Data Privacy

News & Analysis as of

Tax Season Is in Full Swing: Beware of the W-2 Spear Phishing Scam

Last year we saw an unprecedented number of companies of all sizes fall victim to a W-2 spear phishing scam. The scam usually began with a “spoofing” email that appeared to have been sent by a company’s CEO or CFO to one or...more

EU Commission Publishes Its Proposals for New e-Privacy Regulation

On 10 January, the EU Commission proposed a new Regulation on Privacy and Electronic Communications (“proposed Regulation”) to replace Directive 2002/58 (known as the “ePrivacy Directive”). The proposed Regulation...more

EU e-Privacy Regulation Raises Stakes for Compliance

The European Commission's proposed e-privacy regulation sets forth obligations on handling electronic communications and clarifies obligations for seeking consent for the use of cookies. Meant to bring the e-privacy directive...more

EU Proposed ePrivacy Rules to Extend to all Electronic Communications Providers

On January 10, the European Commission proposed new legislation that would update and supplement current ePrivacy rules and extend their scope to all providers of electronic communication services. The following is a...more

NIST Publishes Introduction to Privacy Engineering and Risk Management to Assist Agencies and Organizations in Designing...

On January 4, 2017, the National Institute of Standards and Technology (“NIST”) published the final version of NIST IR 8062 “An Introduction to Privacy Engineering and Risk management in Federal Systems.” The report...more

Guidelines for De-Identification, Anonymization, and Pseudonymization

De-identification of data refers to the process used to prevent personal identifiers from being connected with information. The FTC indicated in its 2012 report Protecting Consumer Privacy in an Era of Rapid Change:...more

Massachusetts Breach Notifications Will Now Be Publicly Available Online

On Jan. 3, 2017, the Massachusetts Office of Consumer Affairs and Business Regulation announced that it will begin making its data breach notification archive publicly available online. Previously, data breach notifications...more

Privacy Tip #68 – Protecting Biometric Information

Breaches of our personal information through hacking of data bases is becoming all too common. A third of Americans’ personal information was compromised in healthcare breaches in 2015. We have become numb to the fact that...more

"Privacy & Cybersecurity Update - December 2016"

In this month's edition of our Privacy & Cybersecurity Update, we examine modifications to New York state's proposed cybersecurity regulations for financial institutions, a 5th Circuit ruling that a phishing scam is not...more

Data Privacy Class Actions Post-Spokeo

Earlier this year, the Supreme Court, in Spokeo, Inc. v. Robins, held that a bare procedural violation of a statutory requirement, divorced from any concrete harm, does not establish the injury-in-fact necessary to maintain a...more

Cybersecurity 2017 – The Year in Preview: Changes Afoot in Federal Enforcement?

Editor’s note: This is the sixth and last in our end-of-year series. See our previous posts on trade secrets, state regulation and law enforcement, HIPAA compliance, emerging threats, and energy. See you in...more

EU-U.S. Privacy Shield: Assessing The New Regime

Businesses have now had four months to get to grips with the new EU-U.S. Privacy Shield for transatlantic data transfers after it came into force in August 2016. As the New Year looms, what are the emerging trends we have...more

Do You Know Where Your Data Is Located? Why Knowing is Half the Battle

Whether you realize it or not, you are probably storing some personal or business data in the cloud. The National Institute of Standards and Technology (NIST) defines cloud computing as a model for enabling ubiquitous,...more

Six Months In, Privacy Shield Is Battered But Holding: Three Notable Developments in U.S-E.U. Data Transfers

The United States has traditionally taken a libertarian approach to data privacy: “what is not forbidden is permitted.” Outside sensitive sectors such as health (HIPAA) and finance (GLBA), the United States was historically...more

Legal Considerations for Website Privacy Policies

We get questions from clients about whether they are required to include a privacy policy and, if so, what should it say. The answers may surprise you, but a privacy policy should definitely not be an afterthought for...more

Importance of Maintaining Cybersecurity Measures – Assessing the Ashley Madison Data-Breach Settlement

Daily headlines of data breaches, resulting class actions, governmental investigations and enforcement actions, and the settlements of those actions serve as constant reminders of the need to implement and maintain reasonable...more

New Privacy Developments in France

DataGuidance spoke with Cécile Martin, Special International Counsel at Proskauer Rose LLP, at the International Association of Privacy Professionals’ Conference in Brussels in November 2016. Ce´cile discussed the passing of...more

Over 3.1 Billion Records Breached So Far in 2016

The tally of records breached in 2016 (through November) globally was over 2.1 billion, according to IT Governance. With the announcement yesterday of Yahoo’s breach of another 1 billion records, that tally is now up to 3.1...more

Illinois Biometric Privacy Suit over Collection of Fingerprints Settled

Earlier this month, an Illinois state court approved a $1.5 million settlement in a class action against L.A. Tan Enterprises, Inc., operator (directly and through franchisees) of L.A. Tan tanning salons. The settlement...more

In Data Privacy, Don’t Forget the State Attorneys General

State attorneys general play an active role in data privacy and security matters. Their involvement is increasing as they grapple with changing technologies and threats, rapidly evolving state laws and their relatively broad...more

Further Challenges to EU-US Privacy Shield and EU Data Exports

The EU-US Privacy Shield, introduced earlier this year to provide a lawful means of transferring personal data from the EU to the US, is facing a second legal challenge, this time from several French privacy rights groups....more

Data Analytics Enables Health Plans to Predict When Employees Need Health Services and For How Long

We know that data analytics is being used to influence a wide range of things such as the pair of shoes one might want to buy or what news is “trending” on Facebook. Similar tools are being applied to employer-sponsored group...more

Summary of the FTC’s 12/7 Workshop on Smart TV and Thoughts for the Future

What are the promises and potential privacy pitfalls when you take an old-fashioned television and connect it to the Internet? On December 7, 2016, the FTC hosted the final installment its Fall Technology Series in an effort...more

Who Owns a Noise – Should Data Collected in a Public Space by a Private Company be Generally Accessible to the Public?

While law enforcement have access to new technology owned by third parties that assist them with protecting the public, questions arise as to who should own the data gathered by that technology. Sometimes, it is the...more

Commission on Enhancing National Cybersecurity Releases Report

On December 1, the nonpartisan Commission on Enhancing National Cybersecurity (Commission) released a report on securing and growing the national economy. This report includes six imperatives for enhancing cybersecurity (and...more

707 Results
|
View per page
Page: of 29
Popular Topics

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×