Privacy General Business Science, Computers & Technology

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Washington Amends its State Data Breach Notification Law

On April 13, the Washington State Senate unanimously passed an amendment to the state’s data breach notification law. The amendment, which was requested by Washington Attorney General Bob Ferguson, and which we discussed in...more

UPDATE: Target Confirms It Has Negotiated A $19 Million Data Breach Settlement With MasterCard

Target confirmed a report in the Wednesday edition of The Wall Street Journal of a settlement with MasterCard concerning claims of card-issuers arising from Target’s 2013 data breach. The data breach, which occurred during...more

FTC Scrutinizes Two Companies For Falsely Reporting Compliance With E.U. Safe Harbor In Privacy Policies

On April 7, 2015, the Federal Trade Commission (“FTC”) announced that two companies have agreed to settle claims that the companies failed to update their privacy policies to reflect lapsed compliance with the U.S.-E.U. and...more

Legal Departments: New PCI DSS Requirements Mandatory in June

PCI Council publishes new PCI Data Security Standard Version 3.1 and provides very short time to implement new encryption standards. The PCI Council just published a new version of the PCI Data Security Standard (PCI...more

Significant Guidance Released Regarding HIPAA Compliance

The Office of the National Coordinator for Health IT (ONC) released an updated version of the 2011 Guide to Privacy and Security of Electronic Health Information (Guide). The 62-page Guide provides significant guidance to...more

Consumer Protection and Your Business

You’ve been hearing for a while now that the regulatory environment has been changing, and you follow the Consumer Financial Protection Bureau (“CFPB”) alerts to see if this new regulator will be looking at your type of...more

Into the Breach: Tips for Effectively Partnering With Outside Counsel in the Data Breach Planning Process

Target recently announced that the total cost of its data breach response efforts since late 2013 now exceeds $252 million (approximately $90 million of that has been offset by insurance proceeds). Such news, particularly...more

New Executive Order Authorizes Economic Sanctions to Combat Malicious Cyber Activity

Calling cyber threats “one of the most serious economic and national security challenges to the United States” and declaring a national emergency relating to those threats, on April 1, 2015, President Obama issued an...more

NJ Connected Car law changes the landscape of IoT

The recent approval by New Jersey of a law on the ownership of data generated by connected cars might have an impact on the future of the Internet of Things (IoT) providing an interesting approach also for European privacy...more

Alert: How businesses can prepare for the Russian data protection law

In July 2014 President Putin approved Federal Law No. 242-FZ ("On Amendments to Certain Laws of the Russian Federation in Order to Clarify the Procedure for Personal Data Processing in Information and Telecommunications...more

New PCI Tokenization Guidelines

Last week, the Payment Card Industry Security Standards Council released new guidelines related to the security of tokenization products. The guidelines are a set of technical best practices for evaluating tokenization...more

Intellectual Property and Technology News

In This Issue: - Biosimilars In The US - Introducing Cybertrak - Free and Open Source Compliance: Action Steps - Falling Prices At The Pump - Put A Premium On Energy IP - Supreme Court Corner - Excerpt...more

Huge Settlement in Massive Data Breach, But Will It Help?

Remember the massive data breach incident at Target stores during the holiday season of 2013? It resulted in a huge class action suit that may soon be settled for $10 million. Could this be the cautionary tale to get...more

Guard Your Sheep, The Dyre Wolf is Coming

IBM announced this week that it had uncovered a highly-sophisticated scheme to steal funds from medium to large U.S.-based companies. The scheme dubbed “The Dyre Wolf” only targets companies, unlike past schemes which also...more

Protecting the Data Lode: NAIC Addresses Cybersecurity

With cyber-attacks and data breaches making frequent headlines, the NAIC in November 2014 took steps to promote protection of insurance industry information by creating the Cybersecurity (EX) Task Force. The task force will...more

Cloudy Forecasts in New Russia Data Privacy Law

Russia recently announced it has moved the effective date of the new Russian data residency law to September 1, 2015—less than six months from now. Federal Law No. 242-FZ (the “Data Localization Law”) creates a new obligation...more

NYDFS to Collect Data on Cyber Security, but Could Hackers Use This Database as a Road Map to Launch Targeted Attacks?

On March 26, 2015, the New York State Department of Financial Services (NYDFS) announced that it is broadening the scope of questions and topics in its current information technology (IT) examination framework. In addition,...more

Congress Makes Progress On Legislation To Encourage Cyber Threat Information Sharing

In the past few weeks, Congress has made notable progress towards passage of legislation to address the sharing of cybersecurity threat information. On March 18, the Senate Select Committee on Intelligence approved the...more

Seven Training Imperatives to Address Your Biggest Cyber Security Risk: Employee Behavior

One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization. There are pros and cons to the digital world that we all live in. Pros include...more

You are What You Keep

Suffering a data breach is bad enough. As often as it appears to happen, companies that are affected by a breach still shoulder a considerable burden. Management must stop the trains to identify the cause and scope of the...more

Cyber Extortion: What to Do When Your Data is Being Held for Ransom

Imagine you are the IT systems administrator of a large corporation. Coffee in hand, you sit down one morning and log in. You receive a message that there has been an intrusion into the corporate database, a large amount of...more

Locke Lord QuickStudy: Montana and Wyoming Update Data Breach Laws

Montana and Wyoming have recently revised their data breach notification laws including their definitions of what constitutes Personally Identifiable Information (PII) subject to breach notification. ...more

Delaware’s “Computer Security Breaches” Law Needs an Overhaul

I suspect this may surprise most Delawareans. In 2005, Delaware Governor Ruth Ann Minner signed into law House Bill 116. That bill, now codified as 6 Del. C. §§ 12B-101 et seq., requires individuals or commercial entities,...more

Cloud Data Security Standards Reach New Heights?

Issues of data privacy and security are central to most cloud contract negotiations. While cloud service providers may be willing to take responsibility for the integrity of their networks, accepting obligations in relation...more

10 Tips for Fostering a Business Culture of Cybersecurity Awareness

Businesses are recognizing the need for new approaches to data security as high-profile cybersecurity incidents reveal the true impact a data breach can have on an organization. One of the biggest realizations is that IT...more

1,336 Results
|
View per page
Page: of 54

Follow Privacy Updates on:

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×