Cybersecurity Federal Trade Commission

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Reasonable Doubt: Data Privacy, Cybersecurity, and the FTC

Today’s cybersecurity environment demands that every business establish effective corporate data privacy and consumer information security systems and practices. But, unfortunately, no single cybersecurity law exits to...more

Be Careful What You Promise in Your Company’s Privacy Policy!

When you or your clients are updating a privacy policy to provide a carveback for this type of M&A scenario, you should also check to be certain that the existing cyber/privacy insurance policy contains coverage for a...more

From Russia With Love: ‘Do svidaniya’ Peace Of Mind, Hello Information Security Training

So, this is rather embarrassing to admit, but I am one of those people that knows exactly what to do when your personal information is stolen. It’s not embarrassing that I know what to do. It’s embarrassing why I know what to...more

Privacy & Cybersecurity Update - July 2014

In This Issue: - Treasury Secretary Calls for Increased Focus on Cybersecurity - New Requirements for ‘Cleared Intelligence’ Contractors - FTC Clarifies Verifiable Parental Consent Methods Under COPPA - Small...more

Third Circuit to Consider FTC’s Authority Over Data Security Standards in FTC v. Wyndham

We have written previously about the FTC’s action arising out of the data breach suffered by the Wyndham hotel group, and the company’s petition for permission to pursue an interlocutory appeal regarding the FTC’s use of its...more

An Emboldened FTC: What Does It Mean for a Company’s Cybersecurity Team?

In April, Edith Ramirez, Chairwoman of the FTC, and Julie Brill, FTC Commissioner, tweeted: “Pleased the court recognized @FTC’s authority to hold biz accountable for safeguarding consumer data & look forward to trying this...more

Mobile Application: Security Best Practices

The industry for mobile applications is growing rapidly. As companies and independent developers look to gain—or strengthen—footholds in this competitive space, the Federal Trade Commission (FTC) asks, “… is security keeping...more

Congress Putting Microscope on FTC Enforcement

On July 24, 2014, the House Committee on Oversight and Government Reform held a hearing entitled, "The Federal Trade Commission and Its Section 5 Authority: Prosecutor, Judge and Jury." The purpose of the hearing was to...more

They are coming for your client’s data. What will you do if they succeed?

Data security breaches—no industry is immune. These hackers can phish, spoof, skim, packet sniff, and key log their way into your system. Once a hacker successfully hacks into a corporation’s server, the breach will go...more

DOJ and FTC’s Cybersecurity Policy Statement Should Ease Antitrust Nerves

Several recent and well-publicized cyberattacks have increased the visibility of their threat to businesses’ private financial information and customers’ personal information. The increased attention has also led companies...more

What is the Scope of the FTC’s Authority When it Comes to Data Security? Wyndham Asks Third Circuit to Consider

In early July, Wyndham Hotels asked the Third Circuit Court of Appeals to decide whether the Federal Trade Commission (FTC) has the authority to oversee corporate data security. Although the FTC has brought dozens of actions...more

Week in Review

According to an article in The New York Times this week, high level executives make up the majority of tablet users in the workplace. That may change, though, as in the workplace tablet usage increases. It was predicted this...more

Court Certifies Interlocutory Appeal for the FTC v. Wyndham Matter

This blog previously discussed various aspects of the Federal Trade Commission (“FTC”) action filed against Wyndham Worldwide Corp. (“Wyndham”) under Section 5 of the FTC Act, which prohibits “unfair and deceptive acts or...more

FTC Releases 2014 Privacy and Data Security Update, Touting Its Efforts and Achievements in Protecting Consumer Privacy

Last week, the Federal Trade Commission (FTC) released its 2014 Privacy and Data Security Update, summarizing the FTC’s major enforcement actions, policy initiatives, rules, reports, workshops, and outreach efforts in the...more

The Download - June 2014

In this issue: - Senate Judiciary Subcommittee Holds Hearing on Location Privacy Protection Act -Senate Homeland Security Permanent Subcommittee on Investigations’ Hearing and Report on Potential Security...more

Wyndham Secures Interlocutory Appeal Challenging the FTC’s Authority to Regulate Cybersecurity Practices

As part of our ongoing effort to advise clients on significant developments in cybersecurity that are likely to impact their businesses, we have been actively reporting on the case of in FTC v. Wyndham Worldwide Corporation,...more

3 Data Breach Liability and Care Standards to Know Now

Privacy and Cyber Security Litigation (PCS Litigation) has recently experienced extensive growth, particularly when it comes to the liabilities associated with a data breach. PCS Litigation involving data breach may be...more

Risk of Data Breaches Keeping You Up? Assess Data Security Before The Holiday Season

Data security breaches marred the 2013 holiday season for many consumers and retailers. The most famous security breach, at Target Corporation (Target), involved the loss of information on 40 million payment cards and...more

Malvertising: Senate Committee Releases Report

Terms like “web security” and “data breach” are now familiar to most Americans in light of recent, significant issues with the websites and databases of some large U.S. companies. But web security encompasses more than just...more

Policyholders are Exposed to Cyber-Risk from Their Third Party Contracts

The use of third party technology service providers has become widespread and commonplace in all industries. Technology services like “cloud” data storage providers and software as a service (SaaS) allow companies of all...more

Enforcement Action – FTC Is Not Backing Down and Laboratory Company Goes After a Cyber-Intelligence Company

The Department of Health and Human Services (HHS) Office for Civil Rights (OCR) is not the only government arm that enforces data breaches. The Federal Trade Commission (FTC) has broad authority to regulate the security of...more

Back Off Business, Cybersecurity Is FTC's Turf Now

On March 7, 2014, U.S. District Judge Esther Salas in New Jersey issued a much anticipated decision rejecting a direct challenge to the Federal Trade Commission’s authority to police corporate cybersecurity practices. Seeking...more

Top 10 Privacy Considerations for Digital Marketing Campaigns

In today’s competitive marketplace, companies are relying heavily on innovative and edgy digital marketing campaigns to promote their products and services that often include the submission of usergenerated content, viral...more

No Judicial Review of FTC Jurisdiction until the Agency Takes a Final Action

Companies that handle personal data may need to litigate an FTC enforcement action to its conclusion before a court will review the Commission's jurisdiction to commence the enforcement action in the first place....more

FTC Uses Its "Unfair Acts" Power to Go After PHI Security Breach

The Federal Trade Commission (FTC) is moving forward with an administrative action against a small medical laboratory that suffered two data security breaches, resulting in its patients’ protected health information falling...more

106 Results
|
View per page
Page: of 5