News & Analysis as of

Personally Identifiable Information Cloud Computing

Robinson+Cole Data Privacy + Security Insider

Ubiquiti Notifies Customers of Breach

Ubiquiti, a manufacturer of products used for networks such as routers, webcams and mesh networks, announced this week that an unauthorized access to its systems hosted by a third-party cloud provider may have compromised...more

Hogan Lovells

COVID-19 Exit Strategy: A Global Privacy and Cybersecurity Guide - May 2020

Hogan Lovells on

As the world focuses its efforts on the right strategy to beat the coronavirus and make normal life safe again, businesses are devising and implementing a variety of measures to deal with the COVID-19 crisis which rely on the...more

The Volkov Law Group

Lessons Learned from the Capital One Data Breach (Part I of III)

The Volkov Law Group on

Not to say, I told you so, but around the same time that the Capital One data breach occurred, I was reminding clients that nearly half of  all significant data breaches or cyber-incidents occur because of internal actors. ...more

Bennett Jones LLP

Grand Theft Data: Uber Announces Almost 60 Million Accounts Compromised in Data Breach

Bennett Jones LLP on

The CEO of the popular ride-sharing app, Uber, published a bombshell letter to the public yesterday, stating that two hackers had stolen information from almost 60 million driver and rider accounts in October 2016....more

Faegre Drinker Biddle & Reath LLP

Cloud Computing Crash Course: Safety First

When it comes to privacy and security laws governing sensitive data, you don’t have to be a financial or health institution to have information that is subject to state and federal regulation. Almost every organization with...more

Faegre Drinker Biddle & Reath LLP

Cloud Computing Crash Course: Location, Location, Location

Cloud computing is the practice of enlisting a “cloud provider” to deliver data, applications and storage to users through the internet, which allows each user to share the computing resource and forego some on-premise...more

K2 Integrity

Protecting Your Privacy Online Is Possible

K2 Integrity on

Navigating the crossroads of security and convenience is a balancing act, but it can be done. Two minutes. That’s all it takes to perform a Google search on yourself—or anyone you choose—and obtain a virtual encyclopedia...more

Robinson+Cole Data Privacy + Security Insider

Hacker Hits HipChat—Reset Passwords

An unknown intruder was able to access team communication platform HipChat last weekend, allowing access to the account information of users, including email addresses, hashed passwords and names. There is also a chance that...more

Robinson+Cole Data Privacy + Security Insider

Cloudflare Software Bug Causes Data Leak

Cloudflare, Inc., a provider of performance and security solutions for websites, recently disclosed that a software bug caused it to leak customer data that was then cached by search engines. Uber, Fitbit, and OkCupid sites...more

Stinson LLP

HHS Publishes New Guidance on HIPAA and Cloud Computing

Stinson LLP on

The U.S. Department of Health and Human Services Office for Civil Rights (OCR) has issued a new guidance regarding HIPAA compliance and the use of cloud computing solutions. The guidance is intended to assist covered entities...more

Robinson+Cole Data Privacy + Security Insider

Is CaaS the solution for privacy and security in the SaaS world?

Companies are under tremendous pressure to reduce IT costs. Cloud and Software as a Service (SaaS) offer significant potential cost reductions through the use of shared infrastructure and standardized software offerings....more

Bryan Cave Leighton Paisner

The Top Three Privacy Takeaways of the New Delaware Online Privacy and Protection Act

Delaware’s New Privacy Policy Requirements - Effective January 1, 2016, Delaware became the second state in the U.S., joining California, to require operators of commercial websites that collect personally...more

Robinson+Cole Data Privacy + Security Insider

ASUS settles with FTC over insecure home routers

ASUS TeK Computer, Inc. (ASUS) has agreed to settle with the FTC over allegations that “critical security flaws in its routers put the home networks of hundreds of thousands of consumers at risk.” The FTC further alleges that...more

Womble Bond Dickinson

New Delaware Act Requires Online Privacy Policy for Websites

Womble Bond Dickinson on

A new privacy law requires companies to make specific statements about what information is collected on its website. Like California, it also requires that companies state in writing whether they respect “Do Not Track”...more

Robinson+Cole Data Privacy + Security Insider

Systema Software exposes information of 1.5 million on Amazon Web Service

Systema Software, which provides software solutions for claims management, is investigating a breach (although it was discovered, accessed and confirmed by an independent third party) involving information of 1.5 million...more

Burr & Forman

TN Ethics Opinion Approves Lawyers’ Cloud Storage of Client Data

Burr & Forman on

Tennessee has joined other states in formally approving lawyers’ cloud-storage of client-confidential data. The Board of Professional Responsibility (“BOPR”) held that lawyers ethically may use cloud storage for...more

Orrick, Herrington & Sutcliffe LLP

Don't Wait for It; Recent HIPAA Enforcement Action Signal More to Come in Phase 2 Audits

Officials at the U.S. Department of Health and Human Services Office of Civil Rights (HHS OCR) have recently selected a vendor to conduct the second wave of HIPAA audits. These so-called "Phase 2 Audits" are set to commence...more

Orrick, Herrington & Sutcliffe LLP

German Federal IT Committee Issues New Restrictions for Cloud Service Providers

Last month the German Federal Government IT Advisory Committee ("Federal IT Committee") issued new cloud computing service criteria for all prospective vendors to German Federal Agencies. Cloud services providers who offer,...more

Polsinelli

Cybersecurity for Startups Now a Cost of Entry for Consideration by Larger Clients: What is Your Company's Plan?

Polsinelli on

For technology startups, maintaining strong security controls remains vital to winning new business opportunities and strengthening existing relationships. Despite the global spike in cybersecurity attacks (there were 42.8...more

Foley & Lardner LLP

This Is Not Your Father's Oldsmobile: Car Hacking and the SPY Car Act

Foley & Lardner LLP on

Not coincidentally, on July 21, 2015, Wired Magazine published an article with groundbreaking evidence of hacking a car wirelessly, and Senators Edward Markey (D-Mass.) and Richard Blumenthal (D-Conn.) introduced legislation...more

McGuireWoods LLP

Hospital’s Cloud-Based Document-Sharing Practices Lead to $218,400 HIPAA Settlement

McGuireWoods LLP on

On July 10, 2015, the U.S. Department of Health and Human Services Office for Civil Rights (OCR) announced a substantial settlement with St. Elizabeth’s Medical Center (SEMC). Under the terms of the settlement, the hospital...more

Arnall Golden Gregory LLP

Legal Issues Business Leaders Need to Know in 2015: Top 10 Checklist

A compilation of time-sensitive and trending legal and regulatory issues that general counsels and business leaders should be aware of in 2015. Employers Should be Aware of Multigenerational Workforce Risk - For...more

Polsinelli

Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues

Polsinelli on

Hosting and securing data is a concern for both businesses and consumers. As companies and health systems are quickly adopting the idea of hosting data “in the cloud,” regulatory agencies are crafting laws to protect private...more

Adams and Reese LLP

Microsoft Adopts International Cloud Privacy Standard

Adams and Reese LLP on

Public cloud computing services-- computing resources (such as networks, storage, applications, and services) purchased from another company (a “cloud services provider”)-- offer many potential benefits for businesses, among...more

Morrison & Foerster LLP

Cloud Data Security Standards Reach New Heights?

Issues of data privacy and security are central to most cloud contract negotiations. While cloud service providers may be willing to take responsibility for the integrity of their networks, accepting obligations in relation...more

33 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide