News & Analysis as of

Mobile Devices Data Security

Privacy TIp #79 – Consumer Reports Will Help Us With Privacy + Security of Products

What a great idea! Trusty Consumer Reports has announced that it is collaborating with three cybersecurity firms to “create a new standard that safeguards consumers’ security and privacy—and we hope industry will use...more

The Truth in Mac Security

For decades, it has been assumed that MacBook and iPhone devices are hack proof and virus free. Their advertisements and claims for being indestructible were never questioned. Yet, nothing is truly immune to intrusion....more

Five Workplace New Year’s Resolutions for 2017

by Snell & Wilmer on

With the New Year comes the annual tradition of making New Year’s Resolutions—along with the annual tradition of breaking those resolutions by the second week of January. Even if last year’s Christmas tree survived longer...more

Cell Phone Manufacturer and Firmware Provider Hit with Consumer Class Action Over Extracting and Transmitting User Information...

by Reed Smith on

A recent class action lawsuit is alleging that cell phone manufacturer Blu Products, Inc. (“Blu”) and firmware providers Shanghai Adups Technology Co., Ltd. and Adups USA LLC (“Adups”) violated several federal privacy laws by...more

FTC Releases Tips & Advice on Ransomware

On November 10, 2016, the Federal Trade Commission (FTC) released tips and advice for businesses and consumers on ransomware. For businesses, the FTC released Ransomware – A closer look and a companion video, Defend against...more

The serious security vulnerabilities of mobile devices

by Thompson Coburn LLP on

If you have wondered about security threats to your mobile device, a recent report of the National Institute of Standards and Technology may answer some of your questions — and increase your fears. The report,...more

Business Associate Settles HIPAA Investigation for $650,000

by Lathrop & Gage LLP on

The U.S. Office for Civil Rights (OCR), the agency responsible for enforcing the HIPAA Privacy and Security rules, has just sent a strong message that business associates are not immune from scrutiny. On June 24, 2016, in a...more

What to Consider When Drafting or Reviewing a Privacy Policy

by Bryan Cave on

Although financial institutions, health care providers, and websites directed to children are required to create consumer privacy policies under federal law, other types of websites are not. In 2003, California became the...more

Privacy Tip #37 – Beware of fake USB drives and phone chargers

USB drives and phone chargers are expensive. Hackers know that. One way hackers are gaining access to get into computers to steal data is by planting USB drives and phone chargers in public areas, hoping someone will pick it...more

Going Mobile With Recruiting

by Zelle LLP on

As employers search for the right workers and workers search for the right jobs, it’s worth considering the techniques of the industry that has the most mobile workforce and has the toughest time finding workers – trucking. ...more

Technology Industry Newsletter - January 2016

by Buchalter on

As we begin the new year, it is a good time to reflect on the emerging trends in technology that present opportunities to be explored by entrepreneurs who are considering starting new businesses and growing existing...more

Highlights from the FTC’s Second “Start With Security” Initiative

by Kelley Drye & Warren LLP on

On November 5, the FTC hosted its second “Start With Security” event in Austin, Texas in an effort to provide companies with practical tips and strategies for implementing effective data security....more

HIPAA and Text Messaging

by LeClairRyan on

Text messaging is pervasive. Doctors and other health care providers, covered entities, and business associates currently use (and embrace) the technology. Texting is easy, fast and efficient. It doesn’t require a laptop...more

Video Privacy Protection Act Narrowed – App’s Transmission of Roku ID Not Disclosure of Personal Information

A New York district court opinion is the latest addition to our watch of ongoing VPPA-related disputes, a notable decision on the issue of what exactly is a disclosure of “personally identifiable information” (PII) under the...more

Google Mandates Full Disk Encryption

With the release of Android 6.0, code name Marshmallow, Google has mandated that OEMs (Original Equipment Manufacturers) enable full disk encryption. Google is requiring that the feature be enabled as part of the ‘out of box...more

New California Law Expands Privacy Rights Applicable To Electronic Data

by King & Spalding on

On October 8, 2015, California Governor Jerry Brown signed into law the California Electronic Communications Privacy Act (“CalECPA” or the “Act”), sponsored by Senator Mark Leno (D-San Francisco). The Act requires law...more

Alphabet Soup and Data Security

In the span of two days, mobile device users learned of two data breaches that could compromise their personal data. In one, Experian (a credit reporting agency) reported that it was hacked, potentially putting 15 million...more

Protecting Company Relationships and Information Upon an Employee Departure

by Smith Anderson on

Learn how your company can prepare to act quickly and strategically to protect important relationships, information and trade secrets at the time that a key employee leaves. This webinar will review the latest developments in...more

California Enacts CalECPA, Requiring a Search Warrant to Obtain or Access Users’ Electronic Information

by Goodwin on

On Thursday, October 8, 2015, California Governor Jerry Brown signed into law the Electronic Communications Privacy Act (the “California ECPA”). This legislation, which takes effect on January 1, 2015, has been heralded by...more

California Joins Other States with the Passage of CalECPA

by McDermott Will & Emery on

Law enforcement requests for electronic information, particularly from technology companies such as Google and Twitter, have skyrocketed in recent years. In response, several states—Maine and Texas in 2013, Utah in 2014 and...more

Is Your HIPAA Compliance Program Ready for the FTC?

Everyone in healthcare knows that the next round of HIPAA audits is coming. Covered entities and business associates have long been advised to review and update their HIPAA security risk analyses, have business associate...more

Comment period extended for NIST Cybersecurity Practice Guide

The National Institute of Standards and Technology has announced that due to stakeholder feed-back, the period to submit comments for the draft guide, “Securing Electronic Health Records on Mobile Devices” has been extended...more

Recent Enforcement Shows the Importance of Encrypting Mobile Devices Containing Protected Health Information

by Foley & Lardner LLP on

With headlines every day announcing another release of Protected Health Information (PHI), providers are asking themselves – is there a way to protect against these breaches? Beyond improving the security of large...more

Internet of Things – What does it mean for business?

by K&L Gates LLP on

What is the Internet of Things? The 'Internet of Things' (IoT) is a catchphrase describing the increasing interconnectedness between smart devices and sensors facilitated through their connection to the internet. It's not a...more

[Webinar] Mobile Device Management for Health Care Organizations and Vendors - Sept. 10th, 10:00am PDT

In this webinar, we will demystify the HIPAA Security Rule and how to apply the administrative, physical, and technical safeguards in a mobile environment. We will discuss key takeaways from the recently released NIST Draft...more

36 Results
|
View per page
Page: of 2
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!