News & Analysis as of

On the Fifth Day of Privacy, California (and Delaware) gave to me

sing it with me now…. Five Golden Rules…….(well, five new privacy laws/requirements) There are five significant new privacy laws/amendments that will be effective as of New Year’s Day — January 1, 2015 — and...more

Both Sides Now: Cloud Security and Privacy Enter the Modern Era with ISO 27018

Until recently, many cloud users felt like Joni Mitchell in her classic song, “Both Sides Now.” No matter how you looked at clouds, you never really understood them, how they worked, or what happened inside them. Cloud...more

IP | Trend: Data in the Cloud is the Next Big Storm? [Video]

Convenience, accessibility, and cost have led companies and their employees to put an increased amount of data in the cloud. But, does this put corporate data at risk? Attorneys Seth Northrop and Sam Walling discuss some of...more

Privacy in the Cloud: A Legal Framework for Moving Personal Data to the Cloud

For many companies, the main question about cloud computing is no longer whether to move their data to the “cloud,” but how they can accomplish this transition. Cloud (or Internet-based on-demand) computing involves a shift...more

Head In The Clouds About Cloud Storage

Did you know there are many cloud service providers in the cyber industry? Probably so. But did you know that cloud service providers may be operating in a country outside the United State? Whether you did or not, you may not...more

Nude Photos and National Cyber Security Awareness Month

October is National Cyber Security Awareness Month. This is an opportunity to remind employees (and yourselves) about how to keep corporate networks and their own cyber lives secure. All month, we will post articles that...more

Redaction: Protecting Your Private Digital Data

In today’s digital age, no person’s private information is considered off limits by hackers. Recently, several celebrities, including Jennifer Lawrence and Kate Upton, had their iCloud storage accounts hacked and their...more

California Breaks New Ground in Education Privacy Law with K-12 Student Data Privacy Bill

A substantial rise in schools’ use of online educational technology products has caused educators to become increasingly reliant on these products to develop their curricula, deliver materials to students in real time, and...more

Lessons from the iCloud Celebrity Hack

The highly publicized hacking of the iCloud accounts of dozens of celebrities was disclosed over Labor Day weekend and has raised larger, more serious concerns regarding the security of personal and corporate data held in the...more

Cloud Hacking Incidents May Prompt Congress and the Administration to Turn Attention Again to Mobile Privacy Issues

With the recent theft and release of several celebrities’ private photographs (many of which appear to have been taken with, and stored on, mobile devices), mobile privacy and the protection of sensitive data stored or...more

EU Cloud Standardisation Guidelines

In November 2012, we wrote an Alert about the European Commission’s Communication on Cloud Computing intended, it said, to “… unleash the potential of cloud computing in Europe”. Sceptics were doubtful that the cloud...more

Mitigating Risk in Cloud Computing Agreements

Cloud computing is the new reality. A 2013 IDC survey reports that 61% of enterprises have at least one cloud-based application and total enterprise investments in cloud-based solutions have gone up more than 10% since 2012....more

Kentucky Enacts Data Breach Notification Statute

On April 10, 2014, Kentucky Governor Steve Beshear signed H.B. 232 into law, making Kentucky the 47th state to enact data breach notification legislation. Prior to H.B. 232, Kentucky was one of only four states—including...more

Cloud Services and Export Control: What You Don't Know Can Hurt You

Cloud services in all forms are becoming widely adopted by enterprise customers. Public, private and hybrid cloud service offerings continue to grow in number and nature. Companies are migrating to Software-as-a-Service...more

EU – International data transfers from processors to processors made easier, good news for cloud providers and outsourcers

Working Party 29 issued a working document on model clauses for personal data transfers from EU data processors to non-EU sub-processors. This is an important step towards creating a more comprehensive framework for...more

Saas, PaaS and the Cloud? Part 2: Top 5 Considerations for Purchasing Hosted Services

You’ve read part 1 of our series, and you’re now armed with the knowledge about hosted services and cloud computing that you’ve been too embarrassed to ask. To help you bring it home – virtually – we offer our top 5...more

Take 5 Newsletter: 5 Employment Law Considerations in "The Cloud"

What is "the cloud," and what on Earth (pun intended) does cloud computing have to do with employment law? While many definitions abound, cloud computing at its core is a form of remote electronic data storage,...more

Alarming Statistics On Cloud Use

Scott & Scott, LLP attorney, Brian Von Hatten, says Softchoice's survey findings should sound alarms for IT administrators and risk managers. ...more

Health Care Technology Trends for 2014: An Interview with Joseph Coyne, President of Information Technology Services and CIO at...

What’s the best way to provide quality patient care and reduce readmissions while lowering costs? Joseph Coyne, the President of Information Technology Services and Chief Information Officer at Continuum Health Alliance, LLC...more

Privacy Top Ten: Things You Think You Know About Privacy – But Don’t!

Whether a start–up or a listed ASX company, your business opportunities are increasingly on–line and/or overseas. At last count over 80 countries have adopted data privacy laws and Australia’s new Australian Privacy...more

PCI DSS 3.0: Business as Usual?

In the past, critics of the Payment Card Industry (PCI) Data Security Standard (DSS) have alleged that the DSS requirements either (1) provide little more than a minimal baseline for security with a “check-the-box” compliance...more

Cyber Risk Trends for 2014

According to recent post from Property Casualty 360°, The Six Trends of Cyber Risk in 2014, insurers need to know: 1. Data breach costs are trending downward. The cost per record to respond to a breach dropped from...more

Technology & Sourcing News - October 2013 (Global)

- What's in an indemnity anyway? - Kit Burden provides an informative overview of the use of indemnities in IT and outsourcing contracts, including guidance on what to look out for when drafting or negotiating these...more

Wearable tech and healthcare sector

Wearable technologies are likely to become more and more popular in the next years and interesting products have already been developed in the healthcare sector. But, given the sensitivity of collected personal data, such...more

Cloud Computing: Healthcare Issues in a Digital Age – (Part Three)

What are the challenges of PII data storage and privacy on cloud computing platforms? How does a healthcare organization work with cloud computing vendors to address key information security and privacy compliance issues? ...more

59 Results
|
View per page
Page: of 3