Internet Cybersecurity

News & Analysis as of

Important Decision On Applicable Data Protection Law

After the controversial Google Spain decision (which besides the right to be forgotten also dealt with applicable law rules), the Court of Justice of the EU (CJEU) handed down another important – and yet again rather...more

FFIEC Weighs in on Cybersecurity in Light of Unprecedented Risk of Cyber Threats

As financial institutions of all sizes continue to face unprecedented cybersecurity risk, the Federal Financial Institutions Examination Council (FFIEC) released its Cybersecurity Assessment Tool. The Assessment is...more

CA AG Requires Chief Privacy Officer and Privacy Compliance Program

California’s Attorney General, Kamala Harris, has required Houzz, a home décor information and e-commerce website and mobile app publisher, to hire a chief privacy officer (CPO), conduct a company-wide privacy assessment, and...more

[Event] 2015 FOLEYTech Summit - October 1, Boston, MA

Please join us for the 2015 FOLEYTech Summit. In its 11th year, the FOLEYTech Summit continues to offer the top-notch industry insight and compelling speakers you have come to expect from Foley & Lardner LLP, while embracing...more

Internet of Things – Security

In a recent article we discussed the growth of wirelessly interconnected devices and the transformative impact it will have for business and more broadly on our lives. In that article we broadly highlighted some of the key...more

Ashley Madison Fallout: Class Actions, Pentagon investigation and easily searchable data

We previously reported that hackers The Impact Team had posted legitimate detailed information about 36 million adultery website Ashley Madison users. In the wake of the shocking posting of the data last week, two class...more

Legal Insights on the Ashley Madison Hack: Part I

Internet commenters and legal analysts alike are buzzing about the Ashley Madison hack. The website -- which billed itself as a networking site for anyone who wanted to discretely arrange an extramarital affair -- has already...more

NIST Guide Highlights Cybersecurity Considerations for Utilities and Manufacturing Companies

In 2013 alone, the U.S. Department of Homeland Security (DHS) and its Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to more than 256 cyber-incident reports—more than half of them in the energy...more

China’s Draft Cybersecurity Law – A New Regime for Network Security

China’s current leadership has attached significant attention to network security, which is deemed to be a core aspect of national security. In early 2014, China’s President, Xi Jinping, who is also the head of the Office for...more

Dodge, Ram, and Jeep vehicles recalled due to hacking vulnerabilities

As technology moves forward, more and more of our everyday gadgets will be connected to the Internet. With that convenience may come some vulnerabilities. On July 24, 2015, Chrysler and its parent company FCA US LLC (FCA US)...more

U.S. Senators Introduce Automobile-Focused Cybersecurity Legislation

On July 21, Senators Blumenthal (D-CT) and Markey (D-MA) introduced legislation, the Security and Privacy in Your Car Act (“SPY Car”Act), that would protect drivers’ privacy while allowing them to remain connected to the...more

Commerce Dept. Reviewing Stakeholders' Cybersecurity Comments

The U.S. Department of Commerce’s Internet Policy Task Force (IPTF) is currently reviewing feedback collected in response to a Request for Public Comment on cyber threats facing the digital ecosystem and economy, with the...more

Is Creepy Compensable?

A watchful eye can be a good thing. We all want to keep an eye on what’s important. In an increasingly fast-paced world, however, it gets harder. The Internet and advances in mobile technology put so much information at our...more

FBI warns of continued use of Cryptowall ransomware schemes

The FBI’s Internet Crime Complaint Center recently issued an alert “Criminals Continue to Defraud and Extort Funds from Victims Using Cryptowall Ransomware Schemes” that indicates that the Center continues to receive...more

Internet Of Things, News Websites Fare Poorly In Security And Privacy Review

On June 16, the Online Trust Alliance, an industry group focused on developing and encouraging best practices in online security and privacy, announced that a recent audit of approximately 1,000 websites showed that 46%...more

Five on Five: How the Evolution of Fintech Is Changing the Face of Community and Regional Banks and What You Can Do About It

Watch your back - Market share for community and regional banks is slowly being taken away by “nontraditional” providers of financial services, whether they be peer-to-peer lending platforms or other distributors of...more

Controls Coming for Intrusion & Network Surveillance Tools

The Commerce Department’s export control agency, BIS, has proposed a new rule to control exports of equipment and software designed or modified to perform network intrusion and internet protocol communications surveillance. ...more

Nevada Expands Definition of PI for Purposes of the State’s Breach and Safeguards Laws

Nevada’s recently amended law will, among other things, create the first state mandate to encrypt online account credentials. Specifically, on May 13, 2015, Nevada Governor Sandoval approved a bill (“AB 179”) to expand the...more

Privacy Tuesday – April 2015 #3

Some privacy & security bits and bytes to start your week: FCC to Hold Public Workshop on Broadband Consumer Privacy Tomorrow - Over the last several months, the Federal Communications Commission has taken on a...more

What General Counsel Need To Know About The Latest Cybersecurity Developments

In the wake of reported security breaches at a number of significant financial institutions, cybersecurity is garnering more attention and concern than ever before — both within the financial services industry and among...more

Federal Trade Commission Guidance on the Internet of Things

On January 27, 2015, the FTC released its Staff Report on the so-called “Internet of Things” (IoT) – the ability of everyday objects (from refrigerators to wearable devices) to connect to the Internet and send and receive...more

Solving the Legal Challenges of Trustworthy Online Identity

In this age of phishing, hacking, identity fraud, and other forms of cybercrime, answering two simple questions – “Who are you?” and “How can you prove it?” – is fast becoming a critical requirement for online business...more

Eye on Privacy Newsletter - February 2015

In this issue: - Privacy and Data Security in Transactions: What's the Deal? - Consumer and Financial Institution Class Actions Survive Motions to Dismiss in Target Data Breach Litigation - California Amends...more

Brazil Bill Implements New Provisions for International Data Transfers

The Bill’s provisions on international data transfers are most relevant to foreign companies that do business in Brazil. The Brazilian government has issued a Bill for the Protection of Personal Data (Bill) for public...more

Advertising Law - February 2015 #3

FCC Chair Announces New Net Neutrality Regs - The battle over net neutrality took a new turn when Federal Communications Commission Chairman Tom Wheeler announced his intention to reclassify broadband service as a...more

90 Results
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.