Cybersecurity Federal Trade Commission

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Privacy & Cybersecurity Update - April 2016

In this edition of our Privacy & Cybersecurity Update, we examine changes to EU privacy and data protection laws, new state laws addressing data breach notifications, Congress' review of cyber insurance, and recent court...more

The Digital Download - Alston & Bird’s Privacy & Data Security Newsletter – May 2016

Special Focus on “Safe Harbor 2.0,” Privacy Shield and E.U. Data Transfers: Alston & Bird’s privacy team has been closely following the development of Privacy Shield, the proposed successor to the E.U.-U.S. Safe Harbor...more

Preparing Your Organization Today to Win Its Future (Possibly Inevitable) Cyber Lawsuit: Making Crown Jewels Out of Paper

One day in the not too distant future, your organization may be fighting to protect its balance sheet against high-stakes claims in a cyber tort trial. Arrayed against you will be the best of the class action plaintiff’s...more

Alert: Coming Soon: Federal Regulation of the Internet of Things

The hands-off approach Washington has taken on regulating the Internet of Things ("IoT") may be about to change: the Department of Commerce, through its National Telecommunications and Information Administration ("NTIA"), has...more

Why and How Your Business Should Protect Sensitive Customer Data

With the battle over data privacy between Apple and the Department of Justice at the forefront of the news cycle, business owners across the country are likely asking themselves: what responsibilities do I have in protecting...more

Preparing For and Responding To Data Breaches (Presentation)

While companies may be aware of the threats posed to their businesses by a data breach, they should also have a concrete plan in place so that they can respond effectively should one occur. In a recent webinar, attorneys from...more

Information Security and Privacy Group News: Cybersecurity Conference Essential Take-Aways Government, Industry and Legal...

Representatives of Connecticut businesses and corporations, educational institutions, and state and local government attended Murtha Cullina’s March 2016 Cybersecurity Conference at the Quinnipiac University School of Law....more

Financial Services Report, Spring 2016

Why another law firm newsletter? Over ten years ago, Will Stern answered that question in the first Editor’s Note of the first Financial Services Report. Some things have changed since then—we no longer print and mail paper...more

Top 10 Financial Institution Considerations for 2016: #3 – Cybersecurity

In our initial article announcing our top 10 considerations for financial institutions in 2016, our third consideration was cybersecurity. Perhaps one of the biggest challenges facing financial instructions in the near future...more

Privacy Tip #25 – This week is National Consumer Protection Week: know your consumer rights

The Federal Trade Commission (FTC), in collaboration with over 100 governmental, not for profit and private entities, is spearheading National Consumer Protection week, March 6-12, in an effort to educate consumers about...more

A Closer Look at Cybersecurity Legislation and Regulations in the US and Abroad - United States

Legal Framework - Summarise the main statutes and regulations that promote cybersecurity. Does your jurisdiction have dedicated cybersecurity laws? The United States generally addresses cybersecurity...more

Challenging the Conventional Wisdom on Mandatory Password Changes

Very interesting thought piece from the FTC’s Chief Technologist. Do mandatory password resets actually make us less secure? ...more

Developments in Cybersecurity: Privacy Laws, Hacking Beyond Customer Data, and Communicating with Corporate Boards

I. Legal Exposure to Federal and State Privacy Laws - A. Federal Statutes and Enforcement - 1. Federal Trade Commission Act, 15 U.S.C. §§ 41-58 - The Federal Trade Commission (FTC) has emerged as the leading...more

FTC Announces Settlement with ASUS over Insecure Routers and Cloud Services

Yesterday, the FTC announced that it had entered into a settlement agreement with Taiwan-based computer hardware manufacturer ASUSTeK Computer Inc., resolving allegations that the company failed to take reasonable steps to...more

What is Your Plan for the War of the Data Worlds?

Global organizations need a resilient strategy and actionable plans for dealing with the two worlds of privacy, cybersecurity, and data protection and governance: the world of rights and the world of harm. Emanating from...more

Blog: Senator Calls on Med Device Leaders to Improve Cybersecurity

Late last week, Senator Barbara Boxer (D-CA) wrote to the leaders of Johnson & Johnson, GE Healthcare, Siemens USA, Medtronic and Philips USA, to “express serious concerns” about potential cybersecurity vulnerabilities in...more

FDA Regulatory and Compliance Monthly Recap — January 2016

OPDP enforcement reaches record low in 2015 as drugmakers face uncertainty in digital marketing - Enforcement by the OPDP has fallen notably since 2010. The decline has been attributed, in part, to the agency's slow...more

Privacy & Cybersecurity Update - January 2016

In this edition of our Privacy & Cybersecurity Update, we discuss, among other matters, the status of the EU/U.S. Safe Harbor negotiations, as well as changes to privacy laws in Delaware and California that regulate online...more

Cybersecurity: What is on the horizon for 2016

JD Supra recently published an attorney perspective piece on defining cybersecurity issues for 2016. It should come as no surprise that resolution of insurance coverage issues made the list. Despite a plethora of data...more

FTC Enforcement in Schein: Misleading Statements about Encryption and Cybersecurity

On January 5, 2015, the Federal Trade Commission (FTC) entered into a consent order with dental software manufacturer Henry Schein Practice Solutions, Inc. ("Schein") in connection with allegations that Schein had made...more

"Emerging Trends in Privacy and Cybersecurity"

Entering 2016, the relentless stream of cyberattacks continues unabated, having become a "business as usual" reality to which companies must adapt. All companies, regardless of size or industry, are potential targets, and the...more

3 Defining Issues for the Internet of Things in 2016

In an era of ever-evolving ‘wired’ technology, increasing interconnectedness, and business and personal concerns about data security, we recently asked attorneys writing on JD Supra: What will be among the defining issues of...more

“Interoperable” Healthcare Data Will Be a Tempting Target

At a panel during last week’s Consumer Electronics Show in Las Vegas, Edith Ramirez, chair of the Federal Trade Commission – America’s top privacy regulator – said she would not wear a Fitbit personal fitness tracker. “I...more

Perspective: What Will Be the Defining Cybersecurity Issues In 2016?

As data breaches and their related obligations and liability risks continue to pile up with every passing year, we asked attorneys writing on JD Supra to answer the question: What will be among the defining issues for...more

New Ruling Challenges FTC Authority to Regulate Cybersecurity Based on “Possible Consumer Harm”

A Nov. 13, 2015 ruling supports the argument that various companies and lawyers have been making for years: the Federal Trade Commission is exceeding its authority in prosecuting cybersecurity breaches under Section 5 of the...more

351 Results
|
View per page
Page: of 15
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×