News & Analysis as of

Science, Computers & Technology Consumer Protection

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Guilt by Association: Bitcoin and the WannaCry Ransomware Attack

by Perkins Coie on

The recent so-called “WannaCry” ransomware cyber-extortion attack has thrust bitcoin as a means of payment back into the debate surrounding illegal online activity. Much in the way that the internet, in its early days, was...more

Cybersecurity, A-Z: D is for Drones

Unmanned aerial vehicles, or “drones,” as they’re commonly called, touch on numerous hot-button cybersecurity issues. As devices connected to networks, they are important when considering the “internet of things.” As used...more

Breadcrumbs to our demise.

Data does not exist in a vacuum. There are some very lucrative careers based on the extraction of multiple, divergent uses of a single data set. It follows that the fitness tracker that collects and analyzes data to...more

Target Reaches $18.5 Million Dollar Settlement in Data Breach with States

It seems as though we have been writing about this case for a lifetime. Target Corporation’s data breach saga came one step closer to a conclusion this week. On Tuesday, Target reached an $18.5 million settlement with 47...more

Governor Signs Amendment to Tennessee Data Breach Notification Law

by Bass, Berry & Sims PLC on

During the recent 110th Regular Session of the Tennessee General Assembly, Governor Bill Haslam signed into law an amendment to the Tennessee Identity Theft Deterrence Act of 1999....more

Ultrasonic Cross-Device Tracking: A Consumer Management Tool with FTC Warnings

A consumer’s television or computer may be emitting silent signals that her smartphone can hear, recognize and answer back, but the consumer can’t sense them at all. These signals are telling retailers about their customer’s...more

Financial Services Weekly News - May 2017 #4

by Goodwin on

Editor's Note - Memorial Day. On Memorial Day, we will be celebrating the men and women whose service and sacrifice ensures the preservation of freedom and opportunity across the United States. Rather than summarize the...more

China's Cybersecurity Law and Draft Implementation Rules

by Morgan Lewis on

The law applies to all “network operators” and introduces cybersecurity mechanisms. On November 7, 2016, the Chinese government released a draft version of the Cybersecurity Law (CSL) that will govern China’s cyberspace...more

Federal Court Stands By Earlier Decision Holding Financial Institutions To Higher Standard Than Customers When Pursuing Data...

by King & Spalding on

On May 1, 2017, an Illinois federal district judge dismissed data breach-related claims brought by financial institutions against a grocer. The court distinguished the case from similar lawsuits aimed at Home Depot and...more

Monthly TCPA Digest - May 2017

by Mintz Levin on

We are pleased to present the latest edition of our Monthly TCPA Digest, providing insights and news related to the Telephone Consumer Protection Act (TCPA). This month’s issue features updates on the latest regulatory...more

OIG Report Continues Criticism of CFPB Enforcement Data Security Practices

by Ballard Spahr LLP on

On May 15, 2017, the Federal Reserve Office of Inspector General – which also oversees the CFPB – released a report finding deficiencies in the CFPB Office of Enforcement’s (Enforcement) processes for securing sensitive...more

HIPAA Settlement With Wireless Health Services Provider Is Less Than Meets The Eye

by King & Spalding on

On April 24, the U.S. Department of Health and Human Services Office for Civil Rights (“OCR”) announced a $2.5 million HIPAA settlement with CardioNet, a wireless health services provider. CardioNet provides remote mobile...more

President Trump's Executive Order on Cybersecurity

by King & Spalding on

On May 11, 2017, President Trump signed a long-awaited Executive Order that aims to bolster the cybersecurity of federal networks and critical infrastructure. In an effort to fulfill the President’s promise to get “tough on...more

Excessive pricing in pharmaceutical products attracts the European Commission's attention

by Hogan Lovells on

In recent years competition authorities in a number of EU Member States have stepped up in their pursuit against companies active in the Life Sciences sector for excessive pricing. Last week, the European Commission issued a...more

New Duties for Lawyers? The ABA Weighs In on Cybersecurity.

Recently, the ABA Standing Committee on Ethics and Professional Responsibility issued Formal Opinion 477, which aims to provide guidance and clarity to lawyers as they consider what level of security to give communications...more

Superior Court Invalidates Hexavalent Chromium Drinking Water Standard

Earlier this month, Judge Christopher E. Krueger of the Sacramento Superior Court issued an order invalidating the Maximum Contaminant Level (MCL) for hexavalent chromium. The California Department of Public Health (“DPH”)...more

WannaCry Ransomware Cyberattack Raises Legal Issues

by Morgan Lewis on

The recent cyberattack highlights the need for firms to engage in proactive prevention and protection. Ransomware (malware that encrypts data pending an extortion payment) is a recurring cyber threat that is growing more...more

Privacy Perils: Strong Passwords IV: The Phrase Awakens

by Bass, Berry & Sims PLC on

Previous Tips have warned of the use of easily-guessed passwords, and have provided suggested methods to strengthen them, including use of...more

Self-Sovereign Identity and Distributed Ledger Technology : Framing the Legal Issues

by Perkins Coie on

Purpose - Distributed ledger technology (“DLT”), including the use of blockchain technology, has been touted as a way to create and validate digital identities that serve many of the same purposes that physical forms of...more

The FTC Seeks Comment: How Trusty Is The TRUSTe Plan For COPPA Certification?

by King & Spalding on

The Federal Trade Commission (FTC) is currently seeking comment on proposed changes to TRUSTe’s safe harbor program under the agency’s Children’s Online Privacy Protection Rule (COPPA). Per the Federal Register notice, the...more

Global Inquiries into Drug Price Increases

European competition authorities announced this week an investigation into Aspen Pharmacare’s recent price hikes of five cancer drugs. The European Commission said in a press release that it had “information indicating that...more

Are Healthcare Systems Being Held Hostage by Ransomware?

by Revision Legal on

Healthcare ransomware is one of the biggest cybersecurity concerns in existence and it may have particularly serious implications for healthcare systems. Ransomware is a form of malicious software code that is somehow...more

Is the Government Protecting Your Private Information?

by Reed Smith on

We were not affected by the recent ransomware attack that disabled computers worldwide, including in multiple public hospitals in the UK. At least not yet. For those who have never had the pleasure or who otherwise do not...more

Data Security Under Commissioner Ohlhausen: What You Need to Know

The Federal Trade Commission (FTC) has been a critically important regulator of cybersecurity practices in the US, using its authority under Section 5 of the FTC Act to bring enforcement actions against companies for failing...more

Australia And China Establish Cybersecurity Agreement

by King & Spalding on

On April 21, 2017, Australia and China forged an agreement to expand their cybersecurity cooperation. This agreement emerged as part of the Australia-China High-Level Security Dialogue held in Sydney. ...more

4,928 Results
|
View per page
Page: of 198
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!