News & Analysis as of

Science, Computers & Technology Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Association of Corporate Counsel Issues Guidelines for Law Firm Cybersecurity Practices

by Fisher Phillips on

The Association of Corporate Counsel (ACC) recently released a set of guidelines intended to serve as a benchmark for law firm cybersecurity practices. The guidelines include information retention, return, and destruction,...more

HIPAA Refresher for Workplace Wellness Programs

Now more than ever, workplace wellness programs are becoming increasingly popular among employers. A common concern many employers have is how to design a meaningful workplace program intended to improve the health of...more

State of the Cyber Nation: UK Government Report on Cybersecurity Breaches

by Hogan Lovells on

On 19 April 2017, the UK Government’s Department for Culture, Media and Sport (DCMS) published a report on cybersecurity breaches and how they affected UK companies in the last year. Headline statistics from the report...more

Healthcare Advisory: HHS Announces First Settlement with a Wireless Health Services Provider

by Sherman & Howard L.L.C. on

On April 24, 2017, the Department of Health and Human Services, Office of Civil Rights (“OCR”), announced its first settlement with a wireless health services provider, CardioNet, Inc., for alleged violations of the Health...more

Colorado Proposes New Cybersecurity Rules For Financial Advisers

by Dentons on

Earlier this month, the Colorado Division of Securities released a set of proposed changes to the Colorado securities laws that would, if adopted, impose strict cybersecurity requirements on investment advisers and...more

Rules of the Drone. The New FAA Drone Rules For Your Construction Site

About ten years ago, I visited a college friend in Simi Valley, California. He graduated Purdue with an Aeronautical Engineering degree and had left Indiana to work for a company developing unmanned aircraft for the military....more

Tennessee Adds Technical Requirements To Its Data Breach Notification Laws

by Dickinson Wright on

Are you doing business in Tennessee? Do you have computerized personal information about anyone in Tennessee (including employees, clients, or customers)? Are you encrypting that data in accordance with the current version of...more

CyberOhio Initiative – An Update from the Ohio AGO

We recently posted on the Ohio Attorney General’s CyberOhio initiative and forecasted that the Ohio Attorney General might be the first of many Attorneys General to join forces with industry in the struggle to protect...more

Understanding PSD2: Key Points to Know About the Upcoming Regime

by Latham & Watkins LLP on

New directive disrupts the EU payments regulatory regime. A series of Client Alerts will follow ongoing developments related to PSD2. Key Points: ..By expanding the accessibility of customer account information,...more

Launch of Swiss-US Privacy Shield Framework Announced by US Secretary of Commerce

by Revision Legal on

International commerce is a huge business, but one of the challenges involved in conducting international business is that different countries may have different laws concerning privacy and the handling of personal data. Many...more

Deeper Dive: Phishing/Hacking/Malware Attack Remain Leading Cause of Security Incidents

by BakerHostetler on

During 2016, our BakerHostetler privacy and data protection team worked on data security incidents across virtually all industries. For the second year in a row, phishing/hacking/malware attacks have accounted for the largest...more

What To Do When You Hire A Thief

by Foley & Lardner LLP on

Employers victimized by trade secret misappropriation appropriately express righteous outrage, both at the offending ex-employee and sometimes at the new employer. However, on another day the roles can reverse: That same...more

Hackers, Keep Out!

by McManis Faulkner on

Hackers are getting more sophisticated each day. It is our job to try and stay a step ahead of them. There is always someone on the outside trying to get in. It is imperative to keep your data secure within your business...more

Permissible Disclosures Under the Stored Communications Act

by Revision Legal on

The Stored Communications Act, which is codified at 18 USC 121, sections 2701-2712, is federal law that governs the conduct of electronic communication service providers and the voluntary and compelled disclosure of the...more

Security Breach Notification Becomes More Complex For Employers

by Littler on

With new and sophisticated schemes perpetrated by hackers and scammers, and sensitive personal information becoming increasingly accessible to numerous insiders, it is only a matter of time before most employers will be...more

Failure to Implement Business Associate Agreement Results in $31,000 Settlement For Health Care Provider

by Saul Ewing LLP on

On April 20, 2017, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) announced that Children’s Digestive Health (CDH) agreed to pay HHS $31,000 for its failure to have a business associate...more

What Compliance Needs to Know About Data Privacy and Security

by Michael Volkov on

You don’t have to be a tech-savvy computer genius to address the basics of data privacy. Like many areas which compliance departments oversee, asking the right question and getting the right internal controls in place are the...more

New Mexico Becomes 48th State to Enact Data Breach Statute

by Moore & Van Allen PLLC on

Recently the state of New Mexico enacted the Data Breach Notification Act, making it the 48th state in the United States to enact a statute requiring notice to individuals impacted by a data breach. In doing so, New Mexico...more

More GDPR Questions Answered: New Guidelines on DPIAs

by Reed Smith on

Although considered burdensome by some, data protection impact assessments (DPIAs) help controllers assess any data protection implications of their processing operations, with the added benefit of demonstrating compliance...more

New York Department of Financial Services Provides Guidance on Cybersecurity Regulation; Colorado Financial Regulator Proposes...

In April 2017, the New York Department of Financial Services (the “DFS”) released guidance on interpreting 23 NYCRR Part 500, its recently promulgated regulation that requires banks, insurance companies and other financial...more

Kimpton Data Breach Decision Highlights Lingering Confusion on Standing Issues

When data thieves steal payment card data, consumers suffer no legally cognizable injuries. Card issuers absorb the fraudulent charges and replace the affected cards. Because fraudulent charges are not billed to consumers,...more

FTC resolves allegations against three U.S. based companies involving misrepresentations of International Privacy Program...

Privacy laws in Asia-Pacific countries such as Japan, Australia, New Zealand and Singapore restrict the export of personal information except when the exporter meets certain qualifying conditions. One qualifying condition is...more

FTC Privacy and Data Security Enforcement Activity Continues Unabated under the Trump Administration

by Ballard Spahr LLP on

Last week, the Federal Trade Commission (FTC) Bureau of Consumer Protection’s Acting Director, Thomas Pahl, posted on the FTC’s Business Blog about the FTC’s role as the federal agency with the “broadest jurisdiction” to...more

An Opportunity to Shape Compliance with GDPR

by Hogan Lovells on

A close observer of the GDPR will have noticed that, in several places, individual EU Member States can implement derogations from the GDPR requirements. Of course, as a regulation under EU law there is less scope for local...more

HIPAA and the Cloud’s Shared Responsibility Models

by Snell & Wilmer on

Cloud-based service providers (CSPs), like Amazon Web Services and Microsoft Azure, offer online access to shared computing resources. As such, they have developed a “shared responsibility model” for how CSPs and companies...more

10,210 Results
|
View per page
Page: of 409
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!