Information Security

News & Analysis as of

FTC Final Orders with Fandango and Credit Karma Provide Guidance on Mobile App Security

In August 2014, the Federal Trade Commission (“FTC”) approved final orders resolving its actions against Fandango, LLC (“Fandango”) and Credit Karma, Inc. (“Credit Karma”) for allegedly misrepresenting the security of their...more

Information Security Training Can Even Save Your Grandparents

My morning routine includes driving to work and listening to The Bert Show, which, if you’re not familiar. is a morning talk show that covers celebrity gossip, local news, and even real life problems such as cheating...more

New security features added to ROCA certificates

The BVI Financial Services Commission issued the following announcement on 1 July 2014 regarding new security features for Registry of Corporate Affairs (ROCA) certificates: New certificates bearing a QR Code and a...more

Florida Legislature Unanimously Passes Florida Information Protection Act

On April 30, the Florida House of Representatives unanimously passed the Florida Information Protection Act of 2014, Senate Bill 1524. It now awaits Governor Scott's signature. ...more

Protection against Business and Legal Risks from the iPhone 5s Security Vulnerabilities

The iPhone 5s debuted with a list of new features designed to enhance its users’ experience. Among the list is Touch ID, a form of biometric security that allows users to lock and unlock their iPhone with their fingerprint....more

Government Contracts Quarterly Update - February 2014

The Government Contracts Quarterly Update is published by BakerHostetler's government contracts practice group to inform our clients of the latest developments in federal government contracting. This update covers the...more

FTC Settles Claims Relating to U.S. – EU Safe Harbor Program

The Federal Trade Commission recently announced it has settled claims against 12 companies relating to charges the companies falsely claimed they were abiding by the U.S. – EU Safe Harbor program that enables U.S. companies...more

SEC National Examination Program Outlines 2014 Priorities

On January 9, the SEC National Examination Program (NEP) published its examination priorities for 2014. The NEP’s market-wide priorities include (i) fraud detection and prevention; (ii) corporate governance and enterprise...more

Connecticut Appellate Court Affirms Denial of Coverage Under CGL Policy for Data Breach

As more data breaches and information security events occur, the insurance industry will see more disputes over whether losses from these events are covered under commercial general liability (CGL) policies. In the latest...more

How To Catch-Up in a Revised HIPAA World

The HIPAA final omnibus rule (Omnibus Rule) made sweeping changes to the HIPAA Privacy, Security, Breach Notification and Enforcement Rules earlier this year. Although the compliance deadline of September 23, 2013 has come...more

Making data count

Good data processed quickly and seamlessly is critical for modern businesses. Get it right and it will improve profitability and company valuation. Get it wrong and it may cost you dearly. Think of “Big Data” and what...more

Set Your “Target” on Data Security in 2014

Target Corp.’s data breach has been big news this holiday season, with as many as 40 million holiday shoppers across the nation exposed to potential credit and debit card fraud. According to the Identity Theft Resource...more

Academic Institutions Face Increased Threat Of Cyberattacks

American research universities typically structure their data and digital networks to be as accessible and open as possible to promote the open exchange and sharing of information. ...more

Employer BYOD Concerns: Part 2 of It's 2013. Do You Know Where Your BYOD Policies Are?

In Part 2 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will discuss employer BYOD concerns. Check out Part 1 to learn more about employee interests; Part 3 will present developing trends and suggest best...more

European Commission Publishes Cybersecurity Strategy and a Proposed Directive on Network and Information Security that Would...

On 7 February 2013, the European Commission published two cybersecurity documents designed to provide a comprehensive vision of how European Union Member States, national authorities, and private industry will prevent and...more

15 Results
|
View per page
Page: of 1