Internet of Things Data Breach

News & Analysis as of

Why Federal and State Agencies are Considering Converting from a “Gallons Consumed” to a “Road Usage” Tax – And What are the Risks...

This Change, It’s a Coming (Maybe) - Many states and the federal government are seriously considering converting from a “gallons consumed” tax levy to a “miles driven” program for determining gasoline tax. There are...more

The Internet of Things and the Inevitable Collision with Products Liability PART 3: Initial Contact

This is the third in a series of blogs examining the rapid development of the Internet of Things (IoT) and its consequential impact on product liability risk. The development of the IoT has been so rapid and the applications...more

Cyber risk: Why cyber security is important - We live in an increasingly networked world, from personal banking to government...

Cyber risk is now firmly at the top of the international agenda as high-profile breaches raise fears that hack attacks and other security failures could endanger the global economy. The Global Risks 2015 report,...more

Internet Of Things, News Websites Fare Poorly In Security And Privacy Review

On June 16, the Online Trust Alliance, an industry group focused on developing and encouraging best practices in online security and privacy, announced that a recent audit of approximately 1,000 websites showed that 46%...more

Privacy & Cybersecurity Update - May 2015

In This Issue: - Second Circuit Rules Patriot Act Does Not Authorize Bulk Metadata Collection; Congress Reconsiders Certain Patriot Act Authorities - SEC Issues Cybersecurity Guidance for Investment Companies...more

Sports, Media and Entertainment Intelligence - May 2015 (Global)

COPYRIGHT - Belgium: Even a world famous painter needs to respect copyright - It has been held that the well-known Belgian painter Luc Tuymans breached professional photographer Katrijn Van Giel's copyright through his...more

Privacy & Cybersecurity Update - March 2015

In This Issue: - Dismissal in P.F. Chang’s Data Breach Case Shows Challenge Plaintiffs Face in Such Actions - Eleventh Circuit Court of Appeals Decision Underscores the Need to Evaluate Insurance Programs for Cyber...more

Effective cybersecurity: 8 questions for you and your team

Cybersecurity has become a top-tier risk for US and multinational organizations. It is only a matter of time before a determined hacker will penetrate your organization’s system and successfully exfiltrate some data. (Indeed,...more

Eye on Privacy Newsletter - February 2015

In this issue: - Privacy and Data Security in Transactions: What's the Deal? - Consumer and Financial Institution Class Actions Survive Motions to Dismiss in Target Data Breach Litigation - California Amends...more

Advertising Law - February 2015 #3

FCC Chair Announces New Net Neutrality Regs - The battle over net neutrality took a new turn when Federal Communications Commission Chairman Tom Wheeler announced his intention to reclassify broadband service as a...more

Senators Trying to Hit the Brakes on Smart Cars, Citing Privacy and Security Concerns

On February 11, Sens. Ed Markey (D-Mass.) and Richard Blumenthal (D-Conn.) announced that they would introduce legislation intended to address the data privacy and security vulnerabilities with Internet-connected cars. The...more

From Carjacking to Carhacking – Lessons for the Internet of Things

The Internet of Things (IoT) is coming and perhaps the first place we will see the proverbial rubber hit the road is with something near and dear to Americans – our cars. The ever increasing connectivity of cars is creating a...more

Advertising Law - February 2015 #2

Podium P-O-V: Observations From Marc Roth on ERA’s Great Ideas Summit - I recently had the pleasure of participating on an “Advocacy Update” panel at the Electronic Retailing Association’s Great Ideas Summit in Miami...more

2014 Mobile Privacy and Security Trends and What to Look for in 2015

Most analysts and commentators agree that 2014 was the year mobile reached a tipping point. With over 1 billion mobile smartphones in circulation, 2014 marked the first year that mobile Internet usage surpassed desktop use in...more

New rules for biometric data

New rules on the usage of biometric data issued by the Italian data protection authority (the “Garante” or “DPA“) are meant to clarify the applicable obligations with the purpose to ease the adoption of technologies relying...more

Update from International Association of Privacy Professionals (IAPP) Global Privacy Summit

At this week's International Association of Privacy Professionals (IAPP) Global Privacy Summit, the FTC and the White House made several important announcements....more

16 Results
|
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×