Internet Cybersecurity

News & Analysis as of

NTIA Highlights Promise and Policy Challenges of IoT, Seeks Additional Comments

On January 12, 2017, prior to the new administration taking power, the National Telecommunications and Information Administration (NTIA) within the Department of Commerce (Department) released a Green Paper on “Fostering the...more

FCC Begins Roll Back of Net Neutrality

Roughly two weeks since President Donald Trump’s inauguration, the new Chairman of the Federal Communications Commission, Ajit Pai, has taken steps providing further evidence that he plans to roll back FCC actions taken under...more

Law Firm Data Breaches Demonstrate the Expanding Scope of Cyber Attacks

In a case of “cyber meets securities fraud,” the United States Attorney’s Office for the Southern District of New York (“SDNY”) recently indicted three foreign nationals on charges of insider trading, wire fraud, and computer...more

Internet Law in a Trump Presidency

In a Democracy, transitions in leadership happen more frequently than in any other form of government. And with those transitions, some previous policies and orders are preserved and some are reversed. This approach to...more

White House Issues Report on AI, Automation, and the Economy

On December 20, a team from the Executive Office of the President released a report titled Artificial Intelligence, Automation, and the Economy that assesses and provides recommendations based on the effect that evolving...more

Affair Website Ashley Madison Fined $8.75 Million Over Data Breach, Misrepresentations

The Federal Trade Commission (FTC) has entered into a multimillion dollar settlement with the owners and operators of AshleyMadison.com, a dating website for people interested in having discreet affairs, related to the...more

Top 10 Litigation Risks and Trends for Retailers

With the 2016 holiday shopping season in full swing, the risk of litigation heightens for retailers. We created our own version of a “holiday list” to identify the top-10 risk areas where retailers may be vulnerable to claims...more

Ashley Madison Settles with FTC and State AGs for $1.6 Million

We have previously reported on the Ashley Madison data breach and subsequent litigation. On December 14th, Ashley Madison announced that it has agreed to pay $1.6 million and implement additional security measures to settle...more

China Employment Law Alert: New Data Privacy Obligations for Employers

The National People's Congress Standing Committee has now finalised the new Cyber Security Law ("CSL"), to take effect on 1 June 2017. The fast development of the internet in China has caused a rapid escalation of security...more

House Committee Warns Congress to Set Security Standards

Recently, members of the House Energy and Commerce Committee told Congress that they must set cyber security standards for all devices connected to the internet or else face the possibility of a major cyberattack that could...more

How did the Internet of Things allow the latest attack — on the Internet?

Over the last week, details have become available to explain how an attack against a well-known domain name service (DNS) provider occurred. What about the potential legal risks? We will attempt to provide insights into...more

Latest Cyber Attack a Wake-up Call: What are your company’s IoT exposures?

The Internet of Things gives rise to many risks and exposures that companies and their insurers were not thinking about as recently as a couple years ago, and probably aren’t fully cognizant of today....more

When smart goes bad: Why internet security does not just refer to computers

A growing trend in the consumer electronics industry is the use of so-called “smart” devices — electronics that use wi-fi connections to allow them to be controlled remotely over the internet. From smart thermostats that can...more

The Impact of the Smart Home Revolution on Product Liability and Fire Cause Determinations

The concept of the Internet of Things (IoT) has existed for more than 15 years. Technology pioneer Kevin Ashton is widely credited with coining the term in 1999 to describe the connection of physical objects to the internet...more

Tales from the (Quantum) Crypt

The dream of hack-proof communication just got a little closer to reality. On August 16, 2016, China launched the world’s first “quantum satellite,” a project the Chinese government hopes will enable it to build a...more

What Can Go Wrong When You Offer Public Internet Access

By providing public internet access, a business owner may find that he or she is responsible for activity conducted by patrons who use that access. While this area of law is still very much unsettled, a business owner may be...more

An Addendum to the Scariest Hack So Far

Andy Johnson-Laird, President of Johnson-Laird, Inc., was kind enough to offer advice on three security techniques he recommends to detect and deny hackers, such as those we discussed in last week’s blog post....more

Fourth Circuit Upholds Coverage Under CGL Policy for Data Breach Claims

The United States Court of Appeals for the Fourth Circuit (“Fourth Circuit”) recently concluded that an insurer had a duty to defend a health care company that was sued by individuals whose personal health information was...more

Important Decision On Applicable Data Protection Law

After the controversial Google Spain decision (which besides the right to be forgotten also dealt with applicable law rules), the Court of Justice of the EU (CJEU) handed down another important – and yet again rather...more

FFIEC Weighs in on Cybersecurity in Light of Unprecedented Risk of Cyber Threats

As financial institutions of all sizes continue to face unprecedented cybersecurity risk, the Federal Financial Institutions Examination Council (FFIEC) released its Cybersecurity Assessment Tool. The Assessment is...more

CA AG Requires Chief Privacy Officer and Privacy Compliance Program

California’s Attorney General, Kamala Harris, has required Houzz, a home décor information and e-commerce website and mobile app publisher, to hire a chief privacy officer (CPO), conduct a company-wide privacy assessment, and...more

[Event] 2015 FOLEYTech Summit - October 1, Boston, MA

Please join us for the 2015 FOLEYTech Summit. In its 11th year, the FOLEYTech Summit continues to offer the top-notch industry insight and compelling speakers you have come to expect from Foley & Lardner LLP, while embracing...more

Internet of Things – Security

In a recent article we discussed the growth of wirelessly interconnected devices and the transformative impact it will have for business and more broadly on our lives. In that article we broadly highlighted some of the key...more

Ashley Madison Fallout: Class Actions, Pentagon investigation and easily searchable data

We previously reported that hackers The Impact Team had posted legitimate detailed information about 36 million adultery website Ashley Madison users. In the wake of the shocking posting of the data last week, two class...more

Legal Insights on the Ashley Madison Hack: Part I

Internet commenters and legal analysts alike are buzzing about the Ashley Madison hack. The website -- which billed itself as a networking site for anyone who wanted to discretely arrange an extramarital affair -- has already...more

100 Results
|
View per page
Page: of 4
Cybersecurity

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×