Science, Computers & Technology Privacy Electronic Discovery

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Expect New Cybersecurity Regs from New York DFS

DFS identified several areas that would be the subject of specific requirements in the potential regulations. These include requirements for (i) cyber security policies and procedures, (ii) third-party service provider...more

FFIEC Releases Revised Management Booklet with Emphasis on Sound IT Governance

On November 10, the FFIEC issued a revised Management booklet, which outlines the principles of overall sound governance and, more specifically, IT governance. The booklet is one of 11 that makes up the FFIEC’s Information...more

The LabMD Case: Further Defining the FTC’s Enforcement Powers

The scaffolding of the FTC’s powers in the realm of cybersecurity continues to be built. On Monday, the FTC’s Chief Administrative Law Judge D. Michael Chappell issued an initial decision in the FTC’s closely watched...more

NAIC Cybersecurity Bill of Rights: The Awkward New Guest at the Data Breach Law Party

On October 14, 2015, the NAIC’s Cybersecurity (EX) Task Force adopted a Cybersecurity Bill of Rights, an aspirational, well-intended document outlining the rights insurance consumers should (or could? or might? this point...more

Benchmark surveys: GCs, Executives Not Prepared to Defend Against Cyberbreaches - Key Protective Steps

Although cybersecurity has become a more prominent issue for executives and boards of directors, three recent benchmark surveys - the BDO Board Survey, the 2015 Consero Group’s General Counsel Data Survey, and the 2015 US...more

California Updates Privacy Rights with the Electronic Communications Privacy Act

Starting on New Years Day 2016, a new law will prohibit California law enforcement agencies from compelling California residents and businesses to turn over metadata or electronic communications (e.g., texts, emails,...more

The Land of the Rising Sun—and Rising Data Protection Requirements

Between January 2016 and September 2017, a series of amendments to Japan’s Act on the Protection of Personal Information (APPI) will go into effect. The amendments, which were promulgated in September 2015, are the first...more

White House Issues Cybersecurity Strategy And Implementation Plan Following Cybersecurity Sprint

On October 30, the White House released a memorandum to the heads of federal departments and agencies detailing the Cybersecurity Strategy and Implementation Plan (“CSIP”), a proposal designed to update and bolster federal...more

Privacy Law, Cross-Border Data Flows, and the Trans-Pacific Partnership Agreement: What Counsel Need to Know

Privacy law has become such a hot-button issue that it now finds its way into multilateral trade treaties like the Trans-Pacific Partnership Agreement (TPP or Agreement). On November 5, 2015, the U.S. Trade Representative...more

FCC Issues First Privacy Enforcement Action Against Cable Operator

In the third privacy-related enforcement action of the year, the FCC Enforcement Bureau entered into a $595,000 settlement with Cox Communications to resolve an investigation into the company’s loss of customer personal data....more

Expanding Cybersecurity Safeguarding Requirements, Reporting Obligations, and Cloud-Based Security: A Brief Guide to Understanding...

The United States Department of Defense promulgated an “interim” rule, effective August 26, 2015, which placed imposing and costly burdens on all DoD contractors and subcontractors (including small businesses and commercial...more

Advanced Cyber Security Center Panel Explores Reasonableness in Cybersecurity

I had the pleasure of moderating an excellent panel at the Advanced Cyber Security Center’s annual conference on November 4. The panel’s topic for discussion was “What is Reasonable in Cybersecurity: Responsibility and...more

Senate Passes Legislation To Ease Sharing Of Cybersecurity Threat Information

On October 27, 2015, the Senate passed S. 754, the Cybersecurity Information Sharing Act of 2015 (“CISA”), which addresses how companies can share cyber threat information with the federal government. The legislation aims to...more

NAIC Adopts Cybersecurity Bill of Rights

The National Association of Insurance Commissioners (“NAIC”) continued its efforts to advance cybersecurity in the insurance industry when it recently adopted the Cybersecurity Bill of Rights. The Cybersecurity Bill of Rights...more

Data Breach Planning in 10 Easy Steps: How to Think Like A Litigator

For the first Tuesday in November, we have 10 easy steps to make sure that your data breach incident response planning is viewed from that pesky point of view of a litigator....more

Truth or Consequences: Does the Senate’s Information Sharing Bill Really Help Business?

Reacting to the influx of recent, high-profile data breaches and cybersecurity attacks in the government and the private sector, the U.S. Senate earlier this week passed the controversial Cybersecurity Information Security...more

California Updates Data Security Laws

Why it matters - The first state to enact data breach notification legislation, California has now updated Civil Code Section 1798.82 with three new bills signed into law by Governor Jerry Brown. Specifically, Senate...more

NIST seeks comments on Privacy-Enhanced Identity Brokers project document

The National Cybersecurity Center of Excellence, in partnership with the National Strategy for Trusted Identities in Cyberspace National Program Office, have launched a project designed to embed privacy and security measures...more

Consumer Trust should be at the heart of the Digital Economy

A recent report summary produced by the Organisation for Economic Cooperation and Development (‘OECD’) highlighted that many countries are placing too much emphasis on developing their digital economies and are neglecting the...more

Blog: Implications of the Cybersecurity Bill for the Health Care Industry

On Tuesday the Senate passed the Cybersecurity Information Sharing Act (CISA). The House had passed a similar bill, the Protecting Cyber Networks Act, in April of this year. The Act comes in the wake of many large scale data...more

Board Participation in Cybersecurity: What More Needs to Be Done?

High-profile data breaches seem to hit the headlines almost every day. These breaches have proved terrifying for many companies, particularly as the attackers release embarrassing emails and other information. The frequency...more

New Study Finds Ghost Data Haunts Devices

As the leaves change colors, the air becomes crisp and pumpkin-spiced everything fills the shelves, we think of little (and big) kids going door to door for candy, apple picking, and all those Halloween ghost stories. Not the...more

Eye of the Storm: Be Prepared for Cross-Border Data Compliance Ahead of the January 1 Deadline

The eye at the center of a hurricane is the calmest part of the storm. Winds subside. Blue skies appear. A sense of relief falls over everyone because the immediate danger seems to have passed. But one of the biggest...more

Back to School: A Primer on Cross-Border Discovery Issues

In September, the Sedona Conference released its latest publication on e-discovery matters, Practical In-House Approaches for Cross-Border Discovery & Data Protection, for public comment. The publication addresses a number of...more

Client Alert: Sex, Money and Cybersecurity - Reminders for Public Companies

Recent events have highlighted the importance of comprehensive cyber-security programs for publicly-traded companies. Although the circumstances differ, in each case the impact of employee behavior with electronic...more

143 Results
View per page
Page: of 6

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.