Data Protection

News & Analysis as of

China to Implement New Personal Data Protection Rules

Effective March 15, 2015, China’s State Administration for Industry and Commerce (SAIC) will implement the new Measures for Penalties for Infringing upon the Rights and Interests of Consumers (Measures). The Measures clarify...more

Investment Management Legal + Regulatory Update - February 2015

In This Issue: - SEC Proposes Rule Requiring Hedging Disclosure - SEC Reports the Result of its Cybersecurity Sweep of Broker-Dealers and Investment Advisers - House Passes Bill to Ease Volcker Rule and Other...more

“Bring Your Own Device” To Work Programs: Regulatory and Legal Risks and How To Minimize Them

If you’ve ever left your mobile phone on an airplane, in a restaurant, or somewhere other than in your possession, you know it’s frightening enough to think of losing the device itself, which costs a premium, as well as your...more

Two-Factor Authentication May Be Coming to a Bank Near You

When I was at the SEC and online broker-dealers’ customers were the victims of hacking incidents, I used to wonder, why don’t the broker-dealers require multi-factor authentication to gain access to accounts? It was a silly...more

FTC Director Jessica Rich Discusses Privacy and Data Security at BakerHostetler Symposium

On February 26, 2015, Jessica L. Rich, Director of the Bureau of Consumer Protection at the Federal Trade Commission, spoke at the BakerHostetler Symposium on Section 5 of the FTC Act on how the FTC approaches privacy and...more

Developments in Privacy and Cybersecurity Legislation

On January 13, 2015, the Obama Administration presented to Congress an updated legislative proposal to improve American cybersecurity and data privacy protection....more

Smart Car Legislation Suggests Different Approach To Internet Of Things Regulation

On February 11, Senators Ed Markey (D-Mass.) and Richard Blumenthal (D-Conn.) announced legislation aimed at establishing federal data security and privacy standards for Internet-connected automobiles (“smart cars”). This...more

What General Counsel Need To Know About The Latest Cybersecurity Developments

In the wake of reported security breaches at a number of significant financial institutions, cybersecurity is garnering more attention and concern than ever before — both within the financial services industry and among...more

Legislation To Increase Sharing Of Cyber Data Introduced

On February 11, Senator Tom Carper (D-Del.), Ranking Member of the Senate Homeland Security and Governmental Affairs Committee, introduced legislation aimed at increasing the sharing of cyber threat data between the federal...more

President Obama Issues Executive Order Urging Companies to Share Cybersecurity Threat Data

Speaking at the White House’s Summit on Cybersecurity and Consumer Protection at Stanford University this month, President Obama announced that an Executive Order was signed on February 13, urging private sector companies to...more

Federal Court Decision Demonstrates Ongoing Challenges Faced by Plaintiffs in Data Breach Litigation

On February 11, 2015, the U.S. District Court for the Southern District of Texas dismissed a class action complaint against the St. Joseph Health System arising out of a data security breach that occurred after hackers...more

Office of Civil Rights Delays Phase 2 Audits

The Office of Civil RIghts (“OCR”) recently announced that Phase 2 of the HIPAA audits would be further delayed because the audit portals and project management tools that are needed to initiate the audit process are not...more

IoT – It’s All About the Data, Right?

A few weeks ago, the FTC released a report on the Internet of Things (IoT). IoT refers to “things” such as devices or sensors – other than computers, smartphones, or tablets – that connect, communicate or transmit information...more

Federal Trade Commission Guidance on the Internet of Things

On January 27, 2015, the FTC released its Staff Report on the so-called “Internet of Things” (IoT) – the ability of everyday objects (from refrigerators to wearable devices) to connect to the Internet and send and receive...more

Cybersecurity is Key Initiative for National Association of Insurance Commissioners

Even your grandmother is talking about cybersecurity, so you know it’s got to be important. In the world of insurance, the wheels are in motion at the NAIC – the National Association of Insurance Commissioners – to get a...more

Enforcement of the Personal Data Protection Act in Singapore

The Personal Data Protection Commission (the “Commission’) was established in January 2013 to implement and enforce The Personal Data Protection Act 2012 (“PDPA”). The PDPA fully came into force on 2 July 2014. So far, the...more

Health Update - February 2015

Cyber Risk Insurance Policies: What You Need to Know - Editor’s Note: As data breach incidents and related cyber risks continue to increase and gain publicity—and government agencies become more actively involved in...more

Solving the Legal Challenges of Trustworthy Online Identity

In this age of phishing, hacking, identity fraud, and other forms of cybercrime, answering two simple questions – “Who are you?” and “How can you prove it?” – is fast becoming a critical requirement for online business...more

FINRA Issues its Cybersecurity Report, Providing Tools and Encouragement to Broker-Dealers

FINRA recently issued a Report on Cybersecurity Practices (“Report”), growing out of its targeted examination of firms last year. To issue the Report, FINRA gave careful consideration to the needs of many broker-dealers for...more

Standing in Data Breach Cases – Still a Moving Target

Where do we stand on standing in data breach cases? It depends on which court you ask. In December 2014, two courts considered whether plaintiffs alleged sufficient injury in their complaints involving well-known data...more

Ethical Issues Implicated by Lawyers’ Use of Third-Party Cloud Services

Law firms increasingly turn to “cloud services” for processing and storing confidential client information because of their greater flexibility and efficiency. Use of “the cloud,” however, outsources the administration,...more

Also In the News - Data, Privacy, & Security Practice Report - February 2015 #3

White House Holds Summit On Cybersecurity And Consumer Protection — On February 13, 2015, leaders from throughout the country representing sectors with a stake in cybersecurity and consumer protection issues convened at...more

More Than Employers Bargained For? Do Union Employees Have a Right to Bargain Over Company Data Breaches?

These days most employers manage a vast amount of electronic information about their employees, including the employees’ personal identifying information. But, what obligations do employers have to unionized employees with...more

HIPAA Compliant Technology and the Importance of Encryption

We welcome this guest blog by Gene Fry, Compliance Officer, Scrypt, Inc. The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for protecting sensitive patient data. This means that any...more

South Korean Communications Commission Releases Guidelines on Data Protection for Big Data

In December 2014, the Korea Communications Commission (KCC) released the“Big Data Guidelines for Data Protection” (Guidelines). Aimed at Information and Communications Service Providers (ICSPs), they are designed to prevent...more

1,857 Results
|
View per page
Page: of 75