Cloud Computing Data Protection

News & Analysis as of

[Webinar] Cloud Computing 101- How It Works, What Are Its Risks and What Are Its Rewards - Oct. 14th, 12:00pm CDT

Are you using the Cloud? Are you thinking about using the Cloud? Are you confused by why you should care about the Cloud or what the Cloud has to offer? Are you concerned there are issues with using the Cloud that you're not...more

US–EU Safe Harbor – Struck Down!

1. CJEU finds Safe Harbor Invalid - In a landmark ruling delivered today, Europe's highest court, the Court of Justice of the European Union (CJEU) declared that the EU Commission's US - EU Safe Harbour regime is...more

Systema Software exposes information of 1.5 million on Amazon Web Service

Systema Software, which provides software solutions for claims management, is investigating a breach (although it was discovered, accessed and confirmed by an independent third party) involving information of 1.5 million...more

Frequently Asked Questions Regarding Trade Secret Disputes and Employment Risks

In today’s post, we have answered some of the most frequent and significant questions that we are asked about trade secret disputes and employment risks. 1. Could you provide a brief snapshot of current trends in...more

Interim rule requires Department of Defense contractors to report cyber breaches

Companies doing business with the U.S. Department of Defense are facing new requirements for reporting data security breaches and for acquiring cloud computing services. The Interim Rule, effective August 26, 2015, amends the...more

Strange Bedfellows: Technology Issues in Real Estate Transactions, Part 2

This blog is the second part of a two-part series on key contracting issues with technology service providers, and the focus is specifically geared toward companies doing business in the real estate industry. As noted in Part...more

DoD New Cyber Security Reporting Rules for Contractors

In a move that highlights the changing winds of federal cybersecurity policy, the Department of Defense (“DoD”) has issued an interim Rule (“Rule”) that imposes new security and reporting requirements on federal contractors,...more

DoD's New Cybersecurity and Cloud Standards and Reporting Requirements

The Department of Defense (DoD) released interim rules implementing provisions of the 2013 and 2015 National Defense Authorization Acts. The rules, released on Aug. 26, 2015, are effective immediately and establish the...more

New Guidance for Financial Institution Directors and Officers In Cybersecurity Preparedness

Earlier this summer, the Federal Financial Institutions Examination Council (FFIEC) released its highly anticipated Cybersecurity Assessment Tool (Assessment), which is designed to assist financial institutions in identifying...more

Cybersecurity Update - July 2015

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

Trade Secrets, Security, and Cloud Computing: Best Practices Now

As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more

Proposed Change to Export Controls Would Allow Use of the Cloud for Encrypted Data

On June 3, 2015 the State Department’s Directorate of Defense Trade Controls (DDTC) and the Commerce Department’s Bureau of Industry and Security (BIS) published proposed regulations which would change the definition of the...more

ISO’s Cloud Privacy Standard: A Guide for Lawyers’ “Reasonable Efforts” to Protect Client Information

Rule 1.1 of the Model Rules of Professional Conduct requires that all lawyers provide “competent representation to a client.” In August 2012, the ABA added new language to Model Rule 1.1, comment 8: To maintain the...more

Ethical Issues Implicated by Lawyers’ Use of Third-Party Cloud Services

Law firms increasingly turn to “cloud services” for processing and storing confidential client information because of their greater flexibility and efficiency. Use of “the cloud,” however, outsources the administration,...more

Is Privacy Dead?

If the Internet and social media have not already killed privacy, Big Data and the Internet of Things (IoT) are likely to finish the job. As 91 percent of American consumers agreed in a recent Pew Research Center survey,...more

ISO develops the first privacy-specific cloud standard

Earlier in 2014, the International Standards Organisation (ISO) developed a new voluntary standard, ISO 27018 (Standard), establishing commonly accepted control objectives and guidelines to protect personal information for a...more

On the Fifth Day of Privacy, California (and Delaware) gave to me

sing it with me now…. Five Golden Rules…….(well, five new privacy laws/requirements) There are five significant new privacy laws/amendments that will be effective as of New Year’s Day — January 1, 2015 — and...more

Both Sides Now: Cloud Security and Privacy Enter the Modern Era with ISO 27018

Until recently, many cloud users felt like Joni Mitchell in her classic song, “Both Sides Now.” No matter how you looked at clouds, you never really understood them, how they worked, or what happened inside them. Cloud...more

IP | Trend: Data in the Cloud is the Next Big Storm? [Video]

Convenience, accessibility, and cost have led companies and their employees to put an increased amount of data in the cloud. But, does this put corporate data at risk? Attorneys Seth Northrop and Sam Walling discuss some of...more

Privacy in the Cloud: A Legal Framework for Moving Personal Data to the Cloud

For many companies, the main question about cloud computing is no longer whether to move their data to the “cloud,” but how they can accomplish this transition. Cloud (or Internet-based on-demand) computing involves a shift...more

Nude Photos and National Cyber Security Awareness Month

October is National Cyber Security Awareness Month. This is an opportunity to remind employees (and yourselves) about how to keep corporate networks and their own cyber lives secure. All month, we will post articles that...more

Redaction: Protecting Your Private Digital Data

In today’s digital age, no person’s private information is considered off limits by hackers. Recently, several celebrities, including Jennifer Lawrence and Kate Upton, had their iCloud storage accounts hacked and their...more

California Breaks New Ground in Education Privacy Law with K-12 Student Data Privacy Bill

A substantial rise in schools’ use of online educational technology products has caused educators to become increasingly reliant on these products to develop their curricula, deliver materials to students in real time, and...more

Lessons from the iCloud Celebrity Hack

The highly publicized hacking of the iCloud accounts of dozens of celebrities was disclosed over Labor Day weekend and has raised larger, more serious concerns regarding the security of personal and corporate data held in the...more

Cloud Hacking Incidents May Prompt Congress and the Administration to Turn Attention Again to Mobile Privacy Issues

With the recent theft and release of several celebrities’ private photographs (many of which appear to have been taken with, and stored on, mobile devices), mobile privacy and the protection of sensitive data stored or...more

70 Results
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.