News & Analysis as of

Unauthorized Access Data Protection

Troutman Pepper

Understanding Access vs. Acquisition - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

Each of the 50 states has its own definition of what constitutes a reportable data breach. For some, it requires “unauthorized access” to personal information. For others, it requires “unauthorized acquisition.” And then,...more

Troutman Pepper

Caregivers in Cybersecurity — Unauthorized Access Podcast

Troutman Pepper on

Unauthorized Access, our privacy and cybersecurity-focused podcast, spotlights the human side of the cybersecurity industry. In this episode, Sadia welcomes Sherri Davidoff, CEO of LMG Security, to discuss the challenges and...more

Troutman Pepper

Snooping Sadia Talks to Former Official Gene Fishel — Unauthorized Access Podcast

Troutman Pepper on

Unauthorized Access, Troutman Pepper's privacy and cybersecurity-focused podcast, spotlights the human aspect of the cybersecurity industry, introducing you to the remarkable personalities that make the industry amazing....more

Troutman Pepper

Ross Is Boss — Unauthorized Access Podcast

Troutman Pepper on

Unauthorized Access, Troutman Pepper's privacy and cybersecurity-focused podcast, spotlights the human aspect of the cybersecurity industry, introducing you to the remarkable personalities that make the industry amazing. In...more

Troutman Pepper

Unauthorized Access Returns With "Get to Know Joe" — Unauthorized Access Podcast

Troutman Pepper on

It’s official! The Unauthorized Access podcast has returned, now with a slightly different spin. Our monthly podcast will spotlight the human aspect of cybersecurity, bringing you closer to the remarkable personalities...more

Constangy, Brooks, Smith & Prophete, LLP

FTC Non-Banking Financial Institutions Safeguards Rule

The Federal Trade Commission has approved an amendment to the Safeguards Rule under the Gramm-Leach-Bliley Act that creates a new data privacy regulatory reporting requirement for non-banking financial entities. Covered...more

Ankura

The AI Invasion: A Privacy Kaleidoscope

Ankura on

This article is the first in our three-part series focused on data privacy considerations related to the use of Artificial Intelligence (AI) and machine learning. This first article highlights privacy topics related to the...more

Bass, Berry & Sims PLC

DHS Publishes Long-Awaited Final Rule on Controlled Unclassified Information

Bass, Berry & Sims PLC on

On June 21, the Department of Homeland Security (DHS) published a final rule to implement security measures that safeguard controlled unclassified information (CUI) from unauthorized access and disclosure and improve incident...more

Jones Day

Department of Justice Significantly Revises Policy on Charging CFAA Violations

Jones Day on

The U.S. Department of Justice will decline to prosecute cyber intrusions based solely on exceeding contractual authorization or which occur pursuant to "good-faith security research." On May 19, 2022, the Department of...more

Hogan Lovells

German Court grants non-material GDPR damages following data breach

Hogan Lovells on

In a recent judgment, the District Court Munich I granted a data subject compensation under Article 82 GDPR for non-material damages suffered as a result of an unauthorized third-party access to the subject's personal data....more

Rivkin Radler LLP

NJ Infertility Clinic Reaches $495,000 Data Breach Settlement

Rivkin Radler LLP on

The New Jersey Attorney General’s Office announced on October 12 that Diamond Institute for Infertility and Menopause, LLC, based in Millburn, NJ, will pay a $495,000 penalty for allegedly violating HIPAA and state law by...more

Foley & Lardner LLP

Lower the Gate – Employers Must Take Steps to Restrict Access to Confidential Information

Foley & Lardner LLP on

With the proliferation of technology and cloud-based computing, employers often struggle to provide employees with the tools to allow access to the information they need to effectively and efficiently do their jobs while...more

Davis Wright Tremaine LLP

The Computer Fraud and Abuse Act—Tips for Family Businesses

The U.S. Supreme Court recently handed down a decision that answered a question regarding the scope of permitted data access under the Computer Fraud and Abuse Act (CFAA) that had led to a notable Circuit split. In light of...more

Fisher Phillips

Will Supreme Court Enforce Law And Order In The Digital Workplace?

Fisher Phillips on

Now entering its ninth month in the United States with no sign of slowing down, the COVID-19 pandemic has forced many employers to make permanent changes to business operations in order to survive. Among the most noticeable...more

Society of Corporate Compliance and Ethics...

GDPR enforcement actions: UK and Germany

Report on Supply Chain Compliance 3, no. 2 (January 23, 2020) - Two recent enforcement actions shed light on how regulators will enforce GDPR provisions going forward. In one case, the United Kingdom’s Information...more

Foley & Lardner LLP

Press Delete, Go Directly to Jail? The Scope of the Computer Fraud and Abuse Act’s Damage Provision

Foley & Lardner LLP on

Can deleting information, even personal information, from your work computer land you in prison? That was the central question posed in USA v. Zeng, Case No. 4:16-cr-00172 in the Northern District of California. Mr. Zeng...more

Bass, Berry & Sims PLC

Privacy Perils: PayPal Data Breach

Bass, Berry & Sims PLC on

On December 1, PayPal disclosed that an ongoing investigation into identify security vulnerabilities identified a data breach that may have compromised personally identifiable information for roughly 1.6 million customers at...more

Butler Snow LLP

Tennessee Amends Its Data Breach Notification Laws

Butler Snow LLP on

Removes the Encryption Safe Harbor, Limits the Timing of Notice, and Expands “Unauthorized Persons” - Effective July 1, 2016, Tennessee becomes the first state to remove the encryption safe harbor from its data breach...more

Bond Schoeneck & King PLLC

Preventing Unauthorized Access to and Disclosure of Confidential Employee Information

Inherent in all employment relationships is the fact that employers are privy to all sorts of confidential information about their employees. For example, in order to do something as simple as paying an employee’s wages, an...more

K2 Integrity

The Threat From Within

K2 Integrity on

Even as organizations hunker down for a long and expensive siege against attackers from cyberspace, a determined employee with the right kind of access can be as much of a threat, if not more. ...more

McDermott Will & Emery

FTC Sees Disconnect on Proposed Connected Cars Legislation

McDermott Will & Emery on

The Energy & Commerce Committee of the U.S. House of Representatives held a hearing on October 21st titled “Examining Ways to Improve Vehicle and Roadway Safety” to consider (among other matters) Vehicle Data Privacy...more

Proskauer on Privacy

SEC Cybersecurity Update

Proskauer on Privacy on

Results from the SEC’s First Round of Cybersecurity Examinations - On February 3, 2015, the OCIE published a risk alert summarizing its findings from its examinations of over 100 registered investment advisers and...more

Foley & Lardner LLP

SEC Brings First Cybersecurity Enforcement Proceeding in Wake of Risk Alert

Foley & Lardner LLP on

Highlights Areas of High Risk and Examination Priorities for Financial Industry Firms - On September 15, the U.S. Securities and Exchange Commission’s (SEC’s) Office of Compliance, Inspections and Examinations (OCIE),...more

Manatt, Phelps & Phillips, LLP

SEC Ramps up Cybersecurity Scrutiny With Examination Priorities and an Enforcement Action

Why it matters - Signaling that it will continue to increase its scrutiny of firms' cybersecurity readiness, the Office of Compliance, Inspections and Examinations of the Securities and Exchange Commission (SEC) issued a...more

Snell & Wilmer

Jury Clears UCLA Health in Lawsuit Stemming From Improper Access to PHI by Plaintiff’s Romantic Rival

Snell & Wilmer on

A UCLA employee and patient now has celebrity-level security on her protected health information (PHI) as maintained by the UCLA Health system, but a jury denied her the $1.25 million in emotional distress damages she sought...more

26 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide