News & Analysis as of

Science, Computers & Technology Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Does GDPR Apply to You?

The EU’s General Data Protection Regulation goes into effect on May 25, 2018. GDPR replaces the EU Data Protection Directive. GDPR can apply to US-based businesses even if they do not have offices or employees in the EU. It...more

How To Protect Your Company From Cyber Regulatory-Enforcement: Part 2

by GB&A Insurance on

Experiencing a security breach is a bit like being on the titanic and feeling the tremble from hitting an iceberg. The impact sparks immediate panic - you know something very bad has just happened but are unsure whether the...more

Gavel to Gavel: Preventing data breaches

by McAfee & Taft on

The risk data breaches and cyberattacks pose to small businesses cannot be overstated. Roughly half experienced a breach within the past year at an average cost of $665,000 and immeasurable lost revenue. Worse yet,...more

At A Glance: De-Identification, Anonymization, and Pseudonymization under the GDPR

by Bryan Cave on

De-identification of data refers to the process used to prevent personal identifiers—both direct and indirect—from being connected with information. The EU General Data Protection Regulation (“GDPR”), which will replace the...more

Labor & Employment E-Note - July 2017

by Burr & Forman on

Employers who have been anxiously awaiting an answer as to whether the Department of Labor (“DOL”) will continue to defend the Obama Administration’s controversial overtime rule that was temporarily blocked by a federal court...more

Five Workforce Management Challenges in Unprecedented Times - Take 5 Newsletter - July 2017

by Epstein Becker & Green on

Employers across all industries are deep in the midst of exciting but unchartered and fluid times. Rapid and unforeseen technological advancements are largely responsible for this dynamic. And while there is a natural...more

The Top Eight Things You Should Be Doing to Protect Your Business from Cyber Threats

by Burr & Forman on

Cyber threats take many forms. The wide-spread WannaCry ransomware attack in May of 2017 highlighted how computer files could be held hostage in return for payment, while the Dyn denial of service in October of 2016...more

Another Rematch Between Tech Companies and the Government over the Territorial Reach of the Stored Communications Act

Lawyers for the tech community are gearing up for argument next month in the U.S. District Court in San Francisco, seeking to overturn another magistrate’s order that requires digital information stored outside of the U.S. to...more

The Chinese Government Issued Draft Cybersecurity Regulations to Protect Critical Information Infrastructure

by Davis Wright Tremaine LLP on

On June 10, 2017, the Cyberspace Administration of China (the “CAC”) released the Draft Regulations on the Security Protection of Critical Information Infrastructure. The CAC is seeking public comments with a deadline of...more

Health Care E-Note - July 2017

by Burr & Forman on

Everywhere you look these days, there seems to be another report of a cyberattack -- attacks which do not discriminate based on industry type, size of business, or impact. In other words, everyone is vulnerable. In fact, the...more

Keeping Up with Cayla: Concerns over Interactive Toys Spur an FTC Update of COPPA Guidelines

“Pleeeease?!” Buying a quick gift or giving in to your child’s pleas for a new toy is quickly becoming a more serious decision. In the age where toys can happily entertain kids by talking to them, the few precious moments...more

Washington’s New Biometric Privacy Law: What Businesses Need to Know

by Davis Wright Tremaine LLP on

With the rise in hackings and data breaches, companies and government agencies are looking for ways to protect their data that offer more security than passwords. Because passwords are easily lost, stolen, guessed, and...more

An Ounce Of Data Breach Prevention…Address Attorney-Client Privilege In Your Breach Planning

by Jackson Lewis P.C. on

Data breach “horror” stories have become a new staple in today’s business environment. The frequency of attacks which threaten (or compromise) the security of business networks and information systems continually increases —...more

Article 29 Working Party Releases Detailed Opinion on Data Processing in the Workplace

by Reed Smith on

The Article 29 Working Party (“WP29”) recently published an opinion on data processing at work (“Opinion”). The Opinion restates the position and conclusions in WP29’s 2001 Opinion on processing personal data in the...more

At the Intersection of Cybersecurity and White Collar

by Blank Rome LLP on

The global "ransomware" cyberattack in early May 2017 resulted in tens of thousands of computer systems being taken hostage by hackers and, in the instances involving hospitals, put lives at risk. Companies that suffered...more

Privacy Perils: What's in Your Container?

by Bass, Berry & Sims PLC on

The use of "containers" in web application development is growing, but not without potentially increasing threats to the security of the data we store in our apps and devices. Containers are stand-alone packages of software...more

Singapore: Consultation Exercise on Draft Cybersecurity Bill

by Morgan Lewis on

The unveiling of the draft cybersecurity bill sheds light on proposed cybersecurity compliance standards and the broad, sweeping powers of Singapore’s Cyber Security Agency....more

Texas Utility Company Sends in the Drones to Inspect 5-Miles of Power Lines

More and more utility companies are finding drones (or more formally, unmanned aerial vehicles (UAV)) useful, and cost effective, to inspect power lines in lieu of sending up their employees to carry out the dangerous task....more

FBI Issues Warning about Internet-Connected Toys

We previously reported about the microphone and video capabilities of Echo technology. The FBI is also concerned about this technology being used in toys that are connected to the Internet....more

Bullet-Point Update: Electronic and Federal Court Discovery Issues for the Week of July 14, 2017

by Carlton Fields on

Cloud Computing - • Use this to convince your clients that their cloud storage may be discoverable: Open Text Corp. v. Grimes, 2017 WL 2733937 (D. Md. June 26, 2017) (Noting earlier entry of an agreed order requiring a...more

Virginia Opens the First UAS-Dedicated Runway

Governor of Virginia, Terry McAuliffe, recently cut the ribbon on a new runway in Virginia dedicated solely to unmanned aerial systems (UAS or drones). The Mid-Atlantic Regional Spaceport’s UAS Airfield is a 3,000-foot runway...more

FTC Chronicle: “Lessons Learned” from the Agency’s Data Breach Investigations

The Federal Trade Commission (FTC) – often criticized for not providing clear guidance as to what the agency considers reasonable data security – announced on Friday that it would publish a weekly blog discussing “lessons...more

Ten Tips For Actions By A Covered Entity After A HIPAA Breach By A Business Associate

by Fox Rothschild LLP on

This blog recently discussed tips for a covered entity (CE) in dealing with a HIPAA business associate (BA). Now, even though you have adopted all of the tips and more, in this dangerous and ever more complex data security...more

It's Not About The Money: Prepare For "Destruction Of Service" Attacks

by Fox Rothschild LLP on

Computer networking giant Cisco says the recent WannaCry and Petya/NotPetya incidents signal the advent of a new generation of cyberattacks that is aimed more at mass disruption than financial gain. The new breed of...more

Nevada Enacts Online Privacy Policy Law; Illinois ‘Right to Know’ Bill Dies

by BakerHostetler on

Effective July 1, 2017, Nevada joined California as the second state to require operators of websites and online services to post a public notice regarding their privacy practices. Like California’s law, the new Nevada...more

11,008 Results
|
View per page
Page: of 441
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.