Personally Identifiable Information

News & Analysis as of

Illinois voter registration database hacked

The Illinois State Board of Elections has notified voters that its online voter registration site has been hacked. According to the letter sent to Illinois voters by the Board of Elections, “We have found no evidence...more

Is Ransomware a Notifiable Data Breach Event?

There is no doubt that companies face unprecedented volume and variation in both disruptive and intrusive cyberattacks on their networks. Among the different attack methodologies today, ransomware is quickly becoming a major...more

U.S. Court in Louisiana Remands Advance Stores Co. Data Breach Class Action to State Court

In a case with a familiar fact pattern, the United States District Court for the Eastern District of Louisiana refused to find that permitting Plaintiff to proceed in Louisiana state court was “futile” on Article III standing...more

Judge seals transcript of Title IX hearing

A federal judge in North Carolina sealed a transcript of a University of North Carolina (UNC) hearing to determine whether the plaintiff was responsible for committing sexual acts without consent. In the case in question, the...more

See You In Court! - July/August 2016

Out of the blue, Nancy Newshound, longtime reporter for the Nutmeg Bugle called Mr. Superintendent. “I understand that a student hacked the district’s system and changed a bunch of grades,” she stated. “What can you tell me...more

The VPPA and PII: Is Geolocation Another Anonymous Identifier?

Video Privacy Protection Act - This article explores how personally identifiable information has been defined in leading Video Privacy Protection Act actions and looks at how concerns over the potential sensitivity of...more

Scottrade data breach class action case dismissed for lack of standing

We previously reported that Scottrade was hit with a class action case within 24 hours of notifying customers of a data breach. According to the Complaint, the data compromised included the names, addresses, telephone...more

Potential Risks and Rewards of Cybersecurity Information Sharing Under CISA

When President Obama signed into law the Cybersecurity Act of 2015, which was designed to facilitate information sharing on cybersecurity threats between the public and private sectors, proponents hailed it as “our best...more

Privacy Tip #44 – The flashlight app’s collection of your data

When you start needing longer arms to read restaurant menus in the candlelight, you might consider downloading a flashlight app to use with your reading glasses. But before you download it, first be aware that your...more

Cybersecurity and Data Privacy: Confidential Data Breach - Escaping Potential Liability (7/16)

The first question asked by many companies after a data breach is – What is our potential liability? On July 12, 2016 a Missouri Federal Court issued a ruling that companies should be aware of when defending customers’ claims...more

Client Alert - The Government Makes a Business Associate Pay: What HIPAA Covered Entities and Business Associates Can Learn from...

The government has entered into its first settlement with a HIPAA business associate, including a $650,000.00 monetary penalty, ushering in a new period of enforcement for third parties who use Protected Health Information...more

White House Releases National Privacy Research Strategy

On July 1, James Kurose, the Assistant Director for Computer and Information Science and Engineering Directorate at the National Science Foundation, and Keith Marzullo, the Director of the National Coordination Office for...more

Colorado jumps into student data privacy protection with new privacy law

The recognized trend in data privacy is that those collecting or storing personally identifying information (“PII”) are required to safeguard and protect that information. The requirement to safeguard and protect data extends...more

Cybersecurity News & Notes – July 2016 #3

In Case You Missed It: Court certifies class in suit against Apple. On July 15, 2016, U.S. District Judge Jon S. Tigar certified a class of users of the mobile app Path, who allege that Apple facilitated the app’s access...more

Wendy’s reports over 1,000 restaurants affected by breach announced earlier this year

Back in May of this year, Wendy’s reported “fewer than 300” locations had been hacked by malicious malware that targeted customer credit card information. Last week, Wendy’s released a list of 1,025 restaurant locations that...more

Facebook and HIPAA: Strange Bedfellows

As a social media user, you may have experienced Facebook’s targeted advertising. Mere moments after searching for a specific item on Google or visiting another website, your Facebook ads reflect your recent browsing history....more

New York Appellate Court Finds “Electronic Data” Exclusion Applies to Data Breach

The computer network of a Five Guys Burger franchise, RVST Holdings, LLC (RVST), was hacked. Customers’ credit card information was stolen and used to make numerous fraudulent charges. Trustco Bank brought an action against...more

Shareholder Derivative Suit Following Data Breach Misses Target

On July 7, 2016, Judge Paul A. Magnuson of the United States District Court for the District of Minnesota granted Defendants’ Motions to Dismiss a shareholder class action that had been initiated following a 2013 holiday...more

First Circuit Issues Potentially Significant Ruling on Federal Video Privacy Statute’s Application to Mobile Apps

The First Circuit Court of Appeals’ recent decision in Yershov v. Gannett Satellite Information Network, Inc., — F.3d —-, Case No. 15-1719, 2016 WL 1719825 (1st Cir. Apr. 29, 2016), may carry important implications for mobile...more

I-9:  Ways to Avoid Identity Theft

Employers are increasingly being contacted by individuals, their insurance and payroll providers, the IRS and/or police about employees who are possibly involved in identity theft. If an employee steals a name and matching...more

Omni Hotels latest hotel chain hit with malware

Omni Hotels notified guests on Friday, July 8, 2016, that its point of sale systems were compromised with malware from December 23, 2015, through June 15, 2016....more

BYOD Risks under HIPAA – Does Your HIPAA Compliance Program Adequately Address the Ever Increasing Use of Portable Electronic...

Many U.S. employers are now allowing employees to use their own personal handheld devices and laptop computers for work-related purposes. As the age of employer-provided devices is coming to an end and “bring your own device”...more

Connected Toys, Augmented Reality as the Next Big (Io)Thing

There has been an uptick in congressional inquiries regarding privacy concerns in the IoT space. And most recently in the gaming world of augmented reality. On Tuesday, Senator Al Franken (D-Minn.) initiated a congressional...more

Federal Regulators Focus on Minimum Cyber Standards For Banks

A new set of federal banking regulations are on the horizon aimed at helping financial institutions put in place minimum compliance standards to prevent future cyber-attacks. Bloomberg Law has reported that the Federal...more

Data Breach Incident Response: 5 Questions to Ask and New Laws to Know Now

The spring legislative sessions this year brought a now-familiar round of revisions to data breach notification laws, with states broadening their laws in often divergent ways. This year, Illinois, Nebraska, and Tennessee...more

1,328 Results
|
View per page
Page: of 54
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×