Cybersecurity Federal Trade Commission

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

They are coming for your client’s data. What will you do if they succeed?

Data security breaches—no industry is immune. These hackers can phish, spoof, skim, packet sniff, and key log their way into your system. Once a hacker successfully hacks into a corporation’s server, the breach will go...more

DOJ and FTC’s Cybersecurity Policy Statement Should Ease Antitrust Nerves

Several recent and well-publicized cyberattacks have increased the visibility of their threat to businesses’ private financial information and customers’ personal information. The increased attention has also led companies...more

What is the Scope of the FTC’s Authority When it Comes to Data Security? Wyndham Asks Third Circuit to Consider

In early July, Wyndham Hotels asked the Third Circuit Court of Appeals to decide whether the Federal Trade Commission (FTC) has the authority to oversee corporate data security. Although the FTC has brought dozens of actions...more

Week in Review

According to an article in The New York Times this week, high level executives make up the majority of tablet users in the workplace. That may change, though, as in the workplace tablet usage increases. It was predicted this...more

Court Certifies Interlocutory Appeal for the FTC v. Wyndham Matter

This blog previously discussed various aspects of the Federal Trade Commission (“FTC”) action filed against Wyndham Worldwide Corp. (“Wyndham”) under Section 5 of the FTC Act, which prohibits “unfair and deceptive acts or...more

FTC Releases 2014 Privacy and Data Security Update, Touting Its Efforts and Achievements in Protecting Consumer Privacy

Last week, the Federal Trade Commission (FTC) released its 2014 Privacy and Data Security Update, summarizing the FTC’s major enforcement actions, policy initiatives, rules, reports, workshops, and outreach efforts in the...more

The Download - June 2014

In this issue: - Senate Judiciary Subcommittee Holds Hearing on Location Privacy Protection Act -Senate Homeland Security Permanent Subcommittee on Investigations’ Hearing and Report on Potential Security...more

Wyndham Secures Interlocutory Appeal Challenging the FTC’s Authority to Regulate Cybersecurity Practices

As part of our ongoing effort to advise clients on significant developments in cybersecurity that are likely to impact their businesses, we have been actively reporting on the case of in FTC v. Wyndham Worldwide Corporation,...more

3 Data Breach Liability and Care Standards to Know Now

Privacy and Cyber Security Litigation (PCS Litigation) has recently experienced extensive growth, particularly when it comes to the liabilities associated with a data breach. PCS Litigation involving data breach may be...more

Risk of Data Breaches Keeping You Up? Assess Data Security Before The Holiday Season

Data security breaches marred the 2013 holiday season for many consumers and retailers. The most famous security breach, at Target Corporation (Target), involved the loss of information on 40 million payment cards and...more

Malvertising: Senate Committee Releases Report

Terms like “web security” and “data breach” are now familiar to most Americans in light of recent, significant issues with the websites and databases of some large U.S. companies. But web security encompasses more than just...more

Policyholders are Exposed to Cyber-Risk from Their Third Party Contracts

The use of third party technology service providers has become widespread and commonplace in all industries. Technology services like “cloud” data storage providers and software as a service (SaaS) allow companies of all...more

Enforcement Action – FTC Is Not Backing Down and Laboratory Company Goes After a Cyber-Intelligence Company

The Department of Health and Human Services (HHS) Office for Civil Rights (OCR) is not the only government arm that enforces data breaches. The Federal Trade Commission (FTC) has broad authority to regulate the security of...more

Back Off Business, Cybersecurity Is FTC's Turf Now

On March 7, 2014, U.S. District Judge Esther Salas in New Jersey issued a much anticipated decision rejecting a direct challenge to the Federal Trade Commission’s authority to police corporate cybersecurity practices. Seeking...more

Top 10 Privacy Considerations for Digital Marketing Campaigns

In today’s competitive marketplace, companies are relying heavily on innovative and edgy digital marketing campaigns to promote their products and services that often include the submission of usergenerated content, viral...more

No Judicial Review of FTC Jurisdiction until the Agency Takes a Final Action

Companies that handle personal data may need to litigate an FTC enforcement action to its conclusion before a court will review the Commission's jurisdiction to commence the enforcement action in the first place....more

FTC Uses Its "Unfair Acts" Power to Go After PHI Security Breach

The Federal Trade Commission (FTC) is moving forward with an administrative action against a small medical laboratory that suffered two data security breaches, resulting in its patients’ protected health information falling...more

Privacy & Cybersecurity - May 2014

In This Issue: - EU Court of Justice Creates Broad Interpretation of the ‘Right to be Forgotten’ - White House Publishes Report on Risks and Opportunities Posed by ‘Big Data’ Practices - California AG...more

Snap Judgment: FTC Alleges Snapchat Did Not Keep Its Privacy and Security Promises, But Suggests Broad New Duty in the Process

Snapchat’s recent settlement with the Federal Trade Commission (FTC) generally provides a comprehensive but not groundbreaking roadmap to the FTC’s privacy and data security expectations in the mobile environment under...more

Shareholder derivative action against Wyndham Worldwide directors for data breaches

Hot on the heels of our recently released publication, ‘Cyber risks and the impact on company directors’, it has been revealed that a shareholder has commenced a derivative action in the district of New Jersey (USA) against...more

Regulators Speak at IAPP Breakfast Meeting in NYC

Data Breach Incidents—Especially “Ransom” Incidents, are on the Rise—One panelist observed that the New York State Attorney General’s Office received reports of approximately 900 data breach incidents during the past year...more

Advertising Law

FTC Checks-In a Victory in Dispute with Wyndham Over Power to Regulate Data Security - In a closely watched dispute over the Federal Trade Commission’s (FTC’s) power to regulate data security, a New Jersey federal...more

FTC, DOJ Issue Policy Statement on Sharing of Cybersecurity Information

The Federal Trade Commission and Department of Justice, Antitrust Division, recently issued a joint policy statement regarding their enforcement policy on cybersecurity information exchanges among private entities, where such...more

FTC Seeks Further Public Comment On Mobile Security

On April 17, the FTC announced it is seeking additional public comments on issues explored during a 2013 forum on mobile security. The announcement includes a series of specific questions within the following categories: (i)...more

So, You Want to Share Your Technical Cyber Threat Information with Your Neighbors?

Echoing guidance previously given to a nonprofit organization looking to exchange certain cybersecurity information, including exchanging actual real-time cyber threat and attack information, and others planning to exchange...more

98 Results
|
View per page
Page: of 4