News & Analysis as of

Science, Computers & Technology Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

ACC Issues Data Security Guidelines for In-House Counsel to Evaluate Law Firms

The Association of Corporate Counsel (ACC) has issued its first-ever data security guidelines, which outline basic data security measures that in-house counsel can use to evaluate their outside counsel....more

Medical Supply Company Hit with Class Action TCPA Fax Lawsuit

by Klein Moynihan Turco LLP on

A class action fax lawsuit has been filed against a medical supply company in the federal district court for the Southern District of Illinois. The plaintiff seeks to represent a nationwide class of persons and entities who...more

Lawmakers Push FCC To Confront Cell Phone Cyber Threats

by King & Spalding on

In a letter dated March 28, 2017, Senator Ron Wyden, D-Ore., and Representative Ted Lieu, D-Calif., urged the Federal Communications Commission (“FCC”) to address cybersecurity vulnerabilities in the cell phone industry,...more

China's draft data localisation measures open for comment

by Hogan Lovells on

On 11 April 2017 the Cyberspace Administration of China published a circular calling for comments on its draft Security Assessment for Personal Information and Important Data Transmitted Outside of the People’s Republic of...more

Chinese Government Releases Overreaching Draft Regulations on Cross-Border Data Transfer

by Davis Wright Tremaine LLP on

The Cyber Security Law was adopted in November 2016 and will become effective on June 1, 2017. The Cyber Security Law creates a new concept of Critical Information Infrastructure (“CII”). The operators of CII are subject to...more

Small Healthcare Provider Pays $31,000 for Failing to Have a Business Associate Agreement With File Storage Vendor

by Jackson Lewis P.C. on

Disclosing protected health information (PHI) to a business associate without a compliant business associate agreement (BAA) is an improper disclosure under the HIPAA privacy and security regulations. According to the HHS...more

Data Privacy and Security Legal Reform, and Plaintiffs’ Bar White Paper the Focus of IAPP Panel

by Reed Smith on

A panel on legal reform in the area of privacy and data security at this week’s IAPP Summit provided an opportunity for a discussion between businesses and regulators, as well as for the launch of a white paper on the...more

Deeper Dive: Protecting Paper Records

by BakerHostetler on

Our third annual BakerHostetler Data Security Incident Response Report analyzes the more than 450 data security incidents we led clients through in 2016, and includes a number of interesting trends relating to the causes of...more

Breach Notification Update: New Mexico becomes the 48th State Requiring Breach Notification and Tennessee Adds a Safe Harbor for...

by Sedgwick LLP on

As the frequency of data breaches continues, so do legislative developments on notification requirements that must be met in the event of a breach of Personally Identifiable Information (PII). Even as of now, not every state...more

Six Tips to Consider in Hiring Privacy and Data Security Experts

by Jackson Lewis P.C. on

Facing increasingly pervasive issues relating to privacy and data security companies are faced with what qualifications they should think about when looking to hire experts in these areas, and their role within the company is...more

Privacy Tip #83 – “Alexa, Disconnect Yourself from the Internet Now!” BrickerBot Malware Attacking IoT

We often talk about how anything that is connected to the Internet is hackable and unsafe, and to be careful about how you buy and connect devices, products, appliances, home security systems and other wireless “things.”...more

"The Emerging Need for Cybersecurity Diligence in M&A"

Cybercrime has emerged as one of the foremost threats a company faces. As a result of a few keystrokes, a company may find its customers’ data sold on the dark web, its intellectual property in the hands of a competitor or...more

Federal Class Action Lawsuit Highlights Importance of Sweepstakes Lawyer

by Klein Moynihan Turco LLP on

Last month, a federal district court in Detroit refused to dismiss a putative class action lawsuit filed against Dunham’s Athleisure Corporation (“Dunham’s”) concerning the regional sporting goods retailer’s sweepstakes...more

There Is More To Come In Europe: The Draft Of The ePrivacy Regulation

by King & Spalding on

In January 2017, the European Commission (the “EC”) published its proposal for a new ePrivacy Regulation (the “ePrivacy Proposal”), which will replace the ePrivacy Directive of 2002 (2002/58/EC) and the Cookie Directives of...more

InterContinental Hotels Reports Credit Card Breach

InterContinental Hotels Group (IHG) has reported a data breach of its payment card processing system. The breach involves malware that infected certain locations between September 29, 2016, and December 29, 2016. The malware...more

New Mexico Becomes 48th State to Enact Data Breach Notification Law

by Ballard Spahr LLP on

New Mexico recently became the 48th state to enact a data breach notification law. This continues the accelerated pace of state data breach legislative activity in the last two years. Since 2015, at least 41 states have...more

Regulation of Fintech in Canada

by Dentons on

This article provides Fintech startups and investors with an overview of the regulatory framework that applies to the Fintech industry and the issues that they need to be aware of as they navigate the shifting regulatory...more

French CNIL Releases GDPR Compliance Toolkit

by Alston & Bird on

On March 15, 2017, the French data protection authority (CNIL) released its six step- GDPR compliance program together with GDPR-tailored templates for use by companies, the “GDPR Toolkit.” The GDPR Toolkit is helpful for...more

The New Privacy Shield Twist

by Conduent on

The new Privacy Shield Framework was created to help American companies protect EU customer data privacy. However, in an unexpected twist, uncertainties may threaten the Privacy Shield: The White House passed a directive in...more

Processor BCRs Under the GDPR: Realizing the Potential

by Alston & Bird on

Binding Corporate Rules (BCRs) are an intracompany code of conduct that regulates the principles and rules that apply to the processing and transfer of personal data within a company group, including cross-border. BCRs were...more

New Mexico Enacts Data Breach Notification Act (Updated)

by Jackson Lewis P.C. on

New Mexico has become the 48th state to enact a data breach notification law requiring that individuals be notified of security breaches of information involving personal identifying information. Governor Susana Martinez...more

“Geofencing” and Health-Related Targeted Advertising: Massachusetts AG Has Something to Say

by Kelley Drye & Warren LLP on

Earlier this month, the Massachusetts Attorney General announced that her office had reached a settlement with a digital advertising company, Copley Advertising, Inc. (Copley), prohibiting the company from using mobile...more

Banks’ Boards of Directors Face New Cybersecurity Challenges

by BakerHostetler on

Banks’ boards of directors must, among other things, understand the risks associated with existing and planned IT operations, monitor risk management, and work with senior bank managers on strategic technology planning. See...more

Deeper Dive: Frequency and Severity

by BakerHostetler on

All industries are affected by cyberattacks, but how often and to what extent they occur vary greatly by industry type. As for frequency, the healthcare industry in 2016, for the third year in a row, saw the greatest...more

TCPA Connect - April 2017

FCC Combats Spoofed Robocalls - As part of an initiative that would enable voice service providers to better protect subscribers from illegal and fraudulent robocalls, the Federal Communications Commission has released a...more

10,198 Results
|
View per page
Page: of 408
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!