News & Analysis as of

Data Security

First Catalogue Published for Network Products Subject to Certification

by Faegre Baker Daniels on

On June 9, 2017, the Cyberspace Administration of China (CAC), jointly with Ministry of Industries and Information, Ministry of Public Security, and the Certification and Accreditation Administration of China, published the...more

The GDPR and the Bottom Line: How the EU Data Privacy Regulation Will Affect U.S. Companies’ Data Collection and Processing...

For U.S. companies which do business in Europe or who process the personal data of European Union residents, the world of data privacy and security is about to get much more complicated. While U.S. privacy law is unsettled,...more

Why Updating The Electronic Communications Privacy Act Poses Difficulties

by Revision Legal on

The privacy of electronic communications is provided for under the Electronic Communications Privacy Act. There are limited circumstances in which ISPs may disclose the contents of electronic and stored digital...more

Disgruntled Employees and Other Internal Threats to Your Cyber Security

by Baker Donelson on

Baker Donelson's Data Protection, Privacy and Cybersecurity attorneys are pleased to continue a series of client alerts that address significant cyber-threats to your business and discuss ways you can protect your business...more

Privacy Perils: Don't "Play" Around with Some Google Apps

by Bass, Berry & Sims PLC on

A group of researchers at the University of Michigan has discovered that hundreds of applications in Google Play, whose function is to turn Android phones into a server that allows the user to connect their phone directly to...more

11th Circuit Hears Oral Argument in LabMD Case

Recently, the United States Court of Appeals for the Eleventh Circuit, sitting in Miami, heard oral argument in the case of LabMD, Inc. v. Federal Trade Commission, No. 16-16270. ...more

Girl Scouts Issue Cybersecurity Badges for Girls in K-12

If you have a daughter in K-12 who is in the Girl Scouts, check out the fact that they can now earn cybersecurity badges if they demonstrate a mastery of Internet security. Brilliant! What a great way to get girls interested...more

Power Outage Shows Unique Risks for Airport Cybersecurity

by Baker Donelson on

On May 27, 2017, thousands of British Airways passengers across the globe were stranded when a simple power failure took down critical systems, including those used to check in passengers. As images of crowded terminals and...more

US Companies Create Principles for Cybersecurity Risk Ratings

by BakerHostetler on

On June 20, 2017, the U.S. Chamber of Commerce announced that a consortium of more than two dozen chamber member companies, including prominent big banks, big-box retailers, and technology giants released a set of principles...more

FTC Submits Comment To Aid NTIA In Developing Internet of Things Guidance

by Ballard Spahr LLP on

In its latest effort to address security concerns about Internet of Things (IoT) devices, the Federal Trade Commission (FTC) has submitted public comments to the National Telecommunications and Information Administration's...more

2017 Security Breaches: Frequency and Severity on the Rise

by Revision Legal on

We are only six months into 2017, and we can already tell that it is going to be a bumper year with regard to instances of data security breaches. Looking back at the hacking statistics from 2015 and 2016, we should not be...more

Data Security in Japan: New Cross-Border Data Transfer Rule

by K&L Gates LLP on

Does your business outside of Japan receive any personal information from Japan, perhaps from your affiliates, business partners, or customers based in Japan? Does your business in Japan transfer any personal information...more

The Cyberspace Administration of China Released the First Batch of Network Products that Are Subject to Security Review

by Dechert LLP on

The Cyberspace Administration of China ("CAC") recently released the first batch of "Catalog" - a listing of the specific network products that have been identified for review under China's New Cybersecurity Law. This article...more

Strengthening Data Security Through Human Resources And Information Technology Teamwork

by Jackson Lewis P.C. on

Human Resources (“HR”) and information technology (“IT”) departments play unique and important roles within an organization. With instances of data breaches on the rise, however, companies should be mindful of the importance...more

A question of harm: LabMD to face off with FTC at 11th Circuit

In a consequential test of the Federal Trade Commission’s authority as a data security regulator, the U.S. Court of Appeals for the Eleventh Circuit will hear argument tomorrow in a case that will determine whether the agency...more

FTC Submits Comments on IoT Device Security to NTIA Working Group

by Kelley Drye & Warren LLP on

On Monday, the FTC submitted comments to the draft National Telecommunications and Information Administration (NTIA) guidance intended to improve Internet of Things (IoT) device security and increase consumer transparency....more

Rallying Cry: Health Care Cybersecurity a Key Public Health Concern

by Sedgwick LLP on

On June 2, 2017, the Health Care Industry Cybersecurity Task Force published its Report on Improving Cybersecurity in the Health Care Industry. The lengthy and comprehensive Report serves as a wake-up call to the medical...more

My Entity Just Experienced a Cyber-Attack! What Do We Do Now?

by Balch & Bingham LLP on

On June 9, 2017, the U.S. Department of Health and Human Services (HHS), Office of Civil Rights (OCR) released a cyber-attack “Quick Response” checklist (the Checklist) for the benefit of HIPAA covered entities and business...more

OCR Publishes Checklist and Infographic for Cyber Attack Response

OCR released a simple checklist and infographic last week to assist Covered Entities and Business Associates with responding to potential cyber attacks. As cybersecurity remains a pressing concern for health care entities,...more

FTC Tracking Of Privacy Complaints

by Bryan Cave on

The FTC collects complaints about companies that allegedly violate the data privacy, data security, advertising, and marketing laws. The result is a massive database of consumer complaints known as “Consumer Sentinel” that is...more

Hogan Lovells China Desk Brochure

by Hogan Lovells on

A bridge between China and Europe, the Middle East and Africa - The Hogan Lovells China Desk seeks to help you benefit from the opportunities arising from the evergrowing economic ties between the EMEA region and China....more

Yet another Target settlement highlights data breach costs

by Thompson Coburn LLP on

In what appears to be the closing act of the saga that is the Target data breach, on May 23 the retailer announced it had reached a settlement agreement with a coalition of 47 states’ attorneys general. Pursuant to the...more

Mobile Apps: Key Privacy, Security and Data Collection Considerations

by Patrick Law Group, LLC on

Over the past three years, mobile application usage in the U.S. has increased by 111%, and over 50% of digital media consumption in the U.S. is now through mobile apps. As consumer use of mobile apps continues to rise, the...more

HHS Task Force Says Healthcare Cybersecurity is in “Critical Condition”

Unbeknownst to many, Congress established the Health Care Industry Cybersecurity Task Force in 2015 to address the health care industry’s cybersecurity challenges. That Task Force–a combination of public and private...more

BROWSER Act Aims to Replace Invalidated FCC Privacy Rules

by Morgan Lewis on

US Representative Marsha Blackburn (R-Tenn.) recently introduced the Balancing the Rights of Web Surfers Equally and Responsibly (BROWSER) Act (the Bill), under which the Federal Trade Commission (FTC) would regain...more

1,463 Results
|
View per page
Page: of 59
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.