News & Analysis as of

Data Privacy

DJI Reports Enhanced Data Privacy for its Drones

We posted last week about the U.S. Army issuing a memorandum banning the use of DJI drones due to security concerns, but now, this week DJI reports that it is developing a new local data mode that stops internet traffic to...more

SEC Cybersecurity Risk Alert Emphasizes Proactive Compliance and Ongoing Vigilance

by BakerHostetler on

On August 7, 2017, the Securities and Exchange Commission (SEC) released its latest cybersecurity risk alert, detailing findings from the examination of 75 broker-dealers, investment advisers and investment companies carried...more

Governors of 38 States Join a Cybersecurity Compact

by Wilson Elser on

On July 16, 2016, the chair of the National Governors Association (NGA), Governor Terry McAuliffe (D-VA), unveiled his 2016-2017 initiative, Meet the Threat: States Confront the Cyber Challenge. Over the past year, the...more

DOE Imposes Data Security Requirements on Colleges and Universities

Do you have a written data security program in place to meet federal requirements? In the last year, the Department of Education (DOE) released guidance in the form of a “Dear Colleague” letter emphasizing the importance...more

Nevada Implements Law that Requires Notice for Collection of Personal Information

Nevada has become the third state in the Union to adopt a law that requires operators of websites and online services to provide notice to consumers who are Nevada residents of their practices around the collection and...more

Pullman & Comley 2017 “interim” legislative summary for schools

The Connecticut General Assembly enacted a number of laws during its 2017 regular session that will impact Connecticut schools. Among other things, bills have been enacted that: (1) “repeal and replace” last year’s radical...more

DoD's Efforts to Secure Information on Contractor Systems Continues, But All Companies Are at Risk and Should Take Steps Now to...

by Bass, Berry & Sims PLC on

As recent malware, ransomware and distributed denial of service attacks have made clear, the cyber threats posed to governments and commercial entities are real and growing. Critical infrastructure such as power plants,...more

ALERT: Interim CT Legislative Update

by Pullman & Comley, LLC on

The Connecticut General Assembly enacted a number of laws during its regular session that will impact Connecticut schools and public-sector employers. Among other things, bills have been enacted that...more

The State AG Report Weekly Update

by Cozen O'Connor on

Republican Jay McMahon Announces Bid for Massachusetts Attorney General- Republican Jay McMahon, an attorney in private practice, announced his candidacy to become Massachusetts AG. McMahon is the first candidate to...more

FDA Establishes Electronic Privacy, Security, and Reliability Criteria for Clinical Trial Records

by Jones Day on

In March 1997, the Food and Drug Administration ("FDA") published a final rule, codified in 21 CFR Part 11 ("Part 11"), establishing the privacy, security, and reliability criteria for electronic records and electronic...more

The Data Report Episode 9: Thinking Outside the Box

by Bilzin Sumberg on

Episode 09: Secure Your Data (Part V) Litigation attorney Jay Ward discusses issues posed by non-computer based information management in this episode of The Data Report. The importance of thinking outside the box and not...more

Data Privacy

by Dentons on

Following the experience gained by multiple countries in the area of privacy and personal data protection, in 2012 Colombia established a general data protection regulation that must be observed by all individuals and...more

Wave of the Future or a Step Too Far? Wisconsin Company Offers Employees Microchip Implants, Employment Issues Abound

While we may now take Tesla’s connected world for granted, one cannot help but wonder what readers thought of his predictions in 1926 when he made the above statements in a magazine interview. It remains to be seen whether a...more

New Jersey Bill Limiting Identity Card Scanning Signed Into Law

by Sedgwick LLP on

On July 21, 2017, New Jersey Governor Chris Christie signed into law a bill that places new restrictions on retailers’ collection and use of information collected when a customer’s identification (ID) card is scanned. The...more

The Data Report Episode 2: Data Security Is More Than an IT Issue

by Bilzin Sumberg on

Data security isn’t only about technology or privacy; it’s also about consumer law. Litigation attorney Jay Ward discusses the growing number of companies facing enforcement actions over failing to safeguard their customers'...more

NJ Seeks to Protect Consumer Data with Personal Information Privacy and Protection Act

by Saul Ewing LLP on

A recently enacted New Jersey law restricts retailers from collecting and using personal information gleaned from driver’s licenses and other identification cards. The law, which will take effect October 1, 2017, is meant to...more

Oregon Expands Deceptive Trade Practices Act to Include Misrepresentations About PI Usage

by BakerHostetler on

Effective January 1, 2018, Oregon will join Pennsylvania and Nebraska in expanding its definition of deceptive trade practices to explicitly include a material misstatement regarding the use of personal information. House...more

Retailers: Review Those Checkout Practices – Again

If you are a retailer with locations in New Jersey, you will need to review your procedures in anticipation of a new law effective October 1, 2017....more

Washington’s New Biometric Privacy Law: What Businesses Need to Know

by Davis Wright Tremaine LLP on

With the rise in hackings and data breaches, companies and government agencies are looking for ways to protect their data that offer more security than passwords. Because passwords are easily lost, stolen, guessed, and...more

FBI Issues Warning about Internet-Connected Toys

We previously reported about the microphone and video capabilities of Echo technology. The FBI is also concerned about this technology being used in toys that are connected to the Internet....more

Cold calls in hot water: Hong Kong consultation paper on P2P telemarketing

by Hogan Lovells on

Businesses may often use peer-to-peer ("P2P") telemarketing calls involving interpersonal communication to promote goods and services directly to customers. While such calls may be effective in some cases, they appear to be...more

Be Careful When Using Biometric Information

by Franczek Radelet P.C. on

While not strictly speaking a wage and hour issue, here is a heads-up to any employers that use timekeeping systems featuring biometric security, like a thumbprint or fingerprint scanner... ...more

Cyber Law Tracker: New Connecticut Cybersecurity Strategy

by Pullman & Comley, LLC on

As its next step in the creation and implementation of a cybersecurity plan, the State of Connecticut has created a Cybersecurity Strategy document. This strategy specifically highlights the roles and vulnerabilities of state...more

Data Privacy Issues of Self-Driving Vehicles

by Bryan Cave on

In the next five years we will see more and more self-driving vehicles, or autonomous vehicles, hit the market. An “autonomous vehicle” is a vehicle capable of navigating roadways and interpreting traffic-control devices...more

The Protection of Biometric Information

by Saul Ewing LLP on

As states develop new laws directed at the security of biometric identifiers, such as fingerprints and retina scans, institutions of higher education are likely to face a host of new compliance requirements and increased...more

911 Results
|
View per page
Page: of 37
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.