Science, Computers & Technology General Business Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Post navigation Cyber Insurance Primer – An Overview of Coverages

Insurance coverage for cyber risk – both first-party and third-party loss – is a burgeoning type of insurance many major carriers are now offering to their policyholders. In view of this significant growth, this blog will –...more

Intellectual Property and Technology News (Asia)

Welcome to the most recent Asia Pacific edition of Intellectual Property and Technology News, our biannual publication designed to report on worldwide developments in IP and technology law, offering perspectives, analysis and...more

HIPAA Omnibus Rule: Deadline Approaching to Update Grandfathered Business Associate Agreements

Although the HIPAA Omnibus Rule (the “Rule”) went into effect nearly 18 months ago, the transition period for bringing business associate agreements into compliance with the Rule’s new requirements will end on September 23,...more

Emerging Technologies Push the Boundaries of Privacy Law

As technology developers continue to push the envelope on services and applications affecting the daily lives of consumers, the intersection of technology and privacy is becoming increasingly fraught with legal implications...more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

The Human Element of Information Security - In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the data...more

Why Worry About a Little Skimmer?

Merchants—rightfully so—are worried about securing their payment card environments so that their name does not appear in a headline discussing how millions of cards were stolen from them. Faced with the challenge of...more

France About to Embark on a Cookies Sweep Day

Impending sweep day to verify compliance with guidelines on cookies - During the week of September 15–19, 2014, France’s privacy regulator, the Commission Nationale de l’Informatique et des Libertés (CNIL), is...more

Information Security Training Master Class: Winning the Battle Against Data Breaches, Malicious and Negligent Employees, and...

Disclaimer: I am a crazy person. I read over 50 articles before I wrote this (WHO DOES THAT) and I’m not even sure how I got so sucked in. In short, information security is a big deal right now – and there are tons of ways to...more

CIOs Spur Revenue Generation Through Smart Cybersecurity

Today as companies increasingly realize the value of strong cybersecurity, those CIOs who successfully implement an effective cybersecurity system should be viewed as a critical part of the revenue generation effort. An...more

NIST Issues Draft Report Enumerating Risks and Protections to Consider When Evaluating Mobile Apps for Your Enterprise

As the world recovers from the excitement leading up to Tuesday’s Apple Live Event announcement of the new iPhone 6 and Apple Watch, mobile app developers are chomping at the bit to create software that leverages the new...more

Credit Unions Continue to Demand New Data Security Standards for Retailers and Right to Recover Losses After a Breach

On September 3, 2014, following the news of a possible breach at Home Depot (which was confirmed on September 8), the National Association of Federal Credit Unions (NAFCU) called on Congress to enact new legislation to hold...more

By “Any Manner” Of Means: Securing Cyber-Crime Coverage After Zurich v. Sony

Much has been written about the New York Supreme Court’s landmark ruling in Zurich American Insurance Co. v. Sony Corp., Index. No. 651982/2011 (N.Y. Supr. Ct. Feb. 21, 2014), in which a New York trial court denied coverage...more

Wearable Fitness Device Privacy Concerns Abound

How would you feel if businesses or individuals had access to your medical records? There is no question that advertisers, businesses, and even overly-clingy significant others would love to have access to your private...more

California Attorney General Issues Privacy Practices Guide

Consumers that have spent more than a few seconds attempting to decipher an online privacy policy tend to agree that most privacy policies are overly long, difficult to read, and fail to offer any meaningful choice to the...more

France: CNIL to begin cookies enforcement in October

Starting in October, France’s Data Protection Authority (the CNIL) will verify compliance with its December 2013 Recommendation on the use of cookies and tracking technologies....more

Major Barrier to E-Commerce in Middle East and North Africa is Fear about Data Security

In a recent article published by Law 360, Proskauer litigation associate Courtney Bowman outlines how companies can make inroads in the e-commerce market in the Middle East and North Africa (MENA). Although often overlooked,...more

Another day, another data breach…..DIYers, beware. This time it’s Home Depot.

It appears that the data breach victim of the week (perhaps of the year) is The Home Depot. Brian Krebs has reported that it appears that two large dumps of purloined credit card numbers have made an appearance on the black...more

Lessons from the iCloud Celebrity Hack

The highly publicized hacking of the iCloud accounts of dozens of celebrities was disclosed over Labor Day weekend and has raised larger, more serious concerns regarding the security of personal and corporate data held in the...more

Business Associate Agreements May Require Amendment

The Omnibus Final Rule (the "Omnibus Rule") under the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), was issued in January, 2013 effective March 26, 2013, but with a general compliance deadline of...more

IP Rights In Data Handbook - Protecting and exploiting IP in data, big data and databases internationally

In the era of Big Data, no ambitious business can afford to live without a strategy for the acquisition, protection and exploitation of the data upon which it depends. The laws enabling data to be protected and exploited are...more

FRANCE: Orange receives a public warning from the French Data Protection Authority (CNIL) following a security breach in a...

The CNIL’s decision provides useful guidance on security measures that the CNIL considers must be taken by data controllers. Earlier this year, Orange discovered that the database of one of its sub-subcontractors had...more

Privacy & Cybersecurity Update - August 2014

In This Issue: - NIST Announces October Workshop and Releases Framewok Update - Insurance Company Succeeds in Cybersecurity Litigation - Safe Harbor Under Attack — This Time From a US Group -...more

Nebraska Federal Court Refuses To Dismiss Suit Claiming Breach Of Contract, Violation of State Law for Unauthorized Credit Card...

On August 20, the U.S. District Court for the District of Nebraska denied motions to dismiss filed by a Nebraska bank and two credit card processing companies in response to a purported class action filed by a merchant...more

Learning from Target: Insurance Coverage for Data Breaches

Cyber liability is a clear and present danger. Target Corp. recently reported at least $235 million as gross expenses related to its 2013 data breach. Fortunately, Target was able to recover $90 million of that loss under...more

Massive Online Security Breach – Are You Reactive or Proactive?

A few weeks ago, a Russian cyber gang amassed around 1.2 billion user name and password credentials belonging to more than 500 million email addresses. This may be to date the largest cache of stolen data. The cyber gang...more

1,039 Results
|
View per page
Page: of 42

Follow Science, Computers & Technology Updates on: