Privacy Communications & Media Business Organization

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Popular Cybersecurity Reads on JD Supra

Once more the breach? A recap of some of the most well-read Cybsersecurity publications on JD Supra during August, 2015....more

“Pocket-Dial” Mobile Phone Calls: Private or Not?

If you accidentally “pocket dial” someone on your mobile phone, do you have a reasonable expectation of privacy about what’s said in that call? Here’s how courts looked at this issue recently. What Happened? James Huff...more

Popular Cybersecurity Reads on JD Supra

From latest data breach laws to cyber liability insurance to the FTC's consumer data safety guidance ... a recap of popular cybersecurity reads on JD Supra during the second half of July 2015....more

Advertising and Marketing News from Ifrah Law’s FTCBeat.com, Volume 6

Internet Advertising and Marketing Summer Newsletter from Ifrah Law with updates you won't want to miss!...more

Largest Breach in U.S. Government History Is a Wake-Up Call on Need for Encryption

Employees are reasonable in assuming that their employer is protecting their personal information from compromise. The obvious way to do that is to maintain appropriate encryption technology. Simply put: encryption,...more

Mobile Apps & the Law - Popular Reads on JD Supra

ICYMI a recap of recent well-read posts on JD Supra at the intersection of mobile apps and the law....more

A Deeper Dive: Risk Assessments Are a Necessary Step in Creating Layered Cyber Defenses

Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more

How to Avoid Choosing the Wrong Cybersecurity Firm

Although the inherent nature of cybersecurity radiates urgency, businesses should not let this characteristic dictate the vendor selection process....more

Rise of the Video Vigilantes: Handling Secret Workplace Recordings

Video vigilantes are on the rise, and their recordings can quickly go viral. What should employers do to prepare for, handle and prevent covert recordings made in the workplace? Just a few short years ago HR and...more

BakerHostetler Data Security Incident Response Report Shows Human Error is More Often to Blame

Human error was the number one cause of data security incidents according to a new report released today by the Privacy and Data Protection Team at BakerHostetler. In the incidents that the firm worked on last year, employee...more

Information Sharing Can Help Fortify Your Cybersecurity Strategy

Having strong cybersecurity policies is critical for protecting a company's business, as the amount of commerce conducted over networks and the Internet increases each year. Last month the Congressional Research Service...more

[Event] March Madness: Cyber Liability & Mitigating Risk - Mar. 19, San Diego, CA

The stakes are getting higher regarding cybersecurity. However, there are several steps organizations can take to protect against cybersecurity data breaches. Further, taking these steps can protect companies in the context...more

No Captain at the Helm: Information Governance’s Leadership Problem

Effective information governance is about taking information — your most important business asset — and looking at ways to better leverage it in a manner that streamlines the business processes, and reduces costs and risk....more

Russian Cyberattack May Trigger State Security Laws And Notification Obligations

Now that entities are aware that at least 1.2 billion records have been compromised from websites spanning across all industries, a question arises whether entities have an obligation to investigate whether their websites...more

5 Next Steps For Companies After News of Massive Russian Data Breach

Before taking any action on this latest data breach news out of Russia, there are a number of things to understand....more

The Great Russian Internet Heist – What Now?

A breach of this nature is reportable under the breach notification laws in both California and Florida, as recently amended: “Personal Information” includes user name or email address, in combination with a password or...more

Last Minute Uncertainty for Registered Charities Under Canada’s Anti-Spam Law

Canadian registered charities seeking to comply with Canada’s new anti-spam law (CASL) recently received some disappointing news. CASL is a very complex law and many important issues remain ambiguous and uncertain. Several...more

Popular Reads: On Google, the EU, and the Right to be Forgotten

A recap of most popular writings on the recent European Court Ruling that Google must allow citizens the right to be forgotten....more

When Tech Innovation Outpaces the Law, A Minefield Of Workplace Issues in Social Media

Part of JD Supra's series on innovation and the law. The NLRB has famously struck down employers’ social media policies based on a law that was adopted during the New Deal and has not been amended since....more

The Heartbleed Lesson for All Companies? Manage the Risk...

Threats to data privacy are not going away, but establishing appropriate security measures up-front, performing regular stress-tests on a security system, putting in place procedures to address a data breach and implementing...more

First Glance: Legal Implications of the Heartbleed OpenSSL Bug?

The vulnerability caused by the Heartbleed bug circumvents the purpose of OpenSSL: encryption. Therefore, the conclusion would appear to be that any data breach during the time of OpenSSL vulnerability would be reportable...more

What to do if you think your company has had a data breach... [Video]

If you think your company may have had a data breach, you need to see this video!...more

What you need to know about Canada's new Anti-Spam Law (CASL) [Video]

Bennett Jones launches Canadian Anti-Spam Information Site TORONTO, January 22, 2014 – In response to the long-awaited regulations pertaining to the Canadian government's anti-spam legislation, Bill C-28, Bennett Jones LLP...more

Whose Social Media Account Is It, Anyway?

A detailed social media policy specifically addressing the ownership of social media accounts is key to a corporation’s ability to maintain ownership of an employee’s account after the employee leaves the corporation....more

Big Regulation’s Big Data

In March 2012, the Obama Administration announced its Big Data Research and Development Initiative. The program involves a total of over $200 million in new commitments from several departments and agencies to improve the...more

56 Results
|
View per page
Page: of 3

Follow Privacy Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×