Gramm-Leach-Blilely Act Data Protection

News & Analysis as of

FTC Can Regulate Cybersecurity Practices, Third Circuit Rules

The Federal Trade Commission (FTC) can regulate cybersecurity policies and procedures as “unfair” acts or practices under Section 5 of the FTC Act, the U.S. Court of Appeals for the Third Circuit has ruled in a very important...more

Special Alert: Third Circuit Gives FTC Green Light to Continue Enforcing Corporate Data Security

Last week, the U.S. Court of Appeals for the Third Circuit affirmed the Federal Trade Commission’s authority to hold companies accountable for their data security practices under Section 5 of the FTC Act (15 U.S.C. § 45(a)),...more

Under the Thumb: Regulatory Compliance When Outsourcing Cybersecurity Management

Managed security services are often a natural “add-on” when outsourcing IT services given that data protection is integral to application development, software as a service, and cloud storage, among other services. More...more

New Potential Liability for Data Security: U.S. Court of Appeals for the Third Circuit Announces FTC has Authority to Scrutinize a...

The U.S. Court of Appeals for the Third Circuit announced that the Federal Trade Commission (FTC) has the authority to scrutinize a business’s data security protocol -- and to file a complaint if the FTC finds that protocol...more

Consumer Privacy Bill of Rights

The White House released its much anticipated legislative proposal on the Consumer Privacy Bill of Rights Act (CPBRA) that was first floated in 2012. The CPBRA, if enacted (which seems unlikely before 2016), would provide...more

President Obama Unveils Plans About Cybersecurity

Written by Sydney White President Obama made a series of announcements on cybersecurity, data security, and privacy that will be incorporated into his State of the Union address tonight.  In conjunction with the...more

Data Center Contracts: Privacy and Security Terms

A sometimes overlooked but potentially significant liability exposure for any company that uses the “cloud” to remotely store, process or distribute data is the service provider contract between the company user and its data...more

Privacy & Cybersecurity Update - October 2014

In This Issue: - October: National Cyber Security Awareness Month - New California Data Protection Law - Obama Signs Cybersecurity Executive Order - FTC Cautions Executives About Personal Liability for False...more

Privacy in the Cloud: A Legal Framework for Moving Personal Data to the Cloud

For many companies, the main question about cloud computing is no longer whether to move their data to the “cloud,” but how they can accomplish this transition. Cloud (or Internet-based on-demand) computing involves a shift...more

Credit Unions Continue to Demand New Data Security Standards for Retailers and Right to Recover Losses After a Breach

On September 3, 2014, following the news of a possible breach at Home Depot (which was confirmed on September 8), the National Association of Federal Credit Unions (NAFCU) called on Congress to enact new legislation to hold...more

Risk of Data Breaches Keeping You Up? Assess Data Security Before The Holiday Season

Data security breaches marred the 2013 holiday season for many consumers and retailers. The most famous security breach, at Target Corporation (Target), involved the loss of information on 40 million payment cards and...more

CFPB proposes new rule on GLBA annual privacy notice

The CFPB has published a proposed rule that would amend Regulation P to allow financial institutions that satisfy certain conditions to deliver annual privacy notices to their customers using an alternative online delivery...more

The Skinny on the White House Big Data Report

While the public debate on privacy has largely focused on how government, particularly the intelligence community, collects, stores, and uses data, President Obama earlier this year announced a comprehensive review of the...more

Privacy Law - Why Compliance is Crucial to Your Business

Privacy law touches the lives of all of us in different ways. To a constitutional junky, it simply provides protection from government intrusion. To A-list celebrities, it can help keep candid pictures off the front page of...more

Enterprise Data Security For The Securities Lawyer

Assuring cybersecurity has become a necessity for businesses across all industries. Cybercrime — with over $1 trillion in annual profits — is now the most lucrative illegal global business. Any business with computers and...more

Outsourcing to the Cloud

As many companies turn to cloud computing as a means of increasing accessibility and saving costs, you should consider a variety of risks which require thoughtful planning before moving your data to “the cloud.” Outsourcing...more

16 Results
|
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×