News & Analysis as of

Data Security

11th Circuit Hears Oral Argument in LabMD Case

Recently, the United States Court of Appeals for the Eleventh Circuit, sitting in Miami, heard oral argument in the case of LabMD, Inc. v. Federal Trade Commission, No. 16-16270. ...more

Girl Scouts Issue Cybersecurity Badges for Girls in K-12

If you have a daughter in K-12 who is in the Girl Scouts, check out the fact that they can now earn cybersecurity badges if they demonstrate a mastery of Internet security. Brilliant! What a great way to get girls interested...more

Power Outage Shows Unique Risks for Airport Cybersecurity

by Baker Donelson on

On May 27, 2017, thousands of British Airways passengers across the globe were stranded when a simple power failure took down critical systems, including those used to check in passengers. As images of crowded terminals and...more

US Companies Create Principles for Cybersecurity Risk Ratings

by BakerHostetler on

On June 20, 2017, the U.S. Chamber of Commerce announced that a consortium of more than two dozen chamber member companies, including prominent big banks, big-box retailers, and technology giants released a set of principles...more

FTC Submits Comment To Aid NTIA In Developing Internet of Things Guidance

by Ballard Spahr LLP on

In its latest effort to address security concerns about Internet of Things (IoT) devices, the Federal Trade Commission (FTC) has submitted public comments to the National Telecommunications and Information Administration's...more

2017 Security Breaches: Frequency and Severity on the Rise

by Revision Legal on

We are only six months into 2017, and we can already tell that it is going to be a bumper year with regard to instances of data security breaches. Looking back at the hacking statistics from 2015 and 2016, we should not be...more

Data Security in Japan: New Cross-Border Data Transfer Rule

by K&L Gates LLP on

Does your business outside of Japan receive any personal information from Japan, perhaps from your affiliates, business partners, or customers based in Japan? Does your business in Japan transfer any personal information...more

The Cyberspace Administration of China Released the First Batch of Network Products that Are Subject to Security Review

by Dechert LLP on

The Cyberspace Administration of China ("CAC") recently released the first batch of "Catalog" - a listing of the specific network products that have been identified for review under China's New Cybersecurity Law. This article...more

Strengthening Data Security Through Human Resources And Information Technology Teamwork

by Jackson Lewis P.C. on

Human Resources (“HR”) and information technology (“IT”) departments play unique and important roles within an organization. With instances of data breaches on the rise, however, companies should be mindful of the importance...more

A question of harm: LabMD to face off with FTC at 11th Circuit

In a consequential test of the Federal Trade Commission’s authority as a data security regulator, the U.S. Court of Appeals for the Eleventh Circuit will hear argument tomorrow in a case that will determine whether the agency...more

FTC Submits Comments on IoT Device Security to NTIA Working Group

by Kelley Drye & Warren LLP on

On Monday, the FTC submitted comments to the draft National Telecommunications and Information Administration (NTIA) guidance intended to improve Internet of Things (IoT) device security and increase consumer transparency....more

Rallying Cry: Health Care Cybersecurity a Key Public Health Concern

by Sedgwick LLP on

On June 2, 2017, the Health Care Industry Cybersecurity Task Force published its Report on Improving Cybersecurity in the Health Care Industry. The lengthy and comprehensive Report serves as a wake-up call to the medical...more

My Entity Just Experienced a Cyber-Attack! What Do We Do Now?

by Balch & Bingham LLP on

On June 9, 2017, the U.S. Department of Health and Human Services (HHS), Office of Civil Rights (OCR) released a cyber-attack “Quick Response” checklist (the Checklist) for the benefit of HIPAA covered entities and business...more

OCR Publishes Checklist and Infographic for Cyber Attack Response

OCR released a simple checklist and infographic last week to assist Covered Entities and Business Associates with responding to potential cyber attacks. As cybersecurity remains a pressing concern for health care entities,...more

FTC Tracking Of Privacy Complaints

by Bryan Cave on

The FTC collects complaints about companies that allegedly violate the data privacy, data security, advertising, and marketing laws. The result is a massive database of consumer complaints known as “Consumer Sentinel” that is...more

Hogan Lovells China Desk Brochure

by Hogan Lovells on

A bridge between China and Europe, the Middle East and Africa - The Hogan Lovells China Desk seeks to help you benefit from the opportunities arising from the evergrowing economic ties between the EMEA region and China....more

Yet another Target settlement highlights data breach costs

by Thompson Coburn LLP on

In what appears to be the closing act of the saga that is the Target data breach, on May 23 the retailer announced it had reached a settlement agreement with a coalition of 47 states’ attorneys general. Pursuant to the...more

Mobile Apps: Key Privacy, Security and Data Collection Considerations

by Patrick Law Group, LLC on

Over the past three years, mobile application usage in the U.S. has increased by 111%, and over 50% of digital media consumption in the U.S. is now through mobile apps. As consumer use of mobile apps continues to rise, the...more

HHS Task Force Says Healthcare Cybersecurity is in “Critical Condition”

Unbeknownst to many, Congress established the Health Care Industry Cybersecurity Task Force in 2015 to address the health care industry’s cybersecurity challenges. That Task Force–a combination of public and private...more

BROWSER Act Aims to Replace Invalidated FCC Privacy Rules

by Morgan Lewis on

US Representative Marsha Blackburn (R-Tenn.) recently introduced the Balancing the Rights of Web Surfers Equally and Responsibly (BROWSER) Act (the Bill), under which the Federal Trade Commission (FTC) would regain...more

The Internet of Things: A Trifecta of Cyber and Physical Threat Risks

by Wilson Elser on

The recent WannaCry ransomware cyberattack provided another chilling reminder of the potential disruptive power behind the Internet of Things. Even before the WannaCry attack in May 2017, a distributed-denial-of-service...more

Home Depot Settles Data Breach Suit for $25M

As a result of a $25 million settlement reached with the remaining banks and credit unions, the litigation against Home Depot stemming from its 2014 data breach will finally end....more

(Un)Protected Health Information Held for Ransom

by Snell & Wilmer on

Recent experiences of major health care companies offer a reminder of the importance of data security and following a well-written policy for compliance with the HIPAA Privacy Rule....more

Blockchain: background, challenges and legal issues

by DLA Piper on

Blockchain and distributed ledger technology offers significant and scalable processing power, high accuracy rates, and apparently unbreakable security at a significantly reduced cost compared to the traditional systems the...more

Global Privacy & Cybersecurity Update Vol. 14

by Jones Day on

New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more

1,458 Results
|
View per page
Page: of 59
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.