News & Analysis as of

Internet Cybersecurity

NIST Updates Its Security and Privacy Guidance

by Reed Smith on

Earlier this month, the National Institute of Standards and Technology (“NIST”) issued its fifth and latest draft of its “Security and Privacy Controls for Information Systems and Organizations” guidance document. The NIST...more

China’s Cyberspace Administration announces first state level investigations under Cybersecurity Law

by Dechert LLP on

China’s Cyberspace Administration announced that it has commenced investigations into Tencent Wechat, Sina Weibo and Baidu Tieba for violation of China’s Cybersecurity Law late last week (11 August 2017). More particularly,...more

Intellectual Property Bulletin - Summer 2017

by Fenwick & West LLP on

Reducing Cybersecurity Risks to Autonomous Vehicles - The Department of Transportation is revising autonomous vehicle guidelines it issued in September 2016. Recent comments by Secretary Elaine Chao suggest that the new...more

Encrypting Emails: ABA Issues New Guidance Addressing Security Concerns over Attorney-Client Communications

In May, the American Bar Association (“ABA”) released a Formal Opinion 477, providing guidance on attorney use of emails in communication with clients. In doing so, the ABA has promulgated a new standard when considering the...more

ENISA and Semiconductor Companies Seek Cybersecurity Standards from European Commission

by Morgan Lewis on

The European Union Agency for Network and Information Security (ENISA), along with three semiconductor companies, recently released a position paper proposing a position for the European Commission (EC) on security and...more

China's New Cybersecurity Law and Draft Data Localization Measures Expected to Burden Multinational Companies

by Jones Day on

China's new Cybersecurity Law ("new Law") is set to come into effect on June 1, 2017, and introduces sweeping provisions that may have a significant impact on companies doing business in and with China. To provide guidance on...more

NTIA Highlights Promise and Policy Challenges of IoT, Seeks Additional Comments

by Hogan Lovells on

On January 12, 2017, prior to the new administration taking power, the National Telecommunications and Information Administration (NTIA) within the Department of Commerce (Department) released a Green Paper on “Fostering the...more

FCC Begins Roll Back of Net Neutrality

by Perkins Coie on

Roughly two weeks since President Donald Trump’s inauguration, the new Chairman of the Federal Communications Commission, Ajit Pai, has taken steps providing further evidence that he plans to roll back FCC actions taken under...more

Law Firm Data Breaches Demonstrate the Expanding Scope of Cyber Attacks

In a case of “cyber meets securities fraud,” the United States Attorney’s Office for the Southern District of New York (“SDNY”) recently indicted three foreign nationals on charges of insider trading, wire fraud, and computer...more

Internet Law in a Trump Presidency

by Bass, Berry & Sims PLC on

In a Democracy, transitions in leadership happen more frequently than in any other form of government. And with those transitions, some previous policies and orders are preserved and some are reversed. This approach to...more

White House Issues Report on AI, Automation, and the Economy

by Morgan Lewis on

On December 20, a team from the Executive Office of the President released a report titled Artificial Intelligence, Automation, and the Economy that assesses and provides recommendations based on the effect that evolving...more

Affair Website Ashley Madison Fined $8.75 Million Over Data Breach, Misrepresentations

by Ballard Spahr LLP on

The Federal Trade Commission (FTC) has entered into a multimillion dollar settlement with the owners and operators of AshleyMadison.com, a dating website for people interested in having discreet affairs, related to the...more

Top 10 Litigation Risks and Trends for Retailers

by Perkins Coie on

With the 2016 holiday shopping season in full swing, the risk of litigation heightens for retailers. We created our own version of a “holiday list” to identify the top-10 risk areas where retailers may be vulnerable to claims...more

Ashley Madison Settles with FTC and State AGs for $1.6 Million

We have previously reported on the Ashley Madison data breach and subsequent litigation. On December 14th, Ashley Madison announced that it has agreed to pay $1.6 million and implement additional security measures to settle...more

China Employment Law Alert: New Data Privacy Obligations for Employers

by Seyfarth Shaw LLP on

The National People's Congress Standing Committee has now finalised the new Cyber Security Law ("CSL"), to take effect on 1 June 2017. The fast development of the internet in China has caused a rapid escalation of security...more

House Committee Warns Congress to Set Security Standards

by Nossaman LLP on

Recently, members of the House Energy and Commerce Committee told Congress that they must set cyber security standards for all devices connected to the internet or else face the possibility of a major cyberattack that could...more

How did the Internet of Things allow the latest attack — on the Internet?

Over the last week, details have become available to explain how an attack against a well-known domain name service (DNS) provider occurred. What about the potential legal risks? We will attempt to provide insights into...more

Latest Cyber Attack a Wake-up Call: What are your company’s IoT exposures?

by Farella Braun + Martel LLP on

The Internet of Things gives rise to many risks and exposures that companies and their insurers were not thinking about as recently as a couple years ago, and probably aren’t fully cognizant of today....more

When smart goes bad: Why internet security does not just refer to computers

by Thompson Coburn LLP on

A growing trend in the consumer electronics industry is the use of so-called “smart” devices — electronics that use wi-fi connections to allow them to be controlled remotely over the internet. From smart thermostats that can...more

The Impact of the Smart Home Revolution on Product Liability and Fire Cause Determinations

by Wilson Elser on

The concept of the Internet of Things (IoT) has existed for more than 15 years. Technology pioneer Kevin Ashton is widely credited with coining the term in 1999 to describe the connection of physical objects to the internet...more

Tales from the (Quantum) Crypt

The dream of hack-proof communication just got a little closer to reality. On August 16, 2016, China launched the world’s first “quantum satellite,” a project the Chinese government hopes will enable it to build a...more

What Can Go Wrong When You Offer Public Internet Access

by Barley Snyder on

By providing public internet access, a business owner may find that he or she is responsible for activity conducted by patrons who use that access. While this area of law is still very much unsettled, a business owner may be...more

An Addendum to the Scariest Hack So Far

Andy Johnson-Laird, President of Johnson-Laird, Inc., was kind enough to offer advice on three security techniques he recommends to detect and deny hackers, such as those we discussed in last week’s blog post....more

Fourth Circuit Upholds Coverage Under CGL Policy for Data Breach Claims

The United States Court of Appeals for the Fourth Circuit (“Fourth Circuit”) recently concluded that an insurer had a duty to defend a health care company that was sued by individuals whose personal health information was...more

Important Decision On Applicable Data Protection Law

by Allen & Overy LLP on

After the controversial Google Spain decision (which besides the right to be forgotten also dealt with applicable law rules), the Court of Justice of the EU (CJEU) handed down another important – and yet again rather...more

104 Results
|
View per page
Page: of 5
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.