News & Analysis as of

Internet of Things Data Breach

New FTC Guidance on Children’s Online Privacy Protection Act

by Morgan Lewis on

In May 2017, Senator Mark Warner of Virginia sent a letter to the Federal Trade Commission (FTC) raising concerns about the security of data collected, transmitted, and/or stored by internet-connected products geared toward...more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

Tesla’s rise to the top of the US car heap in terms of market value raised a lot of eyebrows a few months ago. GM bumped it back down yesterday, but its three months as #1 marked what felt like a serious shift in the auto...more

Companies Using IoT Being Hit with Security Breaches

A new survey released by Altman Vilandrie & Company, which surveyed 400 IT personnel who have purchased Internet of Things (IoT) security products, shows that 46 percent of companies that buy IoT security admitted they have...more

IoT Cybersecurity and Data Privacy Trends in Asia: Be Ready

by Hogan Lovells on

In this hoganlovells.com interview, Hong Kong-based Hogan Lovells partner Mark Parsons talks about the regulatory environment in Asia as it relates to cybersecurity, data privacy, and the Internet of Things (IoT)....more

IoT got 99 problems and security is one

by DLA Piper on

The number of internet connected devices and products is rapidly increasing and in turn creating more opportunity for cyber security breaches and generating greater amounts of data including personal information. Consumer...more

Is There Fire Where There’s Smoke? The FTC Says Yes

In January of this year, the Federal Trade Commission (FTC) brought suit against Taiwan-based D-Link Corp. and its U.S. subsidiary, D-Link Systems Inc, in Los Angeles Federal Court, for failing to properly secure its consumer...more

Navigating the IoT Workplace Quagmire

by Morgan Lewis on

The Internet of Things (IoT) promises a societal transformation based on a virtuous circle of constantly improving connectivity, integration, data, intelligence, and automation. One important element of this transformation is...more

Employment Law Navigator – Week in Review: April 2017

by Zelle LLP on

There was a lot of discrimination law action last week, including the announcement of a $12 million settlement to be paid by Texas Roadhouse. The EEOC brought an age discrimination suit against the Louisville, Kentucky-based...more

Data Breach Involving CloudPets “Smart” Toys Raises Internet-of-Things Security Concerns

On February 27, 2017, news reports disclosed a major security breach involving Spiral Toys, the seller of the CloudPets brand of internet-connected stuffed animals. The Bluetooth-connected CloudPets toys allow users to...more

Cyber Security and Social Engineering: A Big Low Tech Problem

by LeClairRyan on

Headline-grabbing cyber hacks of email accounts belonging to celebrities, corporations, government officials and political campaigns are becoming the norm. Cybersecurity intended to guard against these acts brings to mind...more

[Event] Who's in the Driver's Seat? What the Connected Car Shows Us About the Legal and Regulatory Issues of the Internet of...

by BakerHostetler on

The Internet of Things (IoT) is creating unprecedented opportunities and challenges – launching groundbreaking collaboration among disparate industries and generating insightful data from uncommon sources....more

"Privacy & Cybersecurity Update - January 2017"

In this edition of our Privacy & Cybersecurity Update, we discuss how the prospect of a new chair and three new commissioners at the FTC may impact the agency's approach to cybersecurity regulation, a new Massachusetts...more

Privacy and Data Security: 2017 Year in Preview

by Polsinelli on

Few issues keep executives awake at night more than Privacy and Data Security. New regulations and threats alike are plentiful, varied, and evolving. The rate of change for cybersecurity and information governance continues...more

"Privacy & Cybersecurity Update - December 2016"

In this month's edition of our Privacy & Cybersecurity Update, we examine modifications to New York state's proposed cybersecurity regulations for financial institutions, a 5th Circuit ruling that a phishing scam is not...more

The State of Cybersecurity in 2016 and the (potential) Great Cyber Fire

Cybersecurity hit the news hard in 2016. The number of high profile, and troubling, cyber incidents increased significantly. The Democratic National Committee and one of Clinton’s top advisor’s being hacked, with leaked...more

House Energy & Commerce Committee Holds Hearing on Security of the Internet of Things

The growing scale of cybersecurity concerns is prompting action from government leadership on the federal level. Before the Thanksgiving recess, the House’s Committee on Energy and Commerce got in on the act when two of its...more

Cybersecurity 2017 – The Year in Preview: Emerging Security Threats

Editor’s note: This is the fourth in a continuing end-of-year series. See our previous posts on trade secrets, state regulation and law enforcement, and HIPAA compliance. Our last two posts will focus on the energy...more

NIST Releases Comprehensive Cyber Security Guidelines for the Internet of Things

by Cozen O'Connor on

As the Internet of Things continues to grow and expand, the fact that guidance on security measures and protections is a necessity has become increasingly evident. Recently, the National Institute of Standards and Technology...more

Forrester Cyber Predictions for 2017: Harsh Reality

Forrester recently issued its “2017 Predictions: Dynamics that Will Shape the Future in the Age of the Consumer,” which among others, makes interesting predictions relating to cybersecurity risks coming up in 2017....more

Consider Cyberliability and Network Business Interruption Insurance Coverage in Light of Recent DDoS Internet Attack

by Reed Smith on

The October 21, 2016 DDoS attack on the internet’s domain name system infrastructure underscores the need to consider cyberliability insurance coverage as a critical component of your company’s security and privacy breach...more

Senate Commerce Committee Members Air Laundry List of Pressing Issues Including Privacy, Data Security, and FTC Enforcement

by Kelley Drye & Warren LLP on

On September 27th, the Senate Committee on Commerce, Science, and Transportation held a general oversight hearing of the FTC, which covered a multitude of major policy issues and included testimony from Chairwoman Edith...more

Ten Things You Need To Know About Ransomware

by Poyner Spruill LLP on

In 2013, hackers attacked a venerable Swansea, Massachusetts institution via ransomware. Ransomware is software that locks users out of computers or specific files until the victim pays a “fee” to release the lock. Such...more

Cyber Attacks Reach Subrogation

by Cozen O'Connor on

It was just a matter of time. As cyber-attacks rose and the data security breaches became increasingly devastating to businesses and individuals, cyber breach insurance became more prevalent. And where insurance appears,...more

"Privacy & Cybersecurity Update - June 2016"

In this edition of our Privacy & Cybersecurity Update, we examine the impact of Brexit on EU data protection, court rulings on cyber insurance policy exclusions and coverage gaps, recent statements from the FTC and the...more

Cybersecurity, Use of Internet of Things Technology Concern Manufacturers

by Ballard Spahr LLP on

Powered in part by the growing use of Internet of Things (IoT) technologies, cybersecurity has surged to become one of the leading concerns for global manufacturers, according to a recently released study....more

54 Results
|
View per page
Page: of 3
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.