News & Analysis as of

Privacy Communications & Media

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:

Certiorari Grant This Week on Email Providers Served with Warrant for Emails

by Dorsey & Whitney LLP on

The Internet has not only become a backbone for social and business commerce, but, it has become a vehicle to pursue nefarious purposes. Law enforcement and intelligence agencies, believing that material evidence is located...more

Supreme Court to Hear Microsoft Emails Case

In an order issued on October 16, 2017, the U.S. Supreme Court granted certiorari in United States v. Microsoft Corporation, a case with potentially far-reaching implications for the privacy of electronic data maintained by...more

Automated Decision-Making Under the GDPR – A Right for Individuals or A Prohibition for Controllers?

by Hogan Lovells on

The complexity of the EU General Data Protection Regulation (“GDPR”) is often alleviated by the guidance of regulatory authorities who contribute their practical interpretation of the black letter of the law and provide...more

“KRACK” WiFi Security Vulnerability Discovered

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks....more

The Katten Kattwalk - Issue 14

by Katten Muchin Rosenman LLP on

Disputes Between Departing Member and Remnant Group - In Lyons vs. American College of Veterinary Sports Medicine and Rehabilitation, the US Court of Appeals for the Federal Circuit addressed a dispute regarding the proper...more

Cybersecurity Awareness: Limiting Your Exposure and Visibility

We spend so much time on our mobile phones and on social media, yet often we don’t think of how these tools are broadcasting our lives as we work and play. With just a few steps, you can limit what you are digitally telling...more

Data Privacy + Cybersecurity Insider - October 2017 #2

by Robinson & Cole LLP on

FBI Issues Flash Alert on Apache Struts Vulnerability - The Apache Struts vulnerability has been mentioned frequently in the media over the past month, as it is believed to have been involved in one of the largest and most...more

Is it HIPAA or HIPPA? Either way, it still applies.

by Winstead PC on

I have negotiated hundreds of SaaS agreements for dozens of software companies and I always hated when the company on the other side was a healthcare provider. Invariably, they would bring up Protected Health Information...more

Justices to Hear DOJ Appeal on Microsoft Ruling: Is Email Stored Abroad Subject to a U.S. Warrant?

The Supreme Court is poised to finally answer the question that’s been plaguing federal courts across the country: must U.S. tech companies comply with warrants issued under the Stored Communications Act (“SCA”) that demand...more

Supreme Court Denies Appeals of Notable Data Scraping, Computer Fraud Decisions from Ninth Circuit

This past week, the Supreme Court denied the petitions for certiorari in two noteworthy Ninth Circuit decisions that had interpreted the scope of liability under the federal Computer Fraud and Abuse Act (CFAA) in the context...more

FTC’s “Stick With Security” #5: Segment Your Network And Monitor Who’s Trying To Get In And Out

by Snell & Wilmer on

On August 25, 2017, the FTC released its fifth “Stick with Security” principal, which focused on how companies can protect their virtual “entrances and exits” and make life harder for hackers. The FTC believes that the...more

FTC’s “Stick With Security” #4: Store Sensitive Information Securely & Protect It During Transmission

by Snell & Wilmer on

On August 18, 2017, the FTC released its fourth “Stick with Security” principle, which explained the importance of keeping confidential data only when needed, and securely storing the data when it must be kept. To that end,...more

Vermont AG Settles with SAManage for $264,000 for Delayed Breach Notification

The Vermont Attorney General (AG) recently announced that it has settled with SAManage USA, a business support services company, for failing to timely notify 660 Vermont residents that their names and Social Security numbers...more

Business Associate Resold Fax Machine Containing PHI

Fax machines are still used in the medical community, and these days, faxing may be more secure than emailing as hackers have not yet cracked the task of hacking into old fax machines. All kidding aside, fax machines have...more

Supreme Court Refuses to Hear Password-Sharing Case, Leaving Scope of Criminal Liability Under Computer Fraud and Abuse Act...

by Seyfarth Shaw LLP on

On Tuesday, October 10, 2017, the United States Supreme Court denied certiorari in Nosal v. United States, 16-1344. Nosal asked the Court to determine whether a person violates the Computer Fraud and Abuse Act’s prohibition...more

FTC’s “Stick With Security” #3: Require Secure Passwords and Authentication

by Snell & Wilmer on

On August 11, 2017, the FTC released its third “Stick with Security” principle, which touched on the necessity of strong authentication practices. Secure passwords and fortified authentication practices make it that much...more

FTC’s “Stick With Security” #2: Control Access to Data Sensibly

by Snell & Wilmer on

On August 4, 2017, the FTC released its second “Stick with Security” principle, which addressed the next step a company should take after it has identified confidential data in its possession and determined what information...more

Much-Needed TCPA Reform Would Support Small Businesses and Spur Economic Benefits

by Hogan Lovells on

Growing evidence suggests that existing Telephone Consumer Protection Act (“TCPA”) compliance challenges, and the current TCPA litigation landscape, are increasingly a threat to many U.S. companies – particularly small...more

Monthly TCPA Digest - September 2017

by Mintz Levin on

Ready for good news about TCPA litigation? In this edition of our Monthly TCPA Digest — providing insights on Telephone Consumer Protection Act (TCPA) cases and regulations — we point to a glimmer of hope for businesses....more

Two End-of-Year Federal Government Deadlines Approaching

by McNair Law Firm, P.A. on

Significant Changes to Online Copyright (DMCA) Safe Harbor and DoD Contractor Cybersecurity (NIST 800-171) Requirements Take Effect at the End of This Year. Important Change Affecting Digital Millennium Copyright Act...more

“I’m Unavailable to Take Your Advertisement Right Now”: FCC Regulation of Direct-To-Voicemail Marketing

by Robins Kaplan LLP on

The days of lamenting the dinnertime telemarketing call seem to have faded, but as communication technology ? particularly cell phone and smartphone usage ? has become ubiquitous, advertisers have found new avenues to...more

Securing Your Home’s Digital Entry Points

We’re all concerned with our home’s physical security, but so often we forget to pay the same amount of attention to our digital security. However, leaving your home’s digital entry points open is like leaving your front door...more

BB&K Wins Dismissal of Anti-Spam Suit - Case Demonstrates Ongoing Abuse of the Law Against Email Companies

by Best Best & Krieger LLP on

Best Best & Krieger LLP attorneys Damian Moos and Daniel Richards won dismissal of federal unlawful email advertising lawsuit against a webmail service company that was wrongly targeted. U.S. District Court Judge Maxine...more

McAfee Report Lists Health Care Sector as Most Targeted Industry for Cyber-Attacks

In its cyber security incident report outlining vulnerabilities for the second quarter of 2017, security firm McAfee lists the health care sector as having suffered the most security incidents, which surpasses the public...more

Hackers Score Touchdown: NFL Players Association Hit With Data Breach

A data breach of the National Football League Players Association’s (“NFLPA”) website has exposed the personal information of nearly 1,200 players and agents....more

4,352 Results
|
View per page
Page: of 175
Cybersecurity

Follow Privacy Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.