Science, Computers & Technology Privacy Elections & Politics

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

The Cybersecurity Act of 2015: Implications for Threat Sharing

On December 18, 2015, President Obama signed the Cybersecurity Act of 2015 (The “Act”), legislation designed to combat online threats to the federal government, state and local governments, and private entities. Within the...more

Revised Safe Harbor Agreed: Introducing the New “EU-U.S. Privacy Shield”

European Commission and U.S. officials today announced reaching a “political agreement” on a new Safe Harbor framework. The new framework will be called the “EU-U.S. Privacy Shield.” ...more

Class action suit dismissed against Georgia Secretary of State for data breach

We previously reported that the Georgia Secretary of State’s office experienced a massive data breach in October, and didn’t find out about it until November. The breach affected approximately 6 million Georgian voters, and...more

New EU US Privacy Shield Announced as a Replacement for the EU US Safe Harbor Program

February 2nd the European Commission and the Department of Commerce announced that they have reached an agreement on a new framework to replace the EU US Safe Harbor Program. The European Court of Justice (ECJ) found the...more

Negotiators Reach Agreement on Replacement EU-U.S. Safe Harbor

After nearly four months of diplomatic discussions, negotiators reached agreement on February 2, on how the U.S. and the European Union share data across the Atlantic. The new agreement, called the EU-U.S. Privacy Shield,...more

Legal Developments in Connected Car Arena Provide Glimpse of Privacy and Data Security Regulation in Internet of Things

With the holiday season in the rear view, automobiles equipped with the newest technology connecting carmakers with their vehicles, vehicles with the world around them, and drivers with the consumer marketplace – Connected...more

Washington Healthcare Update

This Week: Because of the Blizzard of 2016—also known as “Snowzilla”—in Washington, D.C., and other parts of the East Coast, this is a combined issue... The House of Representatives opted not to come back to town until next...more

New Bill Would Require Cybersecurity Disclosures by Publicly Traded Companies

Why it matters - In the continuing efforts to enact cybersecurity legislation and advise the public about cybersecurity preparedness, a new bill introduced in the Senate would mandate that publicly traded companies...more

New Safe Harbor Deal Possible by February 1

Companies anxiously watching their calendars to see if a new Safe Harbor program will be introduced before the end of January may get their wish: on January 28, 2016, a European Commission official announced that the...more

CISA Is Now Law—What It Means for Your Organization

After several fits and starts, Congress finally passed the Cyber Information Sharing Act of 2015 (CISA) as part of the omnibus budget bill. President Obama signed the bill into law on December 18, 2015. CISA allows—but...more

Tying it all together: Safe Harbor and Security-Related Data Flows

One of the fascinating aspects of the privacy-related negotiations between the EU and the US over the past couple of years has been the EU’s efforts to decouple trade (e.g, TTIP) and security-related negotiations from the...more

Happy Data Protection Day! ICO and Senate Committee’s spotlight on data protection

In preparation for European Data Protection Day on 28 January, the ICO commissioned a survey on attitudes towards data protection. The YouGov poll revealed growing public concern over data privacy and security. Of more...more

Cybersecurity Act Of 2015 Aims To Bolster Cybersecurity In Health Care Industry

Section 405 of Title IV of the Cybersecurity Act is tailored specifically to cybersecurity matters affecting public and private health care entities. Section 405 of Title IV seeks to improve the cybersecurity landscape in...more

Federal Agencies To Secure Information Systems And Assess Adequacy Of Cyber-Related Workforce

Two provisions of the Cybersecurity Act of 2015—the Federal Cybersecurity Enhancement Act and the Federal Cybersecurity Workforce Assessment Act?task the Department of Homeland Security (“DHS”) and the Office of Management...more

The President’s Precision Medicine Initiative – The First Annual Check-Up

Watching President Obama’s recent 2016 State of the Union Address reminded me that one year has passed since the President announced a new “precision” or personalized medicine initiative to advance personalized, effective...more

Cyber Activities Added to the OFAC Target List – How do you ensure you are compliant?

In December of 2015 the Department of the Treasury’s Office of Foreign Assets Control (“OFAC”) issued regulations implementing the President’s April 1, 2015 Executive Order (“EO”), “Blocking the Property of Certain Persons...more

Spies, Hacking & Civil Liberties in the UK

In late 2015, Theresa May, the UK Home Secretary introduced the Investigatory Powers Bill (the “Bill”). Mrs May stated that the Bill was introduced to ensure that surveillance laws are “modern, fit for purpose and can...more

Key CISA Provisions Impacting Private Entities

On December 18, 2015, President Obama signed the Cybersecurity Information Sharing Act (“CISA”), which was the culmination of intense negotiations that reconciled three separate cybersecurity bills passed by the U.S. Senate...more

New Rhode Island Law Protects Victims of Businesses’ Data Breaches in 2016

Cyber data breaches affect individuals, businesses, and the government. Tens of millions of Americans are affected by data breaches every year. In 2014, CNN estimated that 47% of U.S. adults in the U.S. had their personal...more

2016 Outlook: NHTSA, Automotive Safety, and Cybersecurity

2016 will likely be an active year for the National Highway Traffic Safety Administration (NHTSA) and increased enforcement actions and new technology and privacy measures are expected. Below are four things to keep in mind...more

Safe Harbor 2.0 – Is It Happening?

It is the beginning of 2016, and American companies are anxiously awaiting news of whether or not a new “Safe Harbor 2.0” will emerge. In October of 2015, the European Court of Justice declared invalid Safe Harbor 1.0 in the...more

Washington State Creates New Cybersecurity Office

On Wednesday, January 6, 2016, Washington Governor Jay Inslee signed an executive order establishing a new state Office of Privacy and Data Protection. The order was signed alongside Gov. Inslee’s announcement of a strategic...more

CISA Gives Leeway in Network Monitoring, But Not Without Risk

As we wrote last week, The Cybersecurity Act of 2015 – better known to some as the Cybersecurity Information Sharing Act of 2015 – was signed into law in December 2015. Privacy advocates had decried CISA in its original form...more

China Passes (De) Encryption Cyber Law

On December 27, 2015, the Standing Committee of the National People's Congress, China's national legislative body, passed the Counter-Terrorism Law of China, which entered into force on January 1, 2016. Although the law's...more

Online Terrorism Reporting Act Revived In Light Of San Bernardino Shootings

Within hours after a pair of shooters killed fourteen people in San Bernardino, California, reports emerged that one of the perpetrators had sworn allegiance to ISIS immediately before the attack. In the week following,...more

509 Results
|
View per page
Page: of 21

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×