News & Analysis as of

Cybersecurity Federal Trade Commission

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -

FTC Submits Comments on IoT Security

by Morgan Lewis on

The Federal Trade Commission (FTC) submitted public comments to the US Department of Commerce’s National Telecommunications and Information Administration (NTIA) in connection with the NTIA’s draft guidance on improving the...more

Financial Services Weekly News - June 2017

by Goodwin on

Editor's Note - Supreme Court Limits SEC’s Disgorgement Powers. On June 5, the United States Supreme Court ruled unanimously in Kokesh v. Securities and Exchange Commission that disgorgement in a Securities and Exchange...more

Transportation Disrupted: AI in the Driver's Seat

Eversheds Sutherland Lawyers Share Insights on Data Privacy, Cybersecurity, Intellectual Property and other Challenges Raised by Autonomous and Connected Cars - On May 3, 2017, Eversheds Sutherland hosted Transportation...more

Global Privacy & Cybersecurity Update Vol. 14

by Jones Day on

New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more

Privacy & Cybersecurity Update - May 2017

In this edition of our Privacy and Cybersecurity Update, we take a look at the Trump administration's executive order outlining its cybersecurity plans, Acting FTC Chairwoman Maureen Ohlhausen's comments on the possible...more

FTC Launches Website to Help Small Businesses with Cyber Attacks

The Federal Trade Commission (FTC) announced on May 9, 2017, that it has launched a new website that “helps small businesses avoid scams and cyber-attacks.”...more

Babies and Baby-making, or Not… Privacy and Security Lessons for the Internet of Things

by BakerHostetler on

What do babies, sex toys and wireless head phones have in common? Apparently, the privacy concerns of the Federal Trade Commission (FTC), state AGs and legislatures, class action plaintiffs, and consumer advocacy groups, at...more

Cybersecurity and the New Trump Administration: Your Top Ten Questions Answered

by Foley & Lardner LLP on

Since President Trump’s inauguration, cybersecurity has been in the news almost daily – often on the front page. The U.S. Government is facing a wide array of challenges in cybersecurity, impacting both domestic and foreign...more

Advertising Litigation Report: Vol. 2, No. 2 - Consumer Privacy and Data Security

Judge Trims Proposed Class Action Over Wendy’s Data Breach - Torres v. Wendy’s Int’l, LLC, No. 16-cv-0210 (PGB) (DCI) (M.D. Fla. Mar. 21, 2017). A U.S. district court judge in Florida trimmed a proposed class action...more

California Bill Mandates Privacy By Design For IoT Devices

Manufacturers of Internet-connected devices (better known as the Internet of Things) should be following a new California bill closely because it would create a mandate under California law that all IoT devices have built-in...more

Reading the Tea Leaves: What Lies Ahead for Broadband Privacy Regulation?

On April 3, 2017, President Trump signed into law a rare Joint Resolution of Congress under the Congressional Review Act (“CRA”), which disapproved the Broadband Privacy Rules adopted late last year by then-Chairman Wheeler’s...more

FTC resolves allegations against three U.S. based companies involving misrepresentations of International Privacy Program...

Privacy laws in Asia-Pacific countries such as Japan, Australia, New Zealand and Singapore restrict the export of personal information except when the exporter meets certain qualifying conditions. One qualifying condition is...more

Guidebook: Cybersecurity in the Pharma, Biotech, and Medical Devices Industries

by Foley & Lardner LLP on

As a life sciences or medical device company, it is mission critical to protect lab books, drug and clinical test data, product formulas and production processes that underlie your patents, trade secrets and know-how from...more

"Privacy & Cybersecurity Update - March 2017"

In this edition of our Privacy & Cybersecurity Update, we discuss the Congressional vote to repeal the FCC Privacy Rule, new cybersecurity developments from the Trump administration and the FTC's new guidance to companies on...more

Legal Issues Business Leaders Need to Know in 2017

by Arnall Golden Gregory LLP on

Expanding wage and hour obligations will continue to be a top concern for employers in 2017. As most employers are aware, in May 2016, the United States Department of Labor issued its long-awaited final rule regarding the...more

Privacy Tip #78 – Cybersecurity Aids for Small Businesses

I frequently get complaints from small businesses that they don’t have the resources or resilience to properly address cybersecurity and that it is overwhelming to them. Well, it is. We frequently tell businesses that...more

Global Privacy & Cybersecurity Update Vol. 13

by Jones Day on

On December 28, 2016, the New York Department of Financial Services ("DFS") released a revised version of a proposed regulation that would require banks, insurance companies, and other financial services institutions...more

Scratching the Surface: The FTC’s Phishing Tips for Victim Companies Are a Good First Step but Companies Should Not Stop There

by Carlton Fields on

In one type of phishing, fraudsters impersonate your business when contacting consumers. Phishing victims think they’re giving information to your company — by phone or Internet —but instead give personal or financial...more

Privacy Tip #77 – FTC Offers Tips to Businesses That Have Been Impersonated by Phishing Schemes

On March 6, 2017, the Federal Trade Commission (FTC) released tips and a video to businesses that have been impersonated by Phishing schemes. The guidance, entitled “Has a phishing scam hooked your company’s good name?”...more

The FTC’s Public Comment on the NTIA’s Draft Coordinated Vulnerability Disclosure Template Reflects Further Support for the NIST’s...

by Moore & Van Allen PLLC on

In August 2016, the Federal Trade Commission (“FTC”) addressed the effect of the Cybersecurity Framework (“NIST Framework”) issued by the National Institute of Standards and Technology on FTC enforcement actions under Section...more

Analysis: Cyber-Monitoring: The Next Frontier

by Dickinson Wright on

Cybersecurity is “hot” and will stay “hot” for corporations, executives, regulators, law enforcement and legislators. Rarely is there a corporate compliance discussion in 2017 where cyber isn’t “the” topic or a material part...more

"Privacy & Cybersecurity Update - February 2017"

In this edition of our Privacy & Cybersecurity Update, we look at a series of recent court rulings regarding standing in privacy cases, most of which suggest plaintiffs will continue to have a difficult time establishing...more

A Primer On FTC Cybersecurity Enforcement

According to the Breach Level Index, the total number of data records lost or stolen in just the first half of 2016 was 554,454,942, stemming from 974 breach incidents. In the entire year of 2015, there were 707.5 million...more

Ransomware: A How-To Guide

by Bryan Cave on

Some forms of cyber extortion are automated and not targeted at any specific victim. For example, “ransomware” refers to a type of malware that prevents users from accessing their systems unless, and until, a ransom is paid....more

Cybersecurity 2017: The Year in Preview

by Foley Hoag LLP on

Introduction - Cybersecurity was a prominent factor in 2016 in all aspects of government, business and personal affairs. Russian and other foreign national hacking has the potential to spark a new form of cold...more

439 Results
|
View per page
Page: of 18
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.