Encryption

News & Analysis as of

Trade Secrets, Security, and Cloud Computing: Best Practices Now

As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more

GAO Issues Report Citing Shortcomings In Federal Government Cybersecurity

On July 8, 2015, the Government Accountability Office (“GAO”) issued a report finding that agencies across the federal government continue to have shortcomings in preventing, detecting, and responding to cyber threats. The...more

Class Action Suit Filed Against UCLA After It Suffers Massive Data Breach Affecting 4.5 Million Individuals

In yet another data breach affecting millions of individuals, UCLA Health System (“UCLA”) reported on July 17, 2015, that hackers had accessed portions of its health network that contained personal information, including...more

Class Is in Session: The FTC Launches New Data Security Initiative

Why it matters - The Federal Trade Commission (FTC) kicked off a new educational initiative to provide guidance to businesses in the area of data security. Based on the lessons learned from more than 50 of the agency's...more

FTC's New Consumer Data Security Guidance Offers Businesses Practical Tips

The Federal Trade Commission has issued new guidance on data security for companies that collect, store and use consumer information, gleaned from the more than 50 enforcement actions brought by the agency over the past...more

How Can You Safely Discuss Your IP with Others?

As discussed in our previous posts, startups are about capitalizing on ideas, contacts and experience. In the early stages of a startup or pre-startup, founders often socialize their business plan and details about their idea...more

State Breach Notification Laws – Updates From the 2015 Legislative Sessions, 6 Action Steps for Companies

This is proving to be a banner year for new breach notice requirements. In the period between 2006 and 2009, most US states enacted data breach notice laws. This year, we are seeing a wave of “second-generation” breach notice...more

Privacy Tuesday – July 2015: Hack Attack on Adultery Site Ashley Madison

Once again, data breaches and hacks are front and center, so here are three stories you should know about to start your week....more

Connecticut Updates its Data Security Laws, Imposing Stringent New Requirements

On June 30, 2015, the Governor of Connecticut signed into law S.B. 949, “An Act Improving Data Security and Agency Effectiveness." The new law updates Connecticut’s data security laws, including by adding a 90-day hard...more

Coders Oppose Government Access To Encrypted Data

A group of top coding specialists published a paper on July 6, 2015, arguing that law enforcement’s desire to access encrypted data is not only unfeasible, but would also possibly imperil the security and privacy of global...more

Data Security 101 for Business – Guidance from the Federal Trade Commission

Recently the Federal Trade Commission (FTC) issued a guide, Start with Security: A Guide for Business, which pulls from lessons learned from the 50+ data security enforcement actions that the FTC has announced. To be clear,...more

Privacy and Security Guidance: Cloud Computing in the MUSH Sector

I. Purpose of this Guidance Document and How to Apply - This document is intended to be used by decision makers in the MUSH Sector when considering using cloud services....more

Proposed Rule to Subject Certain Cybersecurity Items to Greater Export Restrictions

The U.S. Department of Commerce Bureau of Industry and Security (BIS) recently published a proposed rule enhancing controls on certain cybersecurity items under the Export Administration Regulations (EAR). Specifically, the...more

E-signatures – Do They Change Ontario Real Estate Deals?

Over the last 20 years, since the introduction of the electronic land registry system, real estate in Ontario has slowly been making its way into the electronic age. On July 1st, 2015 another step was taken. All real estate...more

The USA Freedom Act: What it Changes and (Mostly) Doesn’t for Cloud Services – And is it Really the Issue

The recent showdown over renewal of certain provisions of the USA Patriot Act (often called simply the Patriot Act) and the subsequent enactment of the USA Freedom Act have raised a number of questions about the ongoing...more

Cybersecurity Standards Apply to Thee, Not Me

“If there is anyone to blame, it is the perpetrators,” said Katherine Archuleta, Director of the federal Office of Personnel Management (“OPM”), to a Senate panel investigating the causes of the recent OPM cyberattack. ...more

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

Proposed Change to Export Controls Would Allow Use of the Cloud for Encrypted Data

On June 3, 2015 the State Department’s Directorate of Defense Trade Controls (DDTC) and the Commerce Department’s Bureau of Industry and Security (BIS) published proposed regulations which would change the definition of the...more

FINRA Fines Financial Firm for Failing to Encrypt Customer Data on Lost Laptop

Like other federal agencies exercising regulatory power in the data privacy and security arena, the Financial Industry Regulatory Authority (“FINRA”) is cracking down on firms that fail to meet required data security...more

Largest Breach in U.S. Government History Is a Wake-Up Call on Need for Encryption

Employees are reasonable in assuming that their employer is protecting their personal information from compromise. The obvious way to do that is to maintain appropriate encryption technology. Simply put: encryption,...more

The USA Freedom Act: What it Changes and (Mostly) Doesn't for Cloud Services--And is it Really the Issue

The recent showdown over renewal of certain provisions of the USA Patriot Act (often called simply the Patriot Act) and the subsequent enactment of the USA Freedom Act have raised a number of questions about the ongoing...more

Encryption and the Consequences of Public Policy

In a world where the development of technology moves quickly and governments tend to move slowly, it is common for public policy to become out of sync with the realities of the market. In many cases, this proves to be a...more

Heartland Payment Systems suffers another data breach

Heartland Payment Systems suffered one of the largest breaches in history in 2008, when over 100 million credit and debit cards issued by hundreds of financial service companies were stolen from their payroll payment...more

Encryption and the Consequences of Policy

A few weeks ago, your humble blogger looked into how difficult it was for someone to crack encryption in light of debates on Capitol Hill about whether policies should be put in place to limit its strength. In March and May,...more

User Beware: Facebook’s Internet.org Platform Considered to be “Privacy Nightmare”

On May 4, 2015, Facebook introduced Internet.org Platform, an open program for developers to create services that integrate with Internet.org. However, many privacy advocates have deemed the Internet.org Platform to be a...more

109 Results
|
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×