Data Privacy

News & Analysis as of

Economic Freedom, “Hong Kong Style”: Respecting Privacy And Ensuring Companies Can Resolve Disputes Efficiently

Hong Kong has always been known for its economic freedom. However, that economic freedom needs rules and protections to operate on a day-to-day basis. Recently, Hong Kong has taken bold steps forward with new rules and...more

Why Can’t We Be Friends? FTC and FCC Formalize Cooperation in Consumer Privacy Enforcement

The Federal Trade Commission (FTC) and Federal Communications Commission (FCC) recently formalized an agreement to cooperate when regulating the “deceptive, unfair, unjust and/or unreasonable” acts and practices of common...more

The Ethical Duty of Competence in 2015

Although the legal field is not a profession known for embracing change, several developments over the past year have made it clear that even lawyers have an ethical obligation to understand the basics of modern technology. ...more

International data transfer news… a bit like buses

You know how you wait for ages for a bus to come (well, we do in Europe) and then three come along at once? Well it’s a little like that in the data privacy arena right now, as far as transfer of international personal data...more

PSQIA held to preempt florida constitutional right to access adverse medical incident reports

On October 28, 2015, the District Court of Appeal in the First District of Florida held in Southern Baptist Hospital, Inc. v. Jean Charles, Jr. et al. that the federal Patient Safety and Quality Improvement Act of 2005...more

Over 70 million prison phone records leaked

Securus Technologies (Securus), which provides phone services for many of the country’s prisons, experienced a breach of over 70 million phone records from over 37 states. The data leaked includes downloadable recordings of...more

School Data Privacy: Challenges and Best Practices

Schools collect, maintain, use and disclose a large amount of sensitive information of students and employees, including educational records, Social Security numbers, health plan information and health care records (medical,...more

Should Your Firm Have a Chief Privacy Officer?

Following the trend in big business, a Pennsylvania law firm has just appointed its first Chief Privacy Officer (CPO). Should your firm consider having such a position? The short answer is: Yes!...more

CT AG slams Hartford Hospital and EMC for loss of laptop

True to his word, the Connecticut AG has aggressively entered the data privacy and security enforcement arena with a $90,000 settlement with Hartford Hospital and EMC. The AG has agreed to a payment of $90,000 from...more

Supreme Court Hears Oral Argument In Spokeo

Last Monday, the Supreme Court heard argument in Spokeo, Inc. v. Robins, one of this Term’s closest-watched cases, especially in the data-privacy field. While attempting to “read the tea leaves” from oral argument can be...more

CFPB Reports on Access to Mobile Financial Services

The Consumer Financial Protection Bureau (“CFPB”) this week shed new light on the growing mobile financial services sector, publishing a report compiling responses to its 2014 request for information on these services....more

FTC Hosts Workshop on Lead Generation

On October 30, 2015, the FTC held a workshop on lead generation to explore online lead generation in various industries. Lead generation, also called performance marketing, is the process of identifying or cultivating...more

Employment Law Update - November 2015

Coming Changes to Overtime Exemptions Rules Will Have Serious Impact on Employers - The Fair Labor Standards Act ("FLSA") requires that employees be paid minimum wage and overtime pay at a rate of not less than one and...more

NAIC Cybersecurity Task Force Adopts Cybersecurity Bill of Rights

On October 14, 2015, the National Association of Insurance Commissioners’ (NAIC) Cybersecurity Task Force adopted the Cybersecurity Bill of Rights, a document meant to inform consumers of the services they can expect from...more

Agreement “In Principle” On New US-EU Safe Harbor Pact

The European Union announced on October 26, 2015, that it had reached an agreement “in principle” with the United States on a new transatlantic data-sharing pact—though a final agreement between the parties is likely still...more

Will There Be an APAC Safe Harbor?

On October 5, while the European Union’s highest court was busy striking down its Safe Harbor permitting the cross-border transfer of personally identifiable information, 12 countries reached a consensus on data transfers...more

Advanced Cyber Security Center Panel Explores Reasonableness in Cybersecurity

I had the pleasure of moderating an excellent panel at the Advanced Cyber Security Center’s annual conference on November 4. The panel’s topic for discussion was “What is Reasonable in Cybersecurity: Responsibility and...more

Senate Passes Legislation To Ease Sharing Of Cybersecurity Threat Information

On October 27, 2015, the Senate passed S. 754, the Cybersecurity Information Sharing Act of 2015 (“CISA”), which addresses how companies can share cyber threat information with the federal government. The legislation aims to...more

San Francisco Launches First “Internet of Things” Wireless Network in United States

With the onslaught of smart watches, smart thermostats, and even smart refrigerators that allow you to Tweet hungry messages to your followers, it’s only natural that a “smart city” would follow. This week, San...more

Thoughts on Supreme Court Oral Argument in Spokeo, Inc. v. Robins

Yesterday, the Supreme Court heard oral argument in Spokeo, Inc. v. Robins, No. 13-1339 (SCOTUSBlog page). The question presented is “Whether Congress may confer Article III standing upon a plaintiff who suffers no concrete...more

NAIC Adopts Cybersecurity Bill of Rights

The National Association of Insurance Commissioners (“NAIC”) continued its efforts to advance cybersecurity in the insurance industry when it recently adopted the Cybersecurity Bill of Rights. The Cybersecurity Bill of Rights...more

Three Trending Topics in IoT: Privacy, Security, and Fog Computing

Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more

Data Breach Planning in 10 Easy Steps: How to Think Like A Litigator

For the first Tuesday in November, we have 10 easy steps to make sure that your data breach incident response planning is viewed from that pesky point of view of a litigator....more

Illinois finds itself at forefront of facial-recognition litigation

Illinois is leading the way in regulating facial-recognition technology — it is one of only two states (the other Texas) that has passed laws covering the collection and use of biometric information. Illinois also is...more

Report on Student Data Privacy Highlights Two Key Issues For School Leaders

Student data privacy is the “it” issue right now in edtech, as evidenced by a recent special Student Data Privacy Report (free registration required) issued by Education Week. Education Week prefaces the report with a fact...more

471 Results
View per page
Page: of 19

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.