News & Analysis as of

Science, Computers & Technology Consumer Protection

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

President Trump's Executive Order on Cybersecurity

by King & Spalding on

On May 11, 2017, President Trump signed a long-awaited Executive Order that aims to bolster the cybersecurity of federal networks and critical infrastructure. In an effort to fulfill the President’s promise to get “tough on...more

Excessive pricing in pharmaceutical products attracts the European Commission's attention

by Hogan Lovells on

In recent years competition authorities in a number of EU Member States have stepped up in their pursuit against companies active in the Life Sciences sector for excessive pricing. Last week, the European Commission issued a...more

New Duties for Lawyers? The ABA Weighs In on Cybersecurity.

Recently, the ABA Standing Committee on Ethics and Professional Responsibility issued Formal Opinion 477, which aims to provide guidance and clarity to lawyers as they consider what level of security to give communications...more

Superior Court Invalidates Hexavalent Chromium Drinking Water Standard

Earlier this month, Judge Christopher E. Krueger of the Sacramento Superior Court issued an order invalidating the Maximum Contaminant Level (MCL) for hexavalent chromium. The California Department of Public Health (“DPH”)...more

WannaCry Ransomware Cyberattack Raises Legal Issues

by Morgan Lewis on

The recent cyberattack highlights the need for firms to engage in proactive prevention and protection. Ransomware (malware that encrypts data pending an extortion payment) is a recurring cyber threat that is growing more...more

Privacy Perils: Strong Passwords IV: The Phrase Awakens

by Bass, Berry & Sims PLC on

Previous Tips have warned of the use of easily-guessed passwords, and have provided suggested methods to strengthen them, including use of...more

Self-Sovereign Identity and Distributed Ledger Technology : Framing the Legal Issues

by Perkins Coie on

Purpose - Distributed ledger technology (“DLT”), including the use of blockchain technology, has been touted as a way to create and validate digital identities that serve many of the same purposes that physical forms of...more

The FTC Seeks Comment: How Trusty Is The TRUSTe Plan For COPPA Certification?

by King & Spalding on

The Federal Trade Commission (FTC) is currently seeking comment on proposed changes to TRUSTe’s safe harbor program under the agency’s Children’s Online Privacy Protection Rule (COPPA). Per the Federal Register notice, the...more

Global Inquiries into Drug Price Increases

European competition authorities announced this week an investigation into Aspen Pharmacare’s recent price hikes of five cancer drugs. The European Commission said in a press release that it had “information indicating that...more

Are Healthcare Systems Being Held Hostage by Ransomware?

by Revision Legal on

Healthcare ransomware is one of the biggest cybersecurity concerns in existence and it may have particularly serious implications for healthcare systems. Ransomware is a form of malicious software code that is somehow...more

Is the Government Protecting Your Private Information?

by Reed Smith on

We were not affected by the recent ransomware attack that disabled computers worldwide, including in multiple public hospitals in the UK. At least not yet. For those who have never had the pleasure or who otherwise do not...more

Data Security Under Commissioner Ohlhausen: What You Need to Know

The Federal Trade Commission (FTC) has been a critically important regulator of cybersecurity practices in the US, using its authority under Section 5 of the FTC Act to bring enforcement actions against companies for failing...more

Australia And China Establish Cybersecurity Agreement

by King & Spalding on

On April 21, 2017, Australia and China forged an agreement to expand their cybersecurity cooperation. This agreement emerged as part of the Australia-China High-Level Security Dialogue held in Sydney. ...more

Cybersecurity, A-Z: C is for CFAA

The Computer Fraud and Abuse Act, or CFAA, is the federal “anti-hacking” statute (or sometimes referred to as a “computer trespass” statute). In essence, the CFAA prohibits intentional unauthorized access into another...more

Financial Services Weekly News - May 2017 #3

by Goodwin on

Editor's Note - The Dual Banking System is Working. In the April 26 edition of the Roundup, we noted that the Conference of State Bank Supervisors (CSBS) had sued the Office of the Comptroller of the Currency (OCC),...more

United States Department Of Justice Seeks To Dismantle Massive Kelihos Botnet, Files Complaint In Federal District Court

by King & Spalding on

The United States Department of Justice (“DOJ”) recently announced that it would be undertaking an “extensive effort to disrupt and dismantle the Kelihos botnet – a global network of tens of thousands of infected computers...more

NIST Plans To Examine Internet of Things (IoT) For Its Cybersecurity Framework

by Dentons on

The National Institute of Standards and Technology (NIST) is holding a Cybersecurity Framework Workshop this week at its headquarters in Gaithersburg, Maryland. The purpose of the workshop is to discuss issues related to its...more

Yesterday, #WannaCry. Today, #DocuSignPhish

Another day, another data incident. If you use DocuSign, you’ll want to pay attention. The provider of e-signature technology has acknowledged a data breach incident in which an unauthorized third party gained access to...more

President Trump Signs Executive Order Holding Agency Directors Accountable for Cybersecurity

Five months after rejecting a less detailed executive order on cybersecurity, Trump signed one on May 11, 2017 (Order). The Order notifies federal agencies that the “President will hold heads of executive departments and...more

Senator To Propose ISP Consumer Privacy Bill

by King & Spalding on

On Friday, April 14, 2017, Senator Richard Blumenthal (D-Conn.) announced his plan to introduce a bill that would allow the Federal Trade Commission (“FTC”) to regulate consumer privacy protections regarding Internet service...more

Personal Data Held by Government Agencies Now Heavily Protected in Mexico

by Jones Day on

On January 27, 2017, Mexico's General Law on the Protection of Personal Data Held by Regulated Subjects ("Law") became effective. The Law establishes procedures to protect personal data held by government agencies and other...more

Standing hurdles continue to bedevil data breach plaintiffs

Plaintiffs presenting a claim in federal court must have standing to sue, under Article III of the Constitution (as we have written about in the past). The Second Circuit recently entered an order reminding plaintiffs,...more

Offer of Judgment Fails to Defeat TCPA Fax Class Action

by Klein Moynihan Turco LLP on

On May 8, 2017, the United States District Court for the Southern District of New York issued a ruling rejecting Educational Testing Service’s (“ETS”) attempt to moot a class action brought pursuant to the Telephone Consumer...more

The New Cybersecurity Executive Order: What It Does and When

“Will the President sign it?” I asked in a recent post. As if in direct answer, the President issued the order the same day , May 11, 2017. The order is titled Strengthening the Cybersecurity of Federal Networks and Critical...more

Vision 2020: an alternative to an OCC fintech charter?

by Ballard Spahr LLP on

On May 10, the Conference of State Bank Supervisors (CSBS) announced a series of initiatives (branded as Vision 2020) designed to modernize state regulation of non-banks. The announcement specifically calls out financial...more

4,916 Results
|
View per page
Page: of 197
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!