Cybersecurity Federal Trade Commission

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Privacy and Data Protection: 2014 Year in Review

In 2014, regulators around the globe issued guidelines, legislation and penalties in an effort to enhance security and control within the ever-shifting field of privacy and data protection. The Federal Trade Commission...more

Survey Says Sharing Information is Crucial in a Volatile Data Security Environment

Information sharing allows for better insight into existing threats and vulnerabilities and alerts organizations to the existence of important data that can help prevent cyberattacks and mitigate the effects of ongoing...more

Privacy & Cybersecurity Update - November 2014

In This Issue: - EU Issues Guidelines on ‘Right to be Forgotten’ - FFIEC Observations on Bank Cybersecurity Provides Important Guidelines for Every Industry - Remarks by Comptroller Curry Highlight OCC...more

Cyber Security Top Priority in Today’s Tech-Savvy World

While 2014 Has Seen Miami Emerge as a Growing Technology Hub, the Year Has Also Highlighted Significant Risks that Technology Poses for Businesses of all Types....more

Hold Your Cards Close: Data Protection and the Gaming Industry

Increased cybercrimes and data security threats have recently made headline news with reports of massive data security breaches at major U.S. companies, including Target and more recently, The Home Depot. Risks of data...more

European Union Versus United States Approaches to Cyber-Security

The thing about electronic data is that it is not subject to traditional geographical boundaries. Policyholders must navigate a patch work of regulations that often significantly differ from jurisdiction to jurisdiction. ...more

DOJ Issues First Business Review Letter Following Agencies’ Joint Policy Statements on Cybersecurity

On October 2, 2014, the U.S. Department of Justice (DOJ) issued its first business review letter since issuing jointly with the Federal Trade Commission (FTC) the Agencies’ Antitrust Policy Statement on Sharing of...more

Consequences of a Data Breach: Lessons from Wyndham Worldwide

On October 20, 2014, Wyndham Worldwide Corporation won dismissal of a shareholder derivative suit seeking damages arising out of three data breaches that occurred between 2008 and 2010. Dennis Palkon, et al. v. Stephen P....more

Court Dismisses Shareholder Derivative Action Targeting Directors and Officers for Data Breaches

Earlier this week a federal district court in New Jersey dismissed with prejudice a shareholder derivative suit, Palkon v. Holmes, No. 14-CV-01234 (SRC) (D.N.J.), that tried to blame the directors and officers at hospitality...more

DOJ Will Not Challenge Cyber Security Data Sharing Platform

On October 2, 2014, the U.S. Department of Justice announced that a cyber intelligence data-sharing platform known as TruSTAR, developed by CyberPoint International, LLC, passed antitrust muster. The TruSTAR platform allows...more

Privacy & Cybersecurity Update - September 2014

In This Issue: - Home Depot Data Breach — Lawsuits, Calls to Action and Lessons Learned - Skadden Participates in FBI Cyber-Intelligence Workshop - FTC Explores Impact of ‘Big Data’ on American...more

Cybersecurity Litigation Monthly Newsletter

As we discussed in July, Tiversa, a “cyber-intelligence” company, notified the FTC in 2009 that a file containing the personal information of about 9,300 LabMD patients was available on a peer-to-peer file sharing network....more

Cybersecurity Concerns Underpin Continued Push In The Regulatory And Legal Arenas

While Congress continues its aggressive push on cybersecurity legislation, regulatory oversight and legal efforts continue across the spectrum of industries effectively filling the gap in addressing now every day concerns...more

Reasonable Doubt: Data Privacy, Cybersecurity, and the FTC

Today’s cybersecurity environment demands that every business establish effective corporate data privacy and consumer information security systems and practices. But, unfortunately, no single cybersecurity law exits to...more

Be Careful What You Promise in Your Company’s Privacy Policy!

When you or your clients are updating a privacy policy to provide a carveback for this type of M&A scenario, you should also check to be certain that the existing cyber/privacy insurance policy contains coverage for a...more

From Russia With Love: ‘Do svidaniya’ Peace Of Mind, Hello Information Security Training

So, this is rather embarrassing to admit, but I am one of those people that knows exactly what to do when your personal information is stolen. It’s not embarrassing that I know what to do. It’s embarrassing why I know what to...more

Privacy & Cybersecurity Update - July 2014

In This Issue: - Treasury Secretary Calls for Increased Focus on Cybersecurity - New Requirements for ‘Cleared Intelligence’ Contractors - FTC Clarifies Verifiable Parental Consent Methods Under COPPA - Small...more

Third Circuit to Consider FTC’s Authority Over Data Security Standards in FTC v. Wyndham

We have written previously about the FTC’s action arising out of the data breach suffered by the Wyndham hotel group, and the company’s petition for permission to pursue an interlocutory appeal regarding the FTC’s use of its...more

An Emboldened FTC: What Does It Mean for a Company’s Cybersecurity Team?

In April, Edith Ramirez, Chairwoman of the FTC, and Julie Brill, FTC Commissioner, tweeted: “Pleased the court recognized @FTC’s authority to hold biz accountable for safeguarding consumer data & look forward to trying this...more

Mobile Application: Security Best Practices

The industry for mobile applications is growing rapidly. As companies and independent developers look to gain—or strengthen—footholds in this competitive space, the Federal Trade Commission (FTC) asks, “… is security keeping...more

Congress Putting Microscope on FTC Enforcement

On July 24, 2014, the House Committee on Oversight and Government Reform held a hearing entitled, "The Federal Trade Commission and Its Section 5 Authority: Prosecutor, Judge and Jury." The purpose of the hearing was to...more

They are coming for your client’s data. What will you do if they succeed?

Data security breaches—no industry is immune. These hackers can phish, spoof, skim, packet sniff, and key log their way into your system. Once a hacker successfully hacks into a corporation’s server, the breach will go...more

DOJ and FTC’s Cybersecurity Policy Statement Should Ease Antitrust Nerves

Several recent and well-publicized cyberattacks have increased the visibility of their threat to businesses’ private financial information and customers’ personal information. The increased attention has also led companies...more

What is the Scope of the FTC’s Authority When it Comes to Data Security? Wyndham Asks Third Circuit to Consider

In early July, Wyndham Hotels asked the Third Circuit Court of Appeals to decide whether the Federal Trade Commission (FTC) has the authority to oversee corporate data security. Although the FTC has brought dozens of actions...more

Week in Review

According to an article in The New York Times this week, high level executives make up the majority of tablet users in the workplace. That may change, though, as in the workplace tablet usage increases. It was predicted this...more

113 Results
|
View per page
Page: of 5