Data Security

News & Analysis as of

Socially Aware: The Social Media Law Update Volume 7, Issue 3

How To Protect Your Company’s Social Media Currency - Today’s companies compete not only for dollars but also for likes, followers, views, tweets, comments and shares. “Social currency,” as some researchers call it, is...more

The CFPB Takes First Enforcement Action Related to Data Security Practices

The Consumer Financial Protection Bureau (CFPB ) has taken its first UDAAP action against a consumer financial service provider related to data security practices. Since its launch in December 2009, Dwolla, Inc. ("Dwolla"),...more

Privacy Tip #32 – Online banking privacy

I am no doubt one of the few individuals in the world that does not have an online banking account. I just know too much. Although banks have some of the highest security measures of any industry, they are also prime targets...more

How to Design a Document Retention Policy

Data minimization can be a powerful – and seemingly simple – data security measure. The term refers to retaining the least amount of personal information necessary in order for an organization to function. Less information...more

LabMD’s Waiting Game: Lingering Questions over FTC’s Authority in Data Security Matters

A contentious legal battle over data security between the Federal Trade Commission and LabMD, a small medical testing lab, is chronicled in the latest edition of Bloomberg Businessweek. Dune Lawrence’s report raises...more

The FCC’s Privacy NPRM: A Closer Look at the Commission’s Legal Authority and Some of Its Proposals

As we have previously advised, the FCC’s proposed rulemaking to “protect the privacy of customers of broadband and other telecommunications services” (the “NPRM”) proposes sweeping changes to the ways that Internet Service...more

AOL, Dropbox and the Big “uh-oh”

A New York couple brought suit against their former law firm because it used an America Online account to transact firm business. If you are my age you probably remember that AOL and “You’ve got mail!” were the future—back...more

Fourth Circuit Upholds Coverage Under CGL Policy for Data Breach Claims

The United States Court of Appeals for the Fourth Circuit (“Fourth Circuit”) recently concluded that an insurer had a duty to defend a health care company that was sued by individuals whose personal health information was...more

Managed Services: eDiscovery That Tastes Great and Is Less Filling

In the 1970s, one brewer introduced its brand of light beer, and a classic debate: “tastes great” vs. “less filling.” The idea behind the campaign was that the beverage was “everything you always wanted in a beer. And...more

Survey says… New trends from corporate in-house counsel

Recently, Kroll and Kroll Ontrack surveyed over 170 corporate in-house counsel to share their perspectives on modern legal challenges facing organizations. We asked about some of the most pressing issues – from big data and...more

Department of Health and Human Services Cracks Down on Vendor Oversight in Recent Hospital Settlements

From the rise in ransomware attacks to inadvertent disclosure of information by subcontractors, the health services industry is reminded that a potential consequence of a data breach is the threat of a regulatory enforcement...more

Phishing and Spoofing Scams — A Few Tips to Protect Yourself and Your Business

The phone rings. The caller ID says it’s your attorney’s office. When you answer, you are told you owe your attorney additional money and are directed to call a toll-free number. When you call the number, you are told how...more

Health Law Insights Newsletter - Issue 8 - April 2016

McCarter & English, LLP’s Health Care Group presents Issue 8 of the Health Law Insights, which discusses the latest legal issues in the health care industry. NATIONAL - New Payment Model for Part B Drugs Proposed -...more

The Vendor Governance Wake-Up Call

The “Panama Papers” leak and other breaches at major law firms in the past year bear out the findings from the American Bar Association’s 2015 Legal Technology Survey Report. Earlier this month, 11.5 million documents were...more

Alert on Ransomware Attacks and Prevention

Imagine entering your office, sitting down with a cup of coffee, and going through the routine task of logging on to your computer to review your emails and schedule for the day. Except this time, there is a problem. A...more

Analysis of the FCC’s Proposed Broadband Privacy Regulations

As we highlighted in a post last month, the FCC has proposed sweeping new privacy rules on broadband providers. Since our last post, the FCC has released its proposal in the form of a Notice of Proposed Rulemaking. ...more

Judge Flunks Case Against LabMD, FTC Appeals

In March 2015, I wrote about the ongoing dispute between the FTC and LabMD, an Atlanta-based cancer screening laboratory, and looked at whether the FTC has the authority to take enforcement action over data-security practices...more

Ransomware Cuts Deep, in Life & in Coverage

1. Beyond Breaches - With ransomware, cybersecurity in healthcare has gone far beyond HIPAA compliance, breaches of PHI or identity theft. For the unprepared healthcare provider not able to prevent ransomware or...more

Nebraska Amends Data Breach Notification Law

Last week, Nebraska Governor Pete Ricketts signed into law LB 835, which makes the following amendments to the state’s data breach notification statute: - Adds to the definition of “personal information” a user name or...more

Tennessee Amends Its Data Breach Notification Laws

Removes the Encryption Safe Harbor, Limits the Timing of Notice, and Expands “Unauthorized Persons” - Effective July 1, 2016, Tennessee becomes the first state to remove the encryption safe harbor from its data breach...more

Federal Agencies Provide User-Friendly Guidance on Compliance with Data Privacy Laws

How federal privacy laws apply to mobile health applications has been an area of significant ambiguity. Recently, the Federal Trade Commission’s (FTC), the U.S. Department of Health and Human Services (HHS) Office of Civil...more

State AG Privacy Focus Shifting From Retail To More Sensitive Data

On April 6, during a panel discussion at the International Association of Privacy Professionals’ Global Privacy Summit, officials from the Attorney General offices of New York, Illinois and the District of Columbia...more

Data Security: You Must Know Where the Data Is Located Before You Can Secure It

It is commonplace to turn on the television news and hear of a new data breach from a large retailer or someone else. No one wants the legal problems (not to mention the embarrassment and the hit to reputation) from having...more

You’ve Been Notified: Alabama May Join Other States in Enacting Data Breach Notice Law

Forty-seven states and the District of Columbia have laws requiring notice of a data breach to potentially affected individuals. Alabama may soon join the crowd. Bills creating the Alabama Information Protection Act of...more

Fourth Circuit Finds That Traditional CGL Policies May Continue to Provide Coverage for Cyberliability Claims

A federal U.S. Court of Appeals has confirmed that comprehensive general liability (CGL) and other traditional policies may yet be a source of liability insurance coverage for cyberliabilities. Although a dedicated...more

807 Results
|
View per page
Page: of 33
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×