Data Protection

News & Analysis as of

[Webinar] Mobile Device Management for Health Care Organizations and Vendors - Sept. 10th, 10:00am PDT

In this webinar, we will demystify the HIPAA Security Rule and how to apply the administrative, physical, and technical safeguards in a mobile environment. We will discuss key takeaways from the recently released NIST Draft...more

IRS Sued For Failing To Protect Online Taxpayer Data From Hackers

On August 20, 2015, affected taxpayers filed a class action lawsuit in the United States District Court for the District of Columbia against the Internal Revenue Service (the “IRS”) for failing to secure the personal...more

New survey shows continued lack of executive confidence in cybersecurity and increases in data loss

A new survey released by Raytheon and websense, called “Study-Why Executives Lack Security Posture Confidence While Knowing that the Metrics They Use to Gauge it are Ineffective” “reveals that confidence in [executives’]...more

Throwback Thursday: Why Trade Secret Theft Isn’t Just a Digital Problem And What Businesses Can Do About It

With stories of cyberattacks and data breaches on a seemingly endless loop, businesses and governments have been doubling down on their efforts to protect digital information and assets.  But, in some industries, the greatest...more

Legal Precedent May Come From Ashley Madison Breach

The Ashley Madison saga has captured the attention of the public and legal profession like few prior data security breaches. The reasons are obvious: A website devoted to promoting infidelity is called out for “fraud, deceit,...more

Cybersecurity as a Regulatory Issue: The NAIC Considers The Anthem Breach And Weighs a “Cybersecurity Bill of Rights”

The Cybersecurity Task Force of the National Association of Insurance Commissioners (the “NAIC”) met last month, as part of on the NAIC’s 2015 Summer National Meeting in Chicago. The Task Force focused on two issues: the...more

California State Auditor Report Reveals Weaknesses In Golden State’s Information Systems

Elaine M. Howle, the California State Auditor (“CSA”), released a report on August 25, 2015 on the results of her office’s audit of controls in the state’s information systems. The results of the audit generally were grim,...more

Three Things In-House Counsel Needs to Know About Russia’s New Data Localization Law

On September 1, 2015, Russia’s new law requiring data localization, Russian Federal Law No. 242-FZ (“Russia’s Data Localization Law”) became effective. Although Russia’s Data Localization Law makes multiple changes to...more

Russia’s new data law

Russia’s new Data Localisation Law went live yesterday on 1 September. Many companies with operations in Russia are scratching their heads about how to comply. The Basics - The new law applies to businesses with a...more

Back to Basics: Low tech tips to alleviate high tech headaches

It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more

9 Key Provisions of Outsourcing Contracts That Matter

Outsourcing, whether technical or process-centric, has become an increasingly important component of businesses of all sizes. Handing over the complexity of ever-changing systems that require increasing expertise can often...more

Third Circuit Affirms District Court’s Decision Asserting FTC’s Authority over Companies’ Data Security Practices

On August 24, the U.S. Court of Appeals for the Third Circuit affirmed the Federal Trade Commission’s authority to hold companies accountable for their data security practices under Section 5 of the FTC Act (15 U.S.C. §...more

Strange Bedfellows: Technology Issues in Real Estate Transactions, Part 1

Technology continues to infuse our homes, businesses, and places of employment. For example, the “Internet of Things” – as it is sometimes called – brings a lot of promise to a wide variety of industries and sectors,...more

Data Localisation Law – clarifications published with one month to go…

Just one month before the new Data Localisation Law (‘the law’) is due to come into force, the Russian Ministry of Communications has published its long-awaited clarifications (in Russian) to the new law....more

Illinois Governor Vetoes Data Breach Bill

On August 21, 2015, Illinois Governor Bruce Rauner vetoed legislation that would have modified the state’s data breach notification law. Illinois’ Personal Information Protection Act (the “Act”) was enacted in 2005 to...more

ENISA, European cybersecurity agency, releases 2014 annual activity report

On July 28, the European Union Agency for Network and Information Security (ENISA) published its Annual Activity Report 2014. The report summarises its operations and programs from the previous year, and highlights the areas...more

[Webinar] Beam It Up Safely: Navigating Data Privacy and Security in Telemedicine's Uncharted Territory - Sept. 17, 12:00pm EDT

Science fiction programs once imagined a future where a doctor on a spaceship could treat a patient on a distant planet using groundbreaking technology. The health care industry may not yet have made this giant leap, but...more

Litigation Alert: Third Circuit Permits Federal Trade Commission to Bring Unfair Practice Claim Based on Cybersecurity Practices

In a closely-watched cybersecurity case, a three-judge panel of the U.S. Court of Appeals for the Third Circuit held in Federal Trade Commission v. Wyndham Worldwide Corporation (No. 14-3514) that the Federal Trade Commission...more

Third Circuit Affirms FTC's Ability To Bring Cybersecurity Enforcement Actions

On August 24th, the United States Court of Appeals for the Third Circuit issued its decision in Federal Trade Commission v. Wyndham Worldwide Corp., affirming a 2014 district court ruling that the Federal Trade Commission...more

FTC Can Regulate Cybersecurity Practices, Third Circuit Rules

The Federal Trade Commission (FTC) can regulate cybersecurity policies and procedures as “unfair” acts or practices under Section 5 of the FTC Act, the U.S. Court of Appeals for the Third Circuit has ruled in a very important...more

Your Employees Are Probably Doing It, So Have a BYOD Policy

People today can (and do) work from anywhere—connected through the Internet, WiFi, and cloud-based platforms with a variety of mobile devices. This makes preventing confidential and proprietary business information from...more

Telemedicine or just a gadget for fitness addicts? Mobile Health Apps and the law

Mobile health (mHealth) apps are becoming more and more popular. Back in 2013, more than 97,000 health apps were already on the market. According to the European Commission (EC), this figure now amounts to around 100,000...more

Special Alert: Third Circuit Gives FTC Green Light to Continue Enforcing Corporate Data Security

Last week, the U.S. Court of Appeals for the Third Circuit affirmed the Federal Trade Commission’s authority to hold companies accountable for their data security practices under Section 5 of the FTC Act (15 U.S.C. § 45(a)),...more

In FTC v. Wyndham Worldwide, Third Circuit Upholds FTC Authority to Enforce Flawed Cybersecurity Measures

In a much anticipated decision, the Third Circuit Court of Appeals affirmed the authority of the Federal Trade Commission (FTC) to enforce actions against companies who have been subject to a data breach. The FTC sued...more

DoD New Cyber Security Reporting Rules for Contractors

In a move that highlights the changing winds of federal cybersecurity policy, the Department of Defense (“DoD”) has issued an interim Rule (“Rule”) that imposes new security and reporting requirements on federal contractors,...more

2,198 Results
|
View per page
Page: of 88

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×