Science, Computers & Technology Privacy General Business

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Cloud Data Security Standards Reach New Heights?

Issues of data privacy and security are central to most cloud contract negotiations. While cloud service providers may be willing to take responsibility for the integrity of their networks, accepting obligations in relation...more

10 Tips for Fostering a Business Culture of Cybersecurity Awareness

Businesses are recognizing the need for new approaches to data security as high-profile cybersecurity incidents reveal the true impact a data breach can have on an organization. One of the biggest realizations is that IT...more

A New Cyber World Framework to Strengthen Agency Information Security

Manufacturers, defense suppliers and other federal contractors may benefit from a new cybersecurity law intended to safeguard agency information and help bolster defenses to future cyber threats. The Federal Information...more

FISMA II: A New Cyber World Framework to Strengthen Agency Information Security

As part of the Obama administration’s legislative efforts to safeguard government agency information, the Federal Information Security Modernization Act of 2014 (FISMA II) was recently enacted to fortify and update its 2002...more

Federal Court Holds that Data Breach Plaintiffs Have No Standing Unless They Show Misuse

Storm v. Paytime, Inc. — a recent case decided by the U.S. District Court for the Middle District of Pennsylvania — gives companies that have suffered third-party data breaches another decision to support dismissing class...more

Alert: Website Terms and Conditions: A Call for Clarity

The UK House of Commons has highlighted the need for clarity of website terms and conditions in order to allow users to provide their "informed consent" to the terms....more

Cybersecurity: Mitigating the Legal Risks of On-Line Banking With Business Customers

On-line or electronic banking (“e-banking”) offers many well-known advantages to financial institutions engaged in banking and to their business customers. A significant risk of on-line bank accounts for both financial...more

Website Terms of Use. You Need Them. Here's Why...

Terms of Use (TOU) are, in effect, a contract between the users and the provider of a website. In the “olden” days (like 1992!), when websites were static and information was simply transmitted from the provider to the user,...more

Proposed Settlement in Target Data Breach Litigation

A proposed settlement has been reached in the multi-district consumer litigation Target faces following a data breach that compromised at least 40 million credit cards during the 2013 holiday shopping season. The settlement,...more

Update: Proposed Settlement in Target Data Breach Litigation

The proposed settlement agreement in the Target data breach consumer litigation that we reported on on March 19, 2015 has been approved by the judge, and a final approval hearing set for November 10, 2015. Based on this...more

The Next Big Thing: Enforcing Terms of Service in an Internet of Things World

While a universally accepted definition of the Internet of Things (IoT) does not yet exist, the phrase has been coined to refer to the ability of everyday objects to connect to the Internet and to send and receive data. Thus,...more

The Auto Industry: The Next "Big" Target for Hackers?

Given the exponential rise in security breaches and hacking activity in past few years and the almost constant headlines in the press of yet another major security breach, information security should be a front burner issue...more

NAIC Amps Up Cybersecurity Oversight

The NAIC has begun its efforts to amp up state insurance department oversight of cybersecurity practices with the release of two documents for public comment. The first, entitled Principles for Effective Cybersecurity...more

Business information and data processing: tidbits on the draft Code of Conduct

On March 11, 2015 the Italian Data Protection Authority (Garante per la protezione dei dati personali, the “Italian DPA“) initiated a public consultation on the draft Code of Conduct concerning the processing of personal data...more

Blog: HIPAA FAQ Series: Are Covered Entities Liable for Business Associates’ HIPAA Violations?

This post marks the beginning of a new series on this blog covering various frequently asked questions regarding the Health Insurance Portability and Accountability Act (HIPAA). ...more

Top Business Risks For Cloud Computing

As anyone who watches television knows, cloud computing is a term that is as ubiquitous as “scalable” and “software as a service.” The decision to utilize cloud technology offers many benefits. But for the business lawyer...more

New FDA Guidance Opens the Door for Electronic Consent Forms That Come with Significant Advantages and Raise Privacy and Secure...

On March 9, 2015, the U.S. Food and Drug Administration (FDA) published a draft guidance that allows for the use of electronic informed consent (eIC) in human clinical trials. eICs have the potential to...more

EMV Credit Cards Are Coming, But Consumers Must Stay Vigilant

Major credit card companies, including Visa, MasterCard, Discover, and American Express, have announced plans to switch to EMV cards in the United States over the course of 2015. ...more

Reps. Burgess, Blackburn and Welch Release Data Breach Bill

On Thursday, March 12, 2015, House Energy & Commerce Subcommittee on Commerce, Manufacturing, and Trade Chairman Michael Burgess (R-TX), along with Reps. Marsha Blackburn (R-TN) and Peter Welch (D-VT), released draft text of...more

Food Industry Continues to Face Data Privacy and Security Risk

In 2014, grocers and restaurants continued to be plagued by attacks leading to the theft of credit card information. Among others, Supervalu Inc. and Jimmy John’s both experienced intrusions in 2014, extending the string of...more

Court's Interpretation of Merchant Services Agreement Limits Retailer's Liability to Card Brands for Data Breach

On January 15, 2015, the U.S. District Court for the Eastern District of Missouri ruled that fees, assessments and costs imposed by the credit card brands on Schnuck Markets, Inc. (Schnuck), a grocery chain estimated to have...more

Business Litigation Report - February 2015

- Firm News: - Main Article: ..Traversing the Breach: Why You Need to Prepare for Data Breaches and How to Do It - Noted With Interest: ..Direct Purchasers and End Payors Accuse Brand Pharma of...more

Illinois Attorney General Calls For Tougher Data Breach Laws

Illinois Attorney General Lisa Madigan recently announced a legislative initiative proposing to strengthen Illinois’ Personal Information Protection Act (“PIPA”) amid increased threats of cyberattacks and growing public...more

A Different Kind of Data Breach—Loss or Disclosure of Company Information by Employee Theft

Data breaches are all over the news, but those stories most often cover high-profile cybersecurity breaches that result from the malicious efforts of hackers or other outsiders. Just as insidious, and more likely to occur,...more

What is a Privacy Policy? – Part 1

A privacy policy is a key legal document in this new era of Big/Data/Breaches. When distilled to its essence, a privacy policy is simply “say what you do, and do what you say” with others’ personal information. A growing...more

1,317 Results
|
View per page
Page: of 53

Follow Science, Computers & Technology Updates on: