News & Analysis as of

Privacy Science, Computers & Technology

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:

HIPAA and the Cloud’s Shared Responsibility Models

by Snell & Wilmer on

Cloud-based service providers (CSPs), like Amazon Web Services and Microsoft Azure, offer online access to shared computing resources. As such, they have developed a “shared responsibility model” for how CSPs and companies...more

New Mexico becomes 48th state to enact data breach notification law

by Ballard Spahr LLP on

New Mexico recently became the 48th state to enact a data breach notification law. This continues the accelerated pace of state data breach legislative activity in the last two years. Since 2015, at least 41 states have...more

St. Jude Medical On Hot Seat for Cybersecurity Flaws in Home Monitoring System

The Food and Drug Administration (FDA) recently issued a warning letter to St. Jude Medical, alleging that it failed to properly investigate issues with the batteries in its defibrillator implants and for failing to fix the...more

WIPO: Cybersquatting reaches all-time high with the introduction of new gTLDs

by Hogan Lovells on

The World Intellectual Property Organization (WIPO), the United Nations agency based in Geneva that administers the Uniform Domain Name Dispute Resolution Policy (UDRP), issued a press release last month revealing that...more

App Privacy Litigation Settles For $5.3 Million

by King & Spalding on

Several major app developers, including Twitter, Facebook, Instagram, and Yelp, settled a putative class action pending in California federal court last week. The app companies have agreed to pay a consolidated $5.3 million...more

Importance of State AGs in Privacy in the United States – Interview of CT AG George Jepsen by Professor Danielle Citron at IAPP...

by Reed Smith on

Notwithstanding potential changes to privacy regulation at the federal level, state attorneys general (AGs) will continue to be robust and influential privacy policymakers and enforcers in the United States – that was the key...more

Mobile Wallets and Tokenization: Banks are Catching On

by Bryan Cave on

On April 20, 2017, the American Banker reported that U.S. Bank’s new high-end credit card features an interesting differentiator from the high-end cards recently introduced by other large credit card issuers. U.S. Bank’s new...more

ACC Issues Data Security Guidelines for In-House Counsel to Evaluate Law Firms

The Association of Corporate Counsel (ACC) has issued its first-ever data security guidelines, which outline basic data security measures that in-house counsel can use to evaluate their outside counsel....more

Medical Supply Company Hit with Class Action TCPA Fax Lawsuit

by Klein Moynihan Turco LLP on

A class action fax lawsuit has been filed against a medical supply company in the federal district court for the Southern District of Illinois. The plaintiff seeks to represent a nationwide class of persons and entities who...more

Lawmakers Push FCC To Confront Cell Phone Cyber Threats

by King & Spalding on

In a letter dated March 28, 2017, Senator Ron Wyden, D-Ore., and Representative Ted Lieu, D-Calif., urged the Federal Communications Commission (“FCC”) to address cybersecurity vulnerabilities in the cell phone industry,...more

China's draft data localisation measures open for comment

by Hogan Lovells on

On 11 April 2017 the Cyberspace Administration of China published a circular calling for comments on its draft Security Assessment for Personal Information and Important Data Transmitted Outside of the People’s Republic of...more

Chinese Government Releases Overreaching Draft Regulations on Cross-Border Data Transfer

by Davis Wright Tremaine LLP on

The Cyber Security Law was adopted in November 2016 and will become effective on June 1, 2017. The Cyber Security Law creates a new concept of Critical Information Infrastructure (“CII”). The operators of CII are subject to...more

Small Healthcare Provider Pays $31,000 for Failing to Have a Business Associate Agreement With File Storage Vendor

by Jackson Lewis P.C. on

Disclosing protected health information (PHI) to a business associate without a compliant business associate agreement (BAA) is an improper disclosure under the HIPAA privacy and security regulations. According to the HHS...more

Data Privacy and Security Legal Reform, and Plaintiffs’ Bar White Paper the Focus of IAPP Panel

by Reed Smith on

A panel on legal reform in the area of privacy and data security at this week’s IAPP Summit provided an opportunity for a discussion between businesses and regulators, as well as for the launch of a white paper on the...more

Deeper Dive: Protecting Paper Records

by BakerHostetler on

Our third annual BakerHostetler Data Security Incident Response Report analyzes the more than 450 data security incidents we led clients through in 2016, and includes a number of interesting trends relating to the causes of...more

Breach Notification Update: New Mexico becomes the 48th State Requiring Breach Notification and Tennessee Adds a Safe Harbor for...

by Sedgwick LLP on

As the frequency of data breaches continues, so do legislative developments on notification requirements that must be met in the event of a breach of Personally Identifiable Information (PII). Even as of now, not every state...more

Six Tips to Consider in Hiring Privacy and Data Security Experts

by Jackson Lewis P.C. on

Facing increasingly pervasive issues relating to privacy and data security companies are faced with what qualifications they should think about when looking to hire experts in these areas, and their role within the company is...more

Privacy Tip #83 – “Alexa, Disconnect Yourself from the Internet Now!” BrickerBot Malware Attacking IoT

We often talk about how anything that is connected to the Internet is hackable and unsafe, and to be careful about how you buy and connect devices, products, appliances, home security systems and other wireless “things.”...more

"The Emerging Need for Cybersecurity Diligence in M&A"

Cybercrime has emerged as one of the foremost threats a company faces. As a result of a few keystrokes, a company may find its customers’ data sold on the dark web, its intellectual property in the hands of a competitor or...more

Federal Class Action Lawsuit Highlights Importance of Sweepstakes Lawyer

by Klein Moynihan Turco LLP on

Last month, a federal district court in Detroit refused to dismiss a putative class action lawsuit filed against Dunham’s Athleisure Corporation (“Dunham’s”) concerning the regional sporting goods retailer’s sweepstakes...more

There Is More To Come In Europe: The Draft Of The ePrivacy Regulation

by King & Spalding on

In January 2017, the European Commission (the “EC”) published its proposal for a new ePrivacy Regulation (the “ePrivacy Proposal”), which will replace the ePrivacy Directive of 2002 (2002/58/EC) and the Cookie Directives of...more

InterContinental Hotels Reports Credit Card Breach

InterContinental Hotels Group (IHG) has reported a data breach of its payment card processing system. The breach involves malware that infected certain locations between September 29, 2016, and December 29, 2016. The malware...more

New Mexico Becomes 48th State to Enact Data Breach Notification Law

by Ballard Spahr LLP on

New Mexico recently became the 48th state to enact a data breach notification law. This continues the accelerated pace of state data breach legislative activity in the last two years. Since 2015, at least 41 states have...more

Regulation of Fintech in Canada

by Dentons on

This article provides Fintech startups and investors with an overview of the regulatory framework that applies to the Fintech industry and the issues that they need to be aware of as they navigate the shifting regulatory...more

French CNIL Releases GDPR Compliance Toolkit

by Alston & Bird on

On March 15, 2017, the French data protection authority (CNIL) released its six step- GDPR compliance program together with GDPR-tailored templates for use by companies, the “GDPR Toolkit.” The GDPR Toolkit is helpful for...more

10,205 Results
|
View per page
Page: of 409
Cybersecurity

Follow Privacy Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!