Science, Computers & Technology Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Delaware Enacts First Privacy Law with Focus on Children

The Delaware Online Privacy and Protection Act takes a broad approach to the collection and disclosure of personally identifiable information. Delaware Governor Jack Markell recently signed the Delaware Online Privacy...more

Third Circuit Affirms FTC's Ability To Bring Cybersecurity Enforcement Actions

On August 24th, the United States Court of Appeals for the Third Circuit issued its decision in Federal Trade Commission v. Wyndham Worldwide Corp., affirming a 2014 district court ruling that the Federal Trade Commission...more

FTC Can Regulate Cybersecurity Practices, Third Circuit Rules

The Federal Trade Commission (FTC) can regulate cybersecurity policies and procedures as “unfair” acts or practices under Section 5 of the FTC Act, the U.S. Court of Appeals for the Third Circuit has ruled in a very important...more

Telemedicine or just a gadget for fitness addicts? Mobile Health Apps and the law

Mobile health (mHealth) apps are becoming more and more popular. Back in 2013, more than 97,000 health apps were already on the market. According to the European Commission (EC), this figure now amounts to around 100,000...more

Special Alert: Third Circuit Gives FTC Green Light to Continue Enforcing Corporate Data Security

Last week, the U.S. Court of Appeals for the Third Circuit affirmed the Federal Trade Commission’s authority to hold companies accountable for their data security practices under Section 5 of the FTC Act (15 U.S.C. § 45(a)),...more

84 House members urge expedited CFPB action on small business lending data collection rules

84 House members recently wrote to the CFPB to urge it to expedite rulemaking to implement the small business lending data requirements of Dodd-Frank Section 1071. Section 1071 amended the ECOA to require financial...more

Briefing on Russia Data Localisation Law

Russia has, today, implemented a Data Localisation Law. It requires information about Russian citizens to be stored in Russia and many businesses are concerned about how best to comply. There has also been some recent...more

Revisiting Privacy Policies and Practices in Light of Delaware Law

The Delaware Online Privacy and Protection Act (the "Act") addresses privacy policy, marketing or advertising to Delaware residents under age 18 and digital book service information disclosure requirements. The Act goes into...more

More fines to come in Germany? Service provider engagements are under increased scrutiny.

Following a significant fine against the parties to an asset acquisition for illegally transferring customer information, the Bavarian Data Protection Supervisory Authority (Bavarian DPA) announced on August, 20, 2015 that it...more

In FTC v. Wyndham Worldwide, Third Circuit Upholds FTC Authority to Enforce Flawed Cybersecurity Measures

In a much anticipated decision, the Third Circuit Court of Appeals affirmed the authority of the Federal Trade Commission (FTC) to enforce actions against companies who have been subject to a data breach. The FTC sued...more

Also In the News - Data, Privacy, & Security Practice Report - August 2015

King & Spalding Client Alert On Unprecedented Hacking And Trading Scheme — On August 11, 2015, prosecutors in the District of New Jersey and the Eastern District of New York unsealed indictments against several individuals...more

DoD New Cyber Security Reporting Rules for Contractors

In a move that highlights the changing winds of federal cybersecurity policy, the Department of Defense (“DoD”) has issued an interim Rule (“Rule”) that imposes new security and reporting requirements on federal contractors,...more

Ashley Madison, meet the kids: infidelity and divorce

The recent Ashley Madison breach exposed millions of users who’d signed up to the site, believing they were doing so with full anonymity. Social media and news outlets helped fuel a storm that will not soon be forgotten. In...more

The Legal Lessons of Data Breaches

Every business would love to find a fortune teller to give it insight into what trends to follow, which risks to take, and when “exposure” will convert to liability. Some clients might say that, unfortunately, their lawyers...more

Security Frameworks 101: Which is Right for my Organization?

These days information security is on the minds of virtually all technology professionals and business executives alike. But how does an organization ensure that their security profile is adequate. It can certainly help to...more

Federal appeals court confirms FTC authority to regulate cybersecurity policies and procedures

Banks and other companies subject to the CFPB’s jurisdiction face the possibility that the CFPB could begin using its authority under Sections 1031 and 1036 of the Dodd-Frank Act (which proscribe unfair, deceptive or abusive...more

Rocky Road Ahead for Ashley Madison after Widespread Damage Arising from Disclosure of Personal Information

Ashley Madison, the self-described “world's leading married dating service for discreet encounters” is the latest high-profile social media website to sustain a cyberattack. Established to provide an opportunity for married...more

That is SO last week - August 2015 #5

That infamous Ashley Madison data became searchable last week. Spouses, friends, and employers can now search the data to see if they know anyone who registered with the site. This development caused some to wonder if an...more

FTC v. Wyndham: The Litigation Goes On, But Other Lessons To Learn

It’s fair to say that the opinion by the Third Circuit Court of Appeals in FTC v. Wyndham was a set-back for Wyndham, but for businesses it may be just the right wake-up call....more

Federal Appeals Court Recognizes for the First Time the FTC’s Authority to Enforce Cybersecurity Practices

On August 24, 2015, the Third Circuit Court of Appeals issued a much-awaited decision in FTC v. Wyndham Worldwide Corporation, holding that the Federal Trade Commission (FTC) has authority to regulate “unfair” or “deceptive”...more

NIST issues Cybersecurity Practice Guide for Electric Utilities

Yesterday, the National Cybersecurity Center of Excellence issued its NIST Cybersecurity Practice Guide, Draft Special Publication 1800-2 “Identity and Access Management for Electric Utilities.” The Guide is a result of...more

Ashley Madison Fallout: Class Actions, Pentagon investigation and easily searchable data

We previously reported that hackers The Impact Team had posted legitimate detailed information about 36 million adultery website Ashley Madison users. In the wake of the shocking posting of the data last week, two class...more

Privacy in financial markets, not to be ignored

The Article 29 Working Party published a letter it sent to the European Commission urging it to consider the data protection and privacy issues when adopting the secondary regulations (‘Regulations’) necessary to implement...more

Sixth Circuit Weighs in on TCPA “Prior Express Consent”

The U.S. Court of Appeals for the Sixth Circuit recently addressed both the timing and scope of “prior express consent” under the Telephone Consumer Protection Act (“TCPA”). The plaintiff in Stephen M. Hill v. Homeward...more

Social networking service, MeetMe, Inc., settles minors’ privacy violations for $200,000

On August 19, 2015, MeetMe, Inc. (MeetMe), a social networking website and mobile app, agreed to pay $200,000 and to change its privacy policies to settle a lawsuit alleging that MeetMe distributed teenagers’ geolocation and...more

5,639 Results
|
View per page
Page: of 226

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×