Science, Computers & Technology Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

OCR to Focus More Investigative Resources on Smaller HIPAA Breaches with Less Than 500 Individuals Affected

The Department of Health & Human Services (DHHS) Office of Civil Rights (OCR) recently announced it will devote more resources to investigate smaller HIPAA breaches. Before this announcement, OCR typically opened...more

NAIC Task Force Releases Revised Draft Insurance Data Security Model Law

On August 17, the National Association of Insurance Commissioners (the NAIC) Cybersecurity (EX) Task Force (the Task Force) released for comment a revised draft Insurance Data Security Model Law (the Model Law). This Model...more

Locky Ransomware Continues to Hit Health Care Entities

FireEye Labs has reported that the Locky ransomware continues to hit the health care industry hard, and has increased in the month of August. Although the telecommunications, manufacturing and aerospace/defense...more

Agencies Encourage New Privacy Regulations to Close the mHealth Black Hole and Keep Pace with Evolving Technologies

On July 19, 2016, the ONC submitted a report to Congress which suggests that health privacy regulations soon may be revised to catch up with the universe of mHealth technologies that now use and share personal health data....more

Hackers Dubbed ‘Ghoul’ Targeting Industrial Businesses across the Globe

Researchers at Kapersky Labs say they have uncovered an industrial hacking scheme that they have dubbed “Operation Ghoul” that has hit 130 organizations in 30 countries. ...more

Cybersecurity Risks to the Manufacturing Sector

The 2016 Manufacturing Report by Sikich finds that there has been a progressive growth in cyber-attacks in the manufacturing sector. This is consistent with the most recent IBM /X-Force Research 2016 Cyber Security...more

FTC Overturns ALJ’s LabMD Decision and Reasserts its Role as a Data Security Enforcer

On July 29, 2016, the Federal Trade Commission (“FTC” or “Commission”) reversed an FTC administrative law judge’s (“ALJ”) opinion which had ruled against the FTC, finding that the Commission had failed to show that LabMD’s...more

Eddie Bauer Latest Victim of Point-of-Sale Compromise

Eddie Bauer announced on August 18th that it is the latest retailer who has become a victim of a “sophisticated” cyber intrusion that has compromised all of the cash registers in the 350 Eddie Bauer stores throughout the U.S....more

ICO Reminds Organisations of EU-U.S. Personal Data Transfer Obligations

The Interim Deputy Commissioner at the Information Commissioner’s Office (“ICO”), Steve Wood, has published a blog reminding organisations of their obligations when transferring personal data to the United States, pursuant to...more

Health Update - August 2016

Section 1332 Waivers: Will We See More State Innovation? - Editor's Note: In a new essay for the National Institute of Health Care Management (NIHCM), summarized below, Manatt Health examines Section 1332 waivers and the...more

MCLE Self Study Article: Property Rights to the Periphery of the Universe or Only to the Rooftop?: The Effects of Drones on...

Imagine a peaceful summer afternoon at home with your family. You’re inside preparing food for a barbeque while the rest of your family sunbathes and plays by the backyard pool. Suddenly, your teenage daughter runs into the...more

Twitter Sued For Right of Publicity Violations Over Profile-Trading Game

A class action lawsuit was filed in California yesterday against Hey, Inc. and Twitter regarding Hey’s online trading game in which players collect profiles of (and use virtual currency to invest in) real-life people as if...more

Also In the News - Data, Privacy, & Security Practice Report - August 2016

FDIC Office Of Inspector General Reports On FDIC’s Cybersecurity Practices – On August 11, 2016, the Federal Deposit Insurance Corporation’s (“FDIC’s”) Office of Inspector General issued a report based on an audit of the...more

California Legislature Nearing Final Debate of Biometric and Geolocation Data Security Bill

With the session ending on August 31st, the California legislature is debating a bill (AB 83) that would expand data security requirements for businesses that maintain personal information of California residents to include,...more

NAIC Exposes Second Draft of Insurance Data Security Model Law

On August 17, 2016, the National Association of Insurance Commissioners’ Cybersecurity Task Force of the Executive Committee exposed for comment the second draft of the Insurance Data Security Model Act. The second exposure...more

OCR to Investigate More HIPAA Breaches Affecting Fewer Than 500 Individuals

On August 18, 2016, the U.S. Department of Health and Human Services (“HHS”), Office for Civil Rights (“OCR”) announced plans to expand its investigations of reported breaches of the Health Insurance Portability and...more

Latest Data Breach Settlement Illustrates Need for Companies to Prioritize Cybersecurity

On Aug. 5, 2016, the New York attorney general, Eric Schneiderman, announced a $100,000 settlement with an e-retailer following an investigation of a data breach that resulted in the potential exposure of more than 25,000...more

NAIC Cybersecurity Task Force Weighs Credit Freezes

On May 24-25, the NAIC Cybersecurity (EX) Task Force held an interim meeting to hear comments from various industry trade organizations and other interested parties on the proposed Insurance Data Security Model Law exposed...more

Health Care E-Note - August 2016

The Alabama Natural Death Act contains the provisions on how an individual may plan for end-of-life decisions. Specifically, it outlines the requirements for a valid Advanced Directive and the removal and withdrawal of life...more

Litigation Alert: The Sixth Circuit Expands Potential Federal Wiretap Act Liability for Developers and Sellers of Cloud-Based...

Last week, the Sixth Circuit expanded potential liability for violations of the Federal Wiretap Act for manufacturers of devices that can be used for wiretapping, like monitoring software, in reversing the dismissal of a...more

Department Of Commerce Agency Seeks Standards For IoT Security

On August 2, the National Telecommunications and Information Administration (“NTIA”), an agency of the Department of Commerce, announced that it would form a multi-stakeholder group to increase transparency for the deployment...more

HIPAA Security Rule Compliance for Providers & Business Associates in Three Easy Steps

On August 4, 2016, the Office for Civil Rights (“OCR”) of the U.S. Health & Human Services Department (“HHS”) announced a $5.55 million HIPAA settlement with Advocate Health Care Network (“Advocate”), the largest...more

Defending a Data Breach Investigation by the Federal Trade Commission

Your company has experienced a data breach, and the Federal Trade Commission (“FTC”) notifies you that it is initiating a non-public investigation. How the company responds can significantly affect the course of the...more

HIPAA Phase 2 Audits: What Has OCR Requested from Auditees to Date?

In our April 8, 2016, advisory, we discussed the U.S. Department of Health and Human Services’ (HHS) Office of Civil Rights (OCR) “Phase 2” audit program. Then, we could only make educated guesses about what documents OCR...more

Eddie Bauer Latest Victim of POS Malware Attack

Last week the clothing retailer Eddie Bauer LLC issued a press release to announce that its point of sale (“POS”) system at retail stores was compromised by malware for more than six months earlier this year. The...more

8,529 Results
|
View per page
Page: of 342

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×