Science, Computers & Technology General Business Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

How to Design a Document Retention Policy

Data minimization can be a powerful – and seemingly simple – data security measure. The term refers to retaining the least amount of personal information necessary in order for an organization to function. Less information...more

Setback for EU-US Privacy Shield – How to Safely Get HR Data Across the Pond

After the Court of Justice of the European Union declared the EU-U.S. Safe Harbor Framework invalid in October 2015, multinational companies with employees in the EU are facing the question how to legally transfer personal...more

New HIPAA Phase 2 Audits: Targets Notified by Email Only

The U.S. Department of Health and Human Services Office for Civil Rights (OCR) recently announced the long-awaited launch of Phase 2 of its HIPAA Audit Program (Phase 2 Audits). The Phase 2 Audits will review the policies...more

The Basics of International Privacy Law for Commercial Litigators, Part 2: Global Trends

Although the volume of data that flows between the EU and the U.S. ensures that EU privacy law occupies most of the spotlight on the world stage, other countries have their own privacy laws worth noting as...more

Update on the U.S.- EU Privacy Shield

As we previously reported, this February, United States (U.S.) and European Union (EU) negotiators announced the “U.S.-EU Privacy Shield” as a replacement to the U.S. Safe Harbor. Many U.S. companies relied on the Safe Harbor...more

Spring Showers Bring HIPAA Breaches

OCR has announced several recent settlement agreements to resolve violations of the Health Insurance Portability and Accountability Act (“HIPAA”). These settlement amounts range from $25,000 to $3.9 million dollars and...more

OCR Releases Updated HIPAA Audit Protocol and Business Associate Listing Template

The Office of Civil Rights (OCR) recently updated the audit protocol that it will be using to assess Covered Entities’ and Business Associate’s compliance with the Health Insurance Portability and Accountability Act (HIPAA)...more

Department of Health and Human Services Cracks Down on Vendor Oversight in Recent Hospital Settlements

From the rise in ransomware attacks to inadvertent disclosure of information by subcontractors, the health services industry is reminded that a potential consequence of a data breach is the threat of a regulatory enforcement...more

Privacy Issues to Consider When Developing a Mobile App

Many of the most popular mobile apps collect personally identifiable information. Although most app developers are not required to display a privacy policy under federal law, they are contractually required to do so pursuant...more

Keeping Coverage Online: Fourth Circuit Confirms Internet Data Breach Claim Triggers Commercial General Liability Policies

In a clear rejection of insurers’ attempts to artificially narrow the broad coverage provided by commercial general liability (“CGL”) policies, the United States Court of Appeals for the Fourth Circuit recently held that an...more

Data security is top driver for information governance

A recent Advice from Counsel study sponsored by FTI Technology, entitled “The State of Information Governance in Corporations” found data security to be the top driver for information governance initiatives. The purpose of...more

OCR issues audit protocol and targets over 800 entities—business associates too

The Office for Civil Rights (OCR) has issued its revamped audit protocol for its second phase of auditing covered entities and business associates’ compliance with the HIPAA Privacy, Security and Breach Notification Rules....more

Significant New EU Data Protection Privacy Framework Regulation Approved

On April 14, 2016 the European Parliament approved the European Union General Data Protection Regulation (GDPR), which replaces the EU Data Protection Directive (95/46/EC), the privacy law originally established in 1995. The...more

European Parliament Adopts EU General Data Protection Regulation; 12 Steps Businesses Should Take Now

The European Parliament has voted to adopt the draft text of the General Data Protection Regulation (GDPR), which imposes enhanced requirements on organizations processing personal data in the European Union and transferring...more

Alert on Ransomware Attacks and Prevention

Imagine entering your office, sitting down with a cup of coffee, and going through the routine task of logging on to your computer to review your emails and schedule for the day. Except this time, there is a problem. A...more

7th Circuit Revives P.F. Chang’s Data Breach Class Action Suit

Last week, the Seventh Circuit revived a data breach class action against P.F. Chang’s restaurant in an important opinion that continues a plaintiff-friendly trend that began with the court’s opinion in the Neiman Marcus case...more

Article 29 Working Party Assesses Transatlantic Privacy Shield

On April 13, the Article 29 Working Party (WP29) of the European Union released its assessment of the draft framework for transatlantic data flows: EU-US Privacy Shield, which was announced on February 2. According to the...more

Analysis of the FCC’s Proposed Broadband Privacy Regulations

As we highlighted in a post last month, the FCC has proposed sweeping new privacy rules on broadband providers. Since our last post, the FCC has released its proposal in the form of a Notice of Proposed Rulemaking. ...more

The Data Protection Directive Is Dead! Long Live the General Data Protection Regulation!

After four years of protracted discussions and negotiations, the General Data Protection Regulation (the “GDPR”) gained final approval from the European Parliament 14 April. It will enter into force 20 days after publication...more

Cybersecurity Compliance Just Got Tougher

Companies need specific, well-executed plans to meet growing demands of federal and state agencies. While cybersecurity risks have increased, government regulation has traditionally lagged behind. Recently, some...more

EU-U.S. Privacy Shield Still Needs Work, Says Committee of European Privacy Regulators

On April 13, 2016, the Article 29 Working Party, comprised of European data protection regulators, issued its opinion on the European Commission’s proposed EU-U.S. Privacy Shield. The Working Party commended the European...more

“But I Only Wore It Once!”: The Rising Cost of Return Fraud

Your customers may be thinking, "What’s the harm in wearing something once and returning it?" But return fraud can have a big impact on a retailer's bottom line. The National Retail Federation estimates that return fraud will...more

Investment Management Update - April 2016

Below is a summary of recent investment management developments that affect registered investment companies, private equity funds, hedge funds, investment advisers, and others in the investment management...more

When a Published Data Breach is a Covered Data Breach

Can an inadvertent Internet posting of a patient’s medical information trigger insurance coverage for liability stemming from a data-breach class action? The Fourth Circuit held last week that it can, and it added to the...more

O’ Really, Canada? Data Breach Log Rules Underway

In June 2015, Canada made significant amendments to its data privacy law, the Personal Information Protection and Electronic Documents Act (PIPEDA).  These amendments to PIPEDA will require businesses to inform the Canadian...more

2,065 Results
|
View per page
Page: of 83

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×