Data Security

News & Analysis as of

Profile of a Malicious Insider: Top Warning Signs

How are your company’s crown jewels – trade secrets, digital assets and the like – most likely to be compromised? Although coverage in the media would suggest that nation states or competitors are most likely to be the...more

Progress on Data Protection in the European Union

We may see the final text of the proposed EU General Data Protection Regulation by the end of 2015. In mid-June, the Council of the European Union set forth an agreed general approach to the proposed EU General Data...more

Laws Governing Data Security and Privacy – U.S. Jurisdictions at a Glance

The below chart constitutes a summary of the laws of various jurisdictions that govern data breach notifications...more

The War Against Cyber Threats: President Obama Ups the Ante

Focusing on overseas cyber threats, President Obama issued an Executive Order on April 1, 2015, which grants authorization to impose sanctions on individuals and entities engaged "in malicious cyber-enabled activities that...more

Security bug found in Samsung® smartphones

Samsung recently announced that about more than 600 million Samsung mobile devices contained a factory installed third party software produced by SwiftKey that predicts the words you will types on your keyboards. The issue...more

Discovery in International Litigation: Data Privacy and Best Practices for Global Organizations

In an increasingly global economy, it is only natural to see a rise in complex and high-stakes international lawsuits. As a result, cross-border discovery issues are now commonplace, a staple of international litigation. ...more

The Internet of Things: EU vs US guidance

In its February 2015 Report on the Internet of Things (IoT), the FTC estimated that there are now 25 billion connected devices worldwide. Another more conservative report by Gartner estimates there will be 2.9 billion...more

Employees Who Suffer Only Economic Losses From a Data Breach Cannot Sustain a Negligence Claim Against Their Employer

Creating a private cause of action in negligence for data breaches could result in the filing each year of possibly hundreds of thousands of lawsuits by persons whose confidential information may be in the hands of third...more

Staying Out of the FTC’s Data Security Cross-Hairs

As the Federal Trade Commission acknowledges in a recent blog post, no company wants to discover that its data security practices are under federal investigation. Yet any company that collects, uses or maintains consumer data...more

Doing Business In Connecticut? There's A New Data Security Law You Should Get To Know

This week the Connecticut House of Representatives passed Senate Bill 949, "An Act Improving Data Security and Agency Effectiveness," (the "Act") which includes new or modified State requirements concerning the security of...more

Lost, Unencrypted Laptop Leads FINRA to Fine a Broker-Dealer $225,000 for Violating Reg S-P

With the recent focus by the SEC and FINRA on cybersecurity for broker-dealers and investment advisers as a backdrop, FINRA recently brought and settled an enforcement action under SEC Regulation S-P against broker-dealer...more

Fitbit IPO Cyber Risk Disclosures

Earlier this month, fitness-tracking company Fitbit, Inc. filed a Form S-1 Registration Statement for an IPO of up to $100 million that exhaustively disclosed potential cybersecurity risks with respect to the personal data...more

Advertising Law - May 2015 #4

SPECIAL FOCUS: The Impact of the Supreme Court’s Octane Fitness Decision on Lanham Act Litigation - For the second time in recent years, a Supreme Court decision in a patent case is having a major impact on Lanham Act...more

Another Prologue to Cybersecurity Regulations: Controlled Unclassified Information (“CUI”) – What Contractors Need to Know and Why...

Government contractors should take note of a proposed new rule that could impose significant new data storage obligations when finalized. The Federal Government is taking another baby-step towards cybersecurity regulation...more

Bitcoin Basics for Corporate Counsel

Bitcoin, the online “cryptocurrency,” is not just for anti-government doomsday fanatics and drug dealers. Seen everywhere from SEC filings, to state legislature hearings, to an episode of The Good Wife, it is both an...more

Data Breach Increases Show Importance of Data Security Compliance in Business Sector

Data breaches have seen a lot of media attention in the past year, but that should come as no surprise since 2014 was a record year for them. According to a report by the Identity Theft Resource Center, there were 783 tracked...more

Federal Trade Commission Targets Organizations with Expired U.S.-EU Safe Harbor Certifications

Organizations in the United States that certify to the U.S.-EU Safe Harbor Framework to transfer and receive personal data about residents of the European Union must annually reaffirm to the U.S. Department of Commerce that...more

Healthcare Organizations not Immune from Criminal Attacks on Sensitive Information

This month, the Ponemon Institute released its Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data and its findings are generating a good deal of attention. In the past, the Study has found that most data...more

Telesurgery: A New Frontier or Just Risky Business?

Security experts at the University of Washington in Seattle recently set out to expose potential privacy and security vulnerabilities that exist in telesurgery. As first reported by MIT Technology Review, experts hacked a...more

FTC Comments and Background Screeners

I recognize this is a few days late, but the content is still timely. Last month I attended the NAPBS Mid-Year Conference in Washington, DC both as an attendee and speaker. One session of particular interest to me was...more

Advertising Law - May 2015 #2

Data Breach Notification, Cyber Sharing Bills Move Forward - As multiple privacy and data security bills wend their way through the legislative process, three proposals have made significant steps forward. ...more

Senator Leahy Introduces Data Privacy And Notification Law With Limited Preemption of State Law

On April 30, 2015, Senator Patrick Leahy (D-VT) introduced new data breach legislation. The proposed law would require companies to meet certain consumer privacy and data protection standards and to notify individuals within...more

The Nevada Data Breach Law

Nevada, like most states, has a data security statute that addresses what to do when there’s a data breach. Here’s a quick summary of the Nevada law, which is found at N.R.S. § 603A.010 et seq, “Security of Personal...more

BakerHostetler Partner Alan Friel Talks Big Data and Data Collection [Video]

Alan Friel, Partner with BakerHostetler's Privacy and Data Protection team, talks about compliance programs for companies, consumer data collection, misrepresentation, and data security deficiencies....more

PCI Published New Security Standards for Payment Card Vendors

The Payment Card Industry Security Standards Council (PCI SSC) recently published updated PCI Card Production Security Requirements. Version 1.1 of the standards include new logical and physical security standards to protect...more

30 Results
|
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×