News & Analysis as of

“Bring Your Own Device” To Work Programs: Regulatory and Legal Risks and How To Minimize Them

If you’ve ever left your mobile phone on an airplane, in a restaurant, or somewhere other than in your possession, you know it’s frightening enough to think of losing the device itself, which costs a premium, as well as your...more

Federal Court Decision Demonstrates Ongoing Challenges Faced by Plaintiffs in Data Breach Litigation

On February 11, 2015, the U.S. District Court for the Southern District of Texas dismissed a class action complaint against the St. Joseph Health System arising out of a data security breach that occurred after hackers...more

Cybersecurity is Key Initiative for National Association of Insurance Commissioners

Even your grandmother is talking about cybersecurity, so you know it’s got to be important. In the world of insurance, the wheels are in motion at the NAIC – the National Association of Insurance Commissioners – to get a...more

Enforcement of the Personal Data Protection Act in Singapore

The Personal Data Protection Commission (the “Commission’) was established in January 2013 to implement and enforce The Personal Data Protection Act 2012 (“PDPA”). The PDPA fully came into force on 2 July 2014. So far, the...more

Health Update - February 2015

Cyber Risk Insurance Policies: What You Need to Know - Editor’s Note: As data breach incidents and related cyber risks continue to increase and gain publicity—and government agencies become more actively involved in...more

FINRA Issues its Cybersecurity Report, Providing Tools and Encouragement to Broker-Dealers

FINRA recently issued a Report on Cybersecurity Practices (“Report”), growing out of its targeted examination of firms last year. To issue the Report, FINRA gave careful consideration to the needs of many broker-dealers for...more

Standing in Data Breach Cases – Still a Moving Target

Where do we stand on standing in data breach cases? It depends on which court you ask. In December 2014, two courts considered whether plaintiffs alleged sufficient injury in their complaints involving well-known data...more

Ethical Issues Implicated by Lawyers’ Use of Third-Party Cloud Services

Law firms increasingly turn to “cloud services” for processing and storing confidential client information because of their greater flexibility and efficiency. Use of “the cloud,” however, outsources the administration,...more

Also In the News - Data, Privacy, & Security Practice Report - February 2015 #3

White House Holds Summit On Cybersecurity And Consumer Protection — On February 13, 2015, leaders from throughout the country representing sectors with a stake in cybersecurity and consumer protection issues convened at...more

More Than Employers Bargained For? Do Union Employees Have a Right to Bargain Over Company Data Breaches?

These days most employers manage a vast amount of electronic information about their employees, including the employees’ personal identifying information. But, what obligations do employers have to unionized employees with...more

HIPAA Compliant Technology and the Importance of Encryption

We welcome this guest blog by Gene Fry, Compliance Officer, Scrypt, Inc. The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for protecting sensitive patient data. This means that any...more

South Korean Communications Commission Releases Guidelines on Data Protection for Big Data

In December 2014, the Korea Communications Commission (KCC) released the“Big Data Guidelines for Data Protection” (Guidelines). Aimed at Information and Communications Service Providers (ICSPs), they are designed to prevent...more

Eye on Privacy Newsletter - February 2015

In this issue: - Privacy and Data Security in Transactions: What's the Deal? - Consumer and Financial Institution Class Actions Survive Motions to Dismiss in Target Data Breach Litigation - California Amends...more

UDRP Panel Tells Snapchat to Check Itself Regarding Snapchatcheck.com

By now you’ve probably heard of Snapchat. But if you are not among its growing core base of users between 13 and 23 years of age (probably a good deal younger than you, constant reader) there’s a good chance you are not a...more

The Private Sector’s Role in the New Face of Homeland Security

The Obama administration recently announced the creation of the Cyber Threat Intelligence Integration Center (CTIIC), a new governmental agency created to prevent cyber threats by analyzing and integrating digital...more

Advertising Law - February 2015 #3

FCC Chair Announces New Net Neutrality Regs - The battle over net neutrality took a new turn when Federal Communications Commission Chairman Tom Wheeler announced his intention to reclassify broadband service as a...more

Senators Trying to Hit the Brakes on Smart Cars, Citing Privacy and Security Concerns

On February 11, Sens. Ed Markey (D-Mass.) and Richard Blumenthal (D-Conn.) announced that they would introduce legislation intended to address the data privacy and security vulnerabilities with Internet-connected cars. The...more

Employers with Group Health Plans: Have You Notified State Regulators of the Breach?

Data security breaches affecting large segments of the U.S. population continue to dominate the news. Over the past few years, there has been considerable confusion among employers with group health plans regarding the...more

FINRA Issues Cybersecurity Practices Report And Investor Guidance

On February 3, the Financial Industry Regulatory Authority (“FINRA”) issued two publications concerning cybersecurity risks at financial firms. The Report on Cybersecurity Practices presents the results of FINRA’s 2014...more

Update on President Obama’s “Summit on Cybersecurity and Consumer Protection,” Part I

The first ever Summit on Cybersecurity and Consumer Protection was convened today at Stanford University, keynoted by President Obama. The purpose of the summit: to “bring[] together major stakeholders on consumer financial...more

Preparing for a Data Breach – What to Know about Breach Notification

Data breaches are at the forefront of the news, and many companies, including those dominant in the health care industry, have found themselves front and center in the headlines. Although recent news stories have focused...more

Financial Industry Backs Cybersecurity, Data Breach Notification Legislation

Why it matters - The financial industry has thrown its support behind data breach notification legislation as well as passage of a law that would encourage businesses to share cyberthreat information. Data security...more

From Carjacking to Carhacking – Lessons for the Internet of Things

The Internet of Things (IoT) is coming and perhaps the first place we will see the proverbial rubber hit the road is with something near and dear to Americans – our cars. The ever increasing connectivity of cars is creating a...more

How Recent Data Breaches are Changing the Face of Cybersecurity for the Private Sector

If "The Year of the Breach" and the rapid start to data breaches in 2015 have taught us anything, it is that any company is susceptible to a cyber attack; and, while data breaches are not a new concept, the way the private...more

Trends To Watch In Cyber Liability and Reputational Insurance

With major data breaches again making news, it is important for corporate policyholders to keep abreast of insurance developments in this emerging and fast-moving area. In this update, we provide some thoughts on cyber...more

603 Results
|
View per page
Page: of 25