Data Protection

News & Analysis as of

If You Can’t Say Anything Nice . . .

You will feel right at home with the CFPB’s newly augmented web-based public-facing complaints database. In accordance with its Final Policy Statement issued on March 19, 2015, the CFPB began publishing consumer complaint...more

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

FIN4 May Have Embarked on a Risky Hacking/Insider Trading Strategy

I haven’t yet turned to a life of crime, so far be it from me to criticize actual criminals’ profit-maximizing strategies. It’s easy for me to nitpick, but I’m not the one strapping on my mask and trying to earn a...more

Data breach: how information governance reduces risk

With all the data breach activity over the past several years, any organization or individual that hasn’t been affected in some way almost feels left out. According to the Department of Health and Human Services, 120 million...more

Laws Governing Data Security and Privacy – U.S. Jurisdictions at a Glance

The below chart constitutes a summary of the laws of various jurisdictions that govern data breach notifications...more

Proposed Change to Export Controls Would Allow Use of the Cloud for Encrypted Data

On June 3, 2015 the State Department’s Directorate of Defense Trade Controls (DDTC) and the Commerce Department’s Bureau of Industry and Security (BIS) published proposed regulations which would change the definition of the...more

Internet Of Things, News Websites Fare Poorly In Security And Privacy Review

On June 16, the Online Trust Alliance, an industry group focused on developing and encouraging best practices in online security and privacy, announced that a recent audit of approximately 1,000 websites showed that 46%...more

Financial Services Weekly News Roundup - June 2015 #4

Regulatory Developments - Client Alert: SEC Proposes Pay for Performance Rules: Goodwin Procter’s Capital Markets practice has issued a Client Alert on the SEC’s proposed rule that would require most public...more

Focus on China Compliance - June 2015

In This Issue: - Increased Scrutiny by Chinese Securities Regulators Will Have Global Implications - Effective Employee Suspension Agreements to Facilitate Compliance Investigations - Protecting Against...more

Even Small Businesses Need To Pay Attention To Data Security

When people think about data breaches, corporate giants like Target, Home Depot and Michael’s spring to mind. But even small businesses holding personal information can face costly consequences if a breach occurs. In the...more

IRS Expands Identity Protection Program to Cover Additional Taxpayers

The Internal Revenue Service (IRS) recently announced that starting in 2015, taxpayers who filed their 2014 federal tax return with an address in Florida, Georgia, or Washington, D.C. are eligible to obtain an "identity...more

EU Data Privacy Updates

A brief rundown of developments in recent weeks in the area of EU data protection law: - EU Data Protection Regulation - On Monday, June 15, the EU Council (comprised, for purposes of data protection reform, of...more

NYDFS Report Foreshadows New Cyber Security Regulations

The New York State Department of Financial Services (NYDFS) has released a report entitled "Update on Cyber Security in the Banking Sector: Third Party Service Providers." The report details the findings of an October, 2014...more

RadioShack’s Consumer Data: A Highly Scrutinized Asset

Following the Texas Attorney General’s objection to the sale of RadioShack Corporation’s consumer data as an asset in its bankruptcy, 37 other state attorneys general and a large number of other consumer protection entities...more

Travel Wi-Fi and Security. You May Not Know Who’s Watching.

Over the past few years, users have become increasingly aware of the inherent dangers of connecting to unsecured Wi-Fi networks. Unfortunately, existing security vulnerabilities in the underlying network hardware may still...more

IT Project Disputes Management - Managing the Cloudy Skies

In this issue: - Overview of Presentation - Prevention is better than cure - Fix problems in the design phase - Early diagnosis and treatment of problems - So what do you do? - Areas of major...more

A New Era of HIPAA Enforcement

Traditionally, HIPAA enforcement is assigned to the Department of Health and Human Services’ Office for Civil Rights (OCR). In November 2013, Health and Human Services’ Office of Inspector General sharply criticized OCR’s...more

That is SO last week - June 2015 #2

Over the past couple of weeks, payroll giant ADP and successful HR startup Zenefits got into what The Starr Conspiracy has called a “kerfuffle” over Zenefits’ use of ADP’s employer data and millions of employees’ personal...more

Privacy Tuesday – June 2015

It’s appropriate that the “boys of summer” feature prominently in today’s post. Strike three for the St. Louis Cardinals? On another summer Privacy Monday in 2014, we made note of a reported hack into the Houston...more

Cybersecurity: Where Does the Buck Stop?

Over the last few months, we’ve been talking about cybersecurity issues for employers. We’ve discussed the responsibilities and risks associated with personally identifiable information and the wave of lawsuits resulting...more

The Next Examination Enforcement Wave— Cybersecurity Assessments?

Why it matters - The member banking agencies of the Office of the Federal Financial Institutions Examination Council (FFIEC) will soon promulgate a “Cybersecurity Assessment Tool” for use by community banks after a pilot...more

Cybersecurity Coverage Litigation: Learning to Survive After the Second Wave Hits

It’s a familiar pattern. First, new risks inspire legislation and regulations that impose new penalties. Next, insurers and policyholders fight over whether the new liabilities are covered under traditional liability...more

PIPEDA Amendments In-Force

Amendments to Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) are frequently proposed but just as frequently die on the order paper. Bill S-4, which proposed the most significant amendments to...more

EU/Swiss-U.S. Safe Harbor: More Scrutiny by the FTC?

On May 29, 2015, the Federal Trade Commission ("FTC") announced the approval of the final orders for two U.S. companies, TES Franchising, LLC ("TES") and American International Mailing, Inc. ("AIM"), settling complaints that...more

Unsecured Networks More Susceptible to Data Theft

Over the past few years, users have become increasingly aware of the inherent dangers of connecting to unsecured Wi-Fi networks. Unfortunately, existing security vulnerabilities in the underlying network hardware may still...more

1,980 Results
|
View per page
Page: of 80

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×