News & Analysis as of

Privacy Consumer Protection Science, Computers & Technology

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:

Privacy Perils: Strong Passwords IV: The Phrase Awakens

by Bass, Berry & Sims PLC on

Previous Tips have warned of the use of easily-guessed passwords, and have provided suggested methods to strengthen them, including use of...more

Self-Sovereign Identity and Distributed Ledger Technology : Framing the Legal Issues

by Perkins Coie on

Purpose - Distributed ledger technology (“DLT”), including the use of blockchain technology, has been touted as a way to create and validate digital identities that serve many of the same purposes that physical forms of...more

The FTC Seeks Comment: How Trusty Is The TRUSTe Plan For COPPA Certification?

by King & Spalding on

The Federal Trade Commission (FTC) is currently seeking comment on proposed changes to TRUSTe’s safe harbor program under the agency’s Children’s Online Privacy Protection Rule (COPPA). Per the Federal Register notice, the...more

Are Healthcare Systems Being Held Hostage by Ransomware?

by Revision Legal on

Healthcare ransomware is one of the biggest cybersecurity concerns in existence and it may have particularly serious implications for healthcare systems. Ransomware is a form of malicious software code that is somehow...more

Is the Government Protecting Your Private Information?

by Reed Smith on

We were not affected by the recent ransomware attack that disabled computers worldwide, including in multiple public hospitals in the UK. At least not yet. For those who have never had the pleasure or who otherwise do not...more

Data Security Under Commissioner Ohlhausen: What You Need to Know

The Federal Trade Commission (FTC) has been a critically important regulator of cybersecurity practices in the US, using its authority under Section 5 of the FTC Act to bring enforcement actions against companies for failing...more

Australia And China Establish Cybersecurity Agreement

by King & Spalding on

On April 21, 2017, Australia and China forged an agreement to expand their cybersecurity cooperation. This agreement emerged as part of the Australia-China High-Level Security Dialogue held in Sydney. ...more

Cybersecurity, A-Z: C is for CFAA

The Computer Fraud and Abuse Act, or CFAA, is the federal “anti-hacking” statute (or sometimes referred to as a “computer trespass” statute). In essence, the CFAA prohibits intentional unauthorized access into another...more

NIST Plans To Examine Internet of Things (IoT) For Its Cybersecurity Framework

by Dentons on

The National Institute of Standards and Technology (NIST) is holding a Cybersecurity Framework Workshop this week at its headquarters in Gaithersburg, Maryland. The purpose of the workshop is to discuss issues related to its...more

Yesterday, #WannaCry. Today, #DocuSignPhish

Another day, another data incident. If you use DocuSign, you’ll want to pay attention. The provider of e-signature technology has acknowledged a data breach incident in which an unauthorized third party gained access to...more

President Trump Signs Executive Order Holding Agency Directors Accountable for Cybersecurity

Five months after rejecting a less detailed executive order on cybersecurity, Trump signed one on May 11, 2017 (Order). The Order notifies federal agencies that the “President will hold heads of executive departments and...more

Senator To Propose ISP Consumer Privacy Bill

by King & Spalding on

On Friday, April 14, 2017, Senator Richard Blumenthal (D-Conn.) announced his plan to introduce a bill that would allow the Federal Trade Commission (“FTC”) to regulate consumer privacy protections regarding Internet service...more

Personal Data Held by Government Agencies Now Heavily Protected in Mexico

by Jones Day on

On January 27, 2017, Mexico's General Law on the Protection of Personal Data Held by Regulated Subjects ("Law") became effective. The Law establishes procedures to protect personal data held by government agencies and other...more

Standing hurdles continue to bedevil data breach plaintiffs

Plaintiffs presenting a claim in federal court must have standing to sue, under Article III of the Constitution (as we have written about in the past). The Second Circuit recently entered an order reminding plaintiffs,...more

Offer of Judgment Fails to Defeat TCPA Fax Class Action

by Klein Moynihan Turco LLP on

On May 8, 2017, the United States District Court for the Southern District of New York issued a ruling rejecting Educational Testing Service’s (“ETS”) attempt to moot a class action brought pursuant to the Telephone Consumer...more

The New Cybersecurity Executive Order: What It Does and When

“Will the President sign it?” I asked in a recent post. As if in direct answer, the President issued the order the same day , May 11, 2017. The order is titled Strengthening the Cybersecurity of Federal Networks and Critical...more

“If You Are Reading This, You Probably Weren’t Hacked Last Week” – So Now What?

First, the basic facts about the recent ransomware attack: ..US-CERT has received multiple reports of WannaCry ransomware infections in several countries around the world. ..Ransomware is a type of malicious software that...more

Employment Law Navigator – Week in Review: May 2017 #3

by Zelle LLP on

On Friday of last week, a ransomware cyberattack struck 45,000 targets in 74 countries, including organizations such as FedEx, Telefonica, and the UK’s National Health Service, which cancelled operations and diverted patients...more

Is the May 12 Massive Ransomware Attack a Turning Point?

Those “in the know” in the cybersecurity world have been aware for more than a year of the threat posed by ransomware, a type of malware that locks victims’ access to their files until they pay a ransom. But discussion of...more

The First 24 Hours: How to Prepare and Respond to a Major Cybersecurity Attack

by McDermott Will & Emery on

In today’s digital age, data privacy and security incident response plans are critical. Companies need to have a well-designed cybersecurity plan to protect their systems from attacks and respond to a crisis when they are...more

New York Attorney General Announces Settlements with Three Mobile Health Application Developers

by Jones Day on

New York has made a mark on the regulatory and enforcement landscape for mobile health applications ("mobile health app") with the New York Attorney General's ("NY AG") March 23, 2017, announcement of settlements with three...more

New Mexico Enacts New Data Breach Notification Laws

by Revision Legal on

New Mexico recently became the 48th state in the US to adopt data breach notification laws. The new laws take effect June 16, 2017 and will apply in all situations in which a data breach occurs, i.e., an unauthorized attempt...more

State Data Breach Notification Laws

by Foley & Lardner LLP on

While most state data breach notification statutes contain similar components, there are important differences, meaning a one-size-fits-all approach to notification will not suffice. What’s more, as data breaches continue to...more

New Mexico Enacts Data Breach Notification Law

by King & Spalding on

On April 6, 2017, New Mexico became the 48th state to enact a data breach notification law; the Data Breach Notification Act (the “Act”) will go into effect on June 16, 2017. The good news for many in the health care...more

FTC Launches Website to Help Small Businesses with Cyber Attacks

The Federal Trade Commission (FTC) announced on May 9, 2017, that it has launched a new website that “helps small businesses avoid scams and cyber-attacks.”...more

3,757 Results
|
View per page
Page: of 151
Cybersecurity

Follow Privacy Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!