Science, Computers & Technology Business Organization Consumer Protection

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

FTC’s PrivacyCon Highlights Consumer Privacy Perceptions and Targeting

The Federal Trade Commission is currently the most aggressive enforcement agency on privacy and data security. The agency kicked off 2016 with PrivacyCon on January 14, which put the spotlight on academic research on consumer...more

International Data Privacy: How to Navigate the Challenges

Hardly a day goes by when the news doesn't include some privacy-related story or scandal. To name just a few recent examples, we've seen: ..Highly publicized losses of customer credit card data by household-name...more

FTC Report Alerts Organizations about the Risks and Rewards of Big Data Analytics

On January 6, the Federal Trade Commission (FTC) released a report that it hopes will educate organizations on the important laws and research that are relevant to big data analytics. The report, Big Data: A Tool for...more

Key CISA Provisions Impacting Private Entities

On December 18, 2015, President Obama signed the Cybersecurity Information Sharing Act (“CISA”), which was the culmination of intense negotiations that reconciled three separate cybersecurity bills passed by the U.S. Senate...more

FTC Publishes Big Data Report – Provides “Recommendations to Business”

The Federal Trade Commission (FTC) has just released a report on Big Data: A Tool for Inclusion or Exclusion? Understanding the Issues (Report), January 6, 2016. The FTC Chairwoman Edith Ramirez indicates in the FTC news...more

Government Proposes $3.9 Billion for Autonomous Cars

You get a billion! You get a billion! You get a billion! And, you get a billion! The Federal Government went full Oprah on everyone at the North American International Auto Show recently, throwing around a few billion dollars...more

Federal Trade Commission PrivacyCon 2016 Recap: Insights into the FTC’s Perspective on Privacy and Data Security

The Federal Trade Commission’s PrivacyCon event brings together the FTC, researchers and academics to discuss the latest research and trends related to consumer privacy and data security. Much of the discussion today...more

FTC warns use of big data may violate federal consumer protection laws

A new FTC report, “Big Data: A Tool for Inclusion or Exclusion? Understanding the Issues,” warns that certain uses of big data consisting of consumer information may implicate various federal consumer protection laws. In the...more

FTC Releases Big Data Report Outlining Risks, Benefits and Legal Hurdles

The big data revolution is quietly chugging along: devices, sensors, websites and networks are collecting and producing significant amounts of data, the cost of data storage continues to plummet, public and private sector...more

FTC Report Examines Legal and Policy Considerations for Big Data Analytics, Promises More Enforcement

The Federal Trade Commission's (FTC) recent report, Big Data: A Tool for Inclusion or Exclusion?, released on January 6, warns businesses engaged in big data analytics that the practice poses liability risks. While the FTC...more

FTC Releases Report on “Big Data” Offering Practical and Legal Considerations for Businesses

On January 6, 2016, the Federal Trade Commission (FTC) released a report on the growing use of “big data” which discusses potential benefits and risks to big data use and offers practical and legal considerations for...more

Big News on Big Data: FTC Issues Important Report on Big Data, Compliance, and Consumer Protection

On January 6, the Federal Trade Commission (FTC) released a report titled Big Data: A Tool for Inclusion or Exclusion, which describes how big data use can run afoul of federal laws and regulations. Although the FTC report...more

Director Cybersecurity Risk Oversight and Actions

This article begins by providing an overview of the duty of directors to oversee risk, including cybersecurity risk, in the cyberattack context and then outlines actions that board of directors are taking as reported by...more

SEC Exam Priorities for 2016

The SEC’s Office of Compliance Inspections and Examinations or OCIE announced its examination priorities for 2016. Those priorities generally “reflect certain practices and products that OCIE perceives to present potentially...more

Cybersecurity Risks: Directors and Officers Should Stop, Collaborate and Listen

The risks associated with cyber-attacks and data breaches are growing in Canada and internationally and the costs associated with an organization preventing, detecting, responding to and recovering from such an incident can...more

MEPs Agree to Europe’s First-Ever EU Cybersecurity Law

On December 7th, members of the European Parliament (MEPs) and the Luxembourg Presidency of the EU Council of Ministers provisionally agreed to the text of the long awaited network and information security directive also...more

Business Litigation Alert: "Is Your Board of Directors Providing Sufficient Oversight for Cyber Attacks?"

Last month, we discussed the recent federal court decision that allows whistleblowers to sue board members directly for retaliation. Now, it seems as though board members are assuming a bigger role in managing another...more

Tips for Protecting Your Company Against Cyberattacks

Cybersecurity has become, as it should, an extremely important topic on company boards’ agendas. The main question on everyone’s mind is: “How can we eliminate this problem?” The answer, unfortunately, is that you can’t....more

California Amends Breach Notification Law: Unique New Refinements and Requirements

The California legislature has again amended the state’s breach notification statutes to impose new and unique requirements and refinements, adding further complexity to the patchwork of breach notification requirements....more

Highlights from the FTC’s Second “Start With Security” Initiative

On November 5, the FTC hosted its second “Start With Security” event in Austin, Texas in an effort to provide companies with practical tips and strategies for implementing effective data security....more

Data Breach Planning in 10 Easy Steps: How to Think Like A Litigator

For the first Tuesday in November, we have 10 easy steps to make sure that your data breach incident response planning is viewed from that pesky point of view of a litigator....more

[Webinar] The New Compliance Challenge: Protecting Confidential Assets From Cyber Threats and Malicious Insiders - Nov. 5th,...

The growing prevalence of cyber-security issues and insider breaches has put information security squarely on the agenda for many corporations – and increasingly in the realm of compliance. In this webinar, we discuss these...more

Data Breaches, Media Relations, and the Bottom Line

Data breaches are crisis moments that business must prepare for in many ways: not just in taking steps at prevention, but also mitigating losses, arranging for business continuity, complying with legal and regulatory...more

The End of the Safe Harbor Framework – and the Threat to Model Clauses and BCRs

Earlier last week, the European Court of Justice (CJEU) invalidated the Safe Harbor framework between the United States and the European Union -- effective immediately. This decision significantly disrupts the flow of data...more

Ashley Madison Breach Another Warning To Companies

Add dating website Ashley Madison to the list of large companies like Target, Home Depot and Michael’s that have had customer information stolen by hackers. Published reports say Ashley Madison is now facing multiple lawsuits...more

75 Results
|
View per page
Page: of 3

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×