Science, Computers & Technology Consumer Protection

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Cybersecurity as a Regulatory Issue: The NAIC Considers The Anthem Breach And Weighs a “Cybersecurity Bill of Rights”

The Cybersecurity Task Force of the National Association of Insurance Commissioners (the “NAIC”) met last month, as part of on the NAIC’s 2015 Summer National Meeting in Chicago. The Task Force focused on two issues: the...more

California State Auditor Report Reveals Weaknesses In Golden State’s Information Systems

Elaine M. Howle, the California State Auditor (“CSA”), released a report on August 25, 2015 on the results of her office’s audit of controls in the state’s information systems. The results of the audit generally were grim,...more

Three Things In-House Counsel Needs to Know About Russia’s New Data Localization Law

On September 1, 2015, Russia’s new law requiring data localization, Russian Federal Law No. 242-FZ (“Russia’s Data Localization Law”) became effective. Although Russia’s Data Localization Law makes multiple changes to...more

Third Circuit Affirms District Court’s Decision Asserting FTC’s Authority over Companies’ Data Security Practices

On August 24, the U.S. Court of Appeals for the Third Circuit affirmed the Federal Trade Commission’s authority to hold companies accountable for their data security practices under Section 5 of the FTC Act (15 U.S.C. §...more

11th, 6th Circuits Rule on TCPA Consent for Autodialed Calls to Cell Phones

The U.S. Courts of Appeals for the 11th and Sixth Circuits recently issued two rulings regarding when a consumer has given “prior express consent” under the Telephone Consumer Protection Act (TCPA) to receive text messages or...more

Third Circuit Holds FTC Has Authority to Regulate Cybersecurity under Unfairness Prong of 15 U.S.C. § 45(a)

The Third Circuit recently issued its highly anticipated ruling in the Federal Trade Commission v. Wyndham Worldwide Corp., Case. No. 14-3514, holding that the FTC has authority to regulate the cybersecurity practices of...more

Data Localisation Law – clarifications published with one month to go…

Just one month before the new Data Localisation Law (‘the law’) is due to come into force, the Russian Ministry of Communications has published its long-awaited clarifications (in Russian) to the new law....more

Illinois Governor Vetoes Data Breach Bill

On August 21, 2015, Illinois Governor Bruce Rauner vetoed legislation that would have modified the state’s data breach notification law. Illinois’ Personal Information Protection Act (the “Act”) was enacted in 2005 to...more

New Jersey Federal Baked Goods Fraud Class Actions Are Toast

On this date in 1901 (September 2nd), Teddy Roosevelt for the first time uttered in public the immortal phrase, "Speak softly and carry a big stick". It is hard to find people who do not admire that statement. It is harder...more

[Webinar] Beam It Up Safely: Navigating Data Privacy and Security in Telemedicine's Uncharted Territory - Sept. 17, 12:00pm EDT

Science fiction programs once imagined a future where a doctor on a spaceship could treat a patient on a distant planet using groundbreaking technology. The health care industry may not yet have made this giant leap, but...more

Privacy & Cybersecurity Update - August 2015

Third Circuit Affirms FTC’s Authority Over Cybersecurity: In the Wyndham case, the Third Circuit affirmed that the FTC has the authority to regulate cybersecurity under Section 5 of the FTC Act, and that the language of...more

The Top Social Media Platforms’ Efforts To Control Cyber-Harassment

Social networking platforms have long faced the difficult task of balancing the desire to promote freedom of expression with the need to prevent abuse and harassment on their sites. One of social media’s greatest challenges...more

Litigation Alert: Third Circuit Permits Federal Trade Commission to Bring Unfair Practice Claim Based on Cybersecurity Practices

In a closely-watched cybersecurity case, a three-judge panel of the U.S. Court of Appeals for the Third Circuit held in Federal Trade Commission v. Wyndham Worldwide Corporation (No. 14-3514) that the Federal Trade Commission...more

FTC v. Wyndham: Third Circuit Affirms FTC's Authority to Regulate "Unfair" Cybersecurity Practices

In a highly anticipated, precedential opinion released on August 24, 2015, the Third Circuit held that the FTC had authority to regulate cybersecurity under the unfairness prong of § 45(a) of the FTC Act and that Wyndham had...more

Another Major Earthquake: California Creates Big Fissures in Proposition 65 Regulations – Proposals Could Shatter Defenses

In the midst of making Proposition 65’s longstanding warning regulations far more onerous, and vexatious litigation far more likely, California’s Office of Environmental Health Hazard Assessment (OEHHA) has unveiled still...more

Delaware Enacts First Privacy Law with Focus on Children

The Delaware Online Privacy and Protection Act takes a broad approach to the collection and disclosure of personally identifiable information. Delaware Governor Jack Markell recently signed the Delaware Online Privacy...more

FDA Regulatory and Compliance Monthly Recap — August 2015

OPDP warns Duchesnay over Kim Kardashian’s social media endorsement of morning sickness drug - The regulator issued a warning letter stating Kardashian’s endorsement of the company’s Diclegis pill on social media was...more

Third Circuit Affirms FTC's Ability To Bring Cybersecurity Enforcement Actions

On August 24th, the United States Court of Appeals for the Third Circuit issued its decision in Federal Trade Commission v. Wyndham Worldwide Corp., affirming a 2014 district court ruling that the Federal Trade Commission...more

FTC Can Regulate Cybersecurity Practices, Third Circuit Rules

The Federal Trade Commission (FTC) can regulate cybersecurity policies and procedures as “unfair” acts or practices under Section 5 of the FTC Act, the U.S. Court of Appeals for the Third Circuit has ruled in a very important...more

Guest Post - Game of Thrones, the FDA Under Attack, An In-House View of Amarin

Today's guest post is a first for this blog in two ways, first, our guest poster is anonymous. Second, our guest post is from an in-house source. The two are, of course, related. While it is important to us as lawyers that...more

FDA’s New Four-Letter Guidance on Biosimilars

After months of pressure from industry, health practitioners and even congressional stakeholders, FDA has finally proposed a convention for assigning nonproprietary names (also known as proper names) to biological products....more

Special Alert: Third Circuit Gives FTC Green Light to Continue Enforcing Corporate Data Security

Last week, the U.S. Court of Appeals for the Third Circuit affirmed the Federal Trade Commission’s authority to hold companies accountable for their data security practices under Section 5 of the FTC Act (15 U.S.C. § 45(a)),...more

84 House members urge expedited CFPB action on small business lending data collection rules

84 House members recently wrote to the CFPB to urge it to expedite rulemaking to implement the small business lending data requirements of Dodd-Frank Section 1071. Section 1071 amended the ECOA to require financial...more

Revisiting Privacy Policies and Practices in Light of Delaware Law

The Delaware Online Privacy and Protection Act (the "Act") addresses privacy policy, marketing or advertising to Delaware residents under age 18 and digital book service information disclosure requirements. The Act goes into...more

More fines to come in Germany? Service provider engagements are under increased scrutiny.

Following a significant fine against the parties to an asset acquisition for illegally transferring customer information, the Bavarian Data Protection Supervisory Authority (Bavarian DPA) announced on August, 20, 2015 that it...more

2,742 Results
|
View per page
Page: of 110

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×