News & Analysis as of

Data Privacy Data Security

Data Security Is More Than an IT Issue, The Data Report Episode 2

Data security isn’t only about technology or privacy; it’s also about consumer law. Litigation attorney Jay Ward discusses the growing number of companies facing enforcement actions over failing to safeguard their customers'...more

Privacy Tip #96 – Consider “Who Has Your Back” as Your Next Summer Read

As you head to the beach or hammock for a bit of R+R this summer, here is one that you might want on the reading list. The Electronic Frontier Foundation (EFF) has been publishing a report entitled “Who Has Your Back”...more

FTC Settles With Lead Generation Firm For Illegally Selling Consumer Data, False Data Security Promises

by Kelley Drye & Warren LLP on

The FTC announced last week a settlement with Blue Global Media, LLC and its CEO Christopher Kay. The company operated 38 Internet domains that solicited online loan applications from consumers. The applications collected...more

LabMD – FTC Face-Off Continues Over FTC’s Data Privacy Authority

by Patrick Law Group, LLC on

The U.S. Court of Appeals for the Eleventh Circuit recently heard oral arguments in LabMD, Inc. v. Federal Trade Commission, the long-running dispute over the FTC’s authority to impose liability for data security breaches...more

The GDPR and the Bottom Line: How the EU Data Privacy Regulation Will Affect U.S. Companies’ Data Collection and Processing...

For U.S. companies which do business in Europe or who process the personal data of European Union residents, the world of data privacy and security is about to get much more complicated. While U.S. privacy law is unsettled,...more

Why Updating The Electronic Communications Privacy Act Poses Difficulties

by Revision Legal on

The privacy of electronic communications is provided for under the Electronic Communications Privacy Act. There are limited circumstances in which ISPs may disclose the contents of electronic and stored digital...more

Disgruntled Employees and Other Internal Threats to Your Cyber Security

by Baker Donelson on

Baker Donelson's Data Protection, Privacy and Cybersecurity attorneys are pleased to continue a series of client alerts that address significant cyber-threats to your business and discuss ways you can protect your business...more

Privacy Perils: Don't "Play" Around with Some Google Apps

by Bass, Berry & Sims PLC on

A group of researchers at the University of Michigan has discovered that hundreds of applications in Google Play, whose function is to turn Android phones into a server that allows the user to connect their phone directly to...more

FTC Tracking Of Privacy Complaints

by Bryan Cave on

The FTC collects complaints about companies that allegedly violate the data privacy, data security, advertising, and marketing laws. The result is a massive database of consumer complaints known as “Consumer Sentinel” that is...more

BROWSER Act Aims to Replace Invalidated FCC Privacy Rules

by Morgan Lewis on

US Representative Marsha Blackburn (R-Tenn.) recently introduced the Balancing the Rights of Web Surfers Equally and Responsibly (BROWSER) Act (the Bill), under which the Federal Trade Commission (FTC) would regain...more

Blockchain: background, challenges and legal issues

by DLA Piper on

Blockchain and distributed ledger technology offers significant and scalable processing power, high accuracy rates, and apparently unbreakable security at a significantly reduced cost compared to the traditional systems the...more

Global Privacy & Cybersecurity Update Vol. 14

by Jones Day on

New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more

Conducting Business Via the Cloud: The Role of SaaS Agreements

by Revision Legal on

Many, if not all, businesses need to utilize software in order to function. The software might take the form of an inventory ordering system, a payment processing system, or a smartphone app for the company. Software is...more

China’s Network Security Law Comes into Effect: What It Means for Your Company

by McDermott Will & Emery on

On June 1, 2017, China’s much anticipated Network Security Law comes into effect after two years of review, revisions over three drafts and a public commenting process. The law is a historical development for China’s...more

PRC’s New Cybersecurity Law to be implemented on June 1, 2017

by Dechert LLP on

Potential Implications for Foreign Network Products and Services - Cybersecurity is of national strategic importance to China, which has the largest group of internet users and the largest internet market in the world....more

Self-Sovereign Identity and Distributed Ledger Technology : Framing the Legal Issues

by Perkins Coie on

Purpose - Distributed ledger technology (“DLT”), including the use of blockchain technology, has been touted as a way to create and validate digital identities that serve many of the same purposes that physical forms of...more

Data Privacy and Security – What is the Difference?

by Michael Volkov on

The terms “Data Privacy and Security” are being thrown around a lot lately. Just recently, England’s health services and medical facilities were shut-down and the target of a ransom note (demanding, of course, payment in...more

NYS DFS Cybersecurity Regulations: Should Your Firm be Concerned?

by Prosperoware on

Last week, I looked at the global implications of new European Union regulations, reviewing how a year’s deadline will still cause a scramble to achieve compliance with the GDPR. In the United States, a recently passed...more

China's New Cybersecurity Law and Draft Data Localization Measures Expected to Burden Multinational Companies

by Jones Day on

China's new Cybersecurity Law ("new Law") is set to come into effect on June 1, 2017, and introduces sweeping provisions that may have a significant impact on companies doing business in and with China. To provide guidance on...more

FCPA Compliance Report-Episode 326, Paula Long On The Intersection Of Data Security And Compliance

by Thomas Fox on

In this episode I caught up with Paula Long, founder and CEO of DataGravity, Inc. at the recently concluded Collision 2017 Conference. Paula has worked in the data and information space for over 30 years and now helps...more

Babies and Baby-making, or Not… Privacy and Security Lessons for the Internet of Things

by BakerHostetler on

What do babies, sex toys and wireless head phones have in common? Apparently, the privacy concerns of the Federal Trade Commission (FTC), state AGs and legislatures, class action plaintiffs, and consumer advocacy groups, at...more

Blog: Avoiding Common Legal Issues at Coding Schools: Data Privacy and Security

by Cooley LLP on

The second post in the series on common legal and regulatory pitfalls that alternative education providers must proactively avoid focuses on data privacy and security. Learn more about student data privacy and best practices...more

California Bill Mandates Privacy By Design For IoT Devices

Manufacturers of Internet-connected devices (better known as the Internet of Things) should be following a new California bill closely because it would create a mandate under California law that all IoT devices have built-in...more

What Compliance Needs to Know About Data Privacy and Security

by Michael Volkov on

You don’t have to be a tech-savvy computer genius to address the basics of data privacy. Like many areas which compliance departments oversee, asking the right question and getting the right internal controls in place are the...more

Data Privacy and Security Legal Reform, and Plaintiffs’ Bar White Paper the Focus of IAPP Panel

by Reed Smith on

A panel on legal reform in the area of privacy and data security at this week’s IAPP Summit provided an opportunity for a discussion between businesses and regulators, as well as for the launch of a white paper on the...more

403 Results
|
View per page
Page: of 17
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.