the first state law to comprehensively address student privacy and will be effective January 1, 2016....more

FCC Accepting Comments on ABA Petition to Exempt Data Breach Notification Requirements from the TCPA

On November 6, 2014, the Federal Communications Commission (“FCC”) issued a Public Notice requesting comments on a petition by the American Bankers Association (“ABA”) to exempt informational calls and texts to mobile devices...more

NIST Draft Guide Advances the Debate on Cybersecurity Issues

Private sector entities looking to comment on the draft should focus on its recommendations surrounding sharing communities, standardized transfer mechanisms, and the handling of corporate legal considerations....more

Hackers Don’t Care About the Terms of Your Insurance Policy - The Importance of Retroactive Dates and Extended Reporting Periods...

A recent study reports that the median amount of time between an intrusion into a company’s computer network and the discovery of the incident is 229 days. The difficulty and length of time in detecting cyber infiltrations...more

New FDA Cybersecurity Guidance for Medical Device Manufacturers

Last month, the U.S. Food and Drug Administration issued its final guidance, “Content of Premarket Submissions for Management of Cybersecurity in Medical Devices.” Those guidelines make non-binding recommendations on the...more

Boards Should Put Time and Resources into Cybersecurity Issues – It Is Good for Business and Works as a Defense Strategy

We have previously blogged about Commissioner Aguilar’s recommendations at a NYSE conference, “Cyber Risks and the Boardroom” on what boards of directors should do to ensure that their companies are appropriately considering...more

CASL 2.0: The Computer Program Provisions (Part 3)

The CRTC has released guidelines on the implementation of the incoming computer-program provisions of Canada’s Anti-Spam Law (CASL). Software vendors should review the CASL Requirements for Installing Computer Programs for...more

Bankruptcy Sales of Personally Identifiable Information: Does it Satisfy the Privacy Policy?

Companies that are looking to sell, transfer or buy personally identifiable information (“PII”) via bankruptcy asset sales would be wise to confirm that such a transfer is consistent with the debtor’s privacy policy. If it...more

Baker Botts Year-End Perspectives: Bart Showalter

This is the second in a series of six Q&As with Baker Botts partners addressing the most significant developments in their practice areas this year, as well as their outlook for 2015. The Q&As will be posted throughout the...more

Disputants Await Clarification of Mediation Privilege’s Boundaries

Today, Canadians are mediating their disputes in record numbers. One partial explanation for this phenomenon is that mediation purports to keep discussions between parties confidential, traditionally backstopped by settlement...more

Consumer Data Protection In Online Retail: On Protecting Privacy in the EU, US and China

Online retail presents unparalleled opportunities for reaching new consumer markets and collecting consumer data. With such opportunities, however, come heightened regulatory scrutiny, compounded by high-profile consumer data...more

FRANCE: What You Need to Know About the CNIL’s New Online Investigative Powers and Enforcement Goals

Earlier this year we reported on the new online investigative powers of the French Data Protection Authority (the “CNIL”). Whereas before CNIL agents could only conduct on-site inspections, since March 2014 they are...more

Automobile industry commits to privacy for connected cars

19 makers of cars and trucks sold in the US committed to preserve the privacy of their customers in the view of the massive amount of personal data that are going to be processed through connected cars. ...more

BlackEnergy Malware Highlights Special Confidentiality Considerations in Critical Infrastructure Breach Investigations

On October 29, 2014, Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (“ICS-CERT”) published an important alert regarding a particularly destructive advanced persistent threat (“APT”)...more

The Enemy Within: How To Better Protect Yourself From Technological Evils

Trekkies and modest Star Trek fans may recall the plot in an episode known as “The Enemy Within” where a malfunction in a transporter causes Captain Kirk to be split into two - a good Captain Kirk and an evil Captain Kirk....more

Five Cyber Security Takeaways from the Mid-Term Elections

While not a much-discussed topic during campaign season, federal policy on cyber-security will likely see some material changes as a result of a Republican-controlled Senate. Just how significant those changes will be has yet...more

Big Data Series: Part 1: Privacy - “Big Data is not a game played by different rules”

Big data is now big business. In recent years, due to the exponential growth in the capability of technology to undertake data analytics on a massive scale, organisations have started to appreciate the potential hidden value...more

Client Alert: Florida Information Protection Act of 2014 - One Of The Strictest Data Breach Statutes in the Nation

If your business stores personal information of Florida Residents, you must be aware of a new Florida statute that has created specific reporting requirements in the case of a data breach. Failure to comply can result in...more

Nevada Secretary Of State Denies Hacking Claim

Recently, Cytta Corp., a small Nevada corporation, filed this Form 8-K reporting that it had “discovered that it was the victim of an online hacking incident on October 30th, 2014 in that, unauthorized person or persons...more

Top 5 takeaways on connected cars

Here are the main legal topics on connected cars covered during the Connected Automobiles conference where I gave a presentation named “Privacy and regulations: state-of-the-art and future issues” on legal issues relating to...more

Corrective Action Earns Verizon End to FTC’s FiOS Router Investigation

Corrective action taken by Verizon Communications to fix security issues with its FiOS and DSL routers resulted in the FTC closing its investigation to determine whether Verizon’s distribution of the routers was an unfair or...more

The Secret Is Out: The Documentary Transfer Tax Will Now Be Part of Public Record

The Documentary Transfer Tax Act allows each county and city to impose a tax on each deed, instrument, or writing by which any real estate is sold within the county at the time the document is recorded. Assembly Bill No....more

Drone on Drones: “Amazon Air” Testing Takes Off in the U.K.

Last year, Amazon raised eyebrows in a now-famous announcement that it was considering launching a same-day delivery service for certain products through the air, using quadcopter drones. At the time, many in the tech and...more

European DPA’s Give Privacy Recommendations to Stakeholders Regarding the “Internet of Things”

The Article 29 Working Party, which is composed of representatives of DPA’s from every European country, has recently rendered an opinion on data privacy issues surrounding the development of the “Internet of Things” (IoT),...more

California Expands Data Breach Law

On September 30, 2014, California Governor Jerry Brown signed into law AB 1710, a bill which expands California’s existing data breach laws. As we discuss in further detail below, the new laws introduce substantive...more

1,772 Results
|
View per page
Page: of 71

Follow Privacy Updates on: