Latest Publications

Share:

Carpenter v. United States Privacy Case Pushes Supreme Court to Decide Fourth Amendment Protections of Cell Phone Metadata

The U.S. Supreme Court heard oral arguments in what may become one of the defining consumer privacy cases of our generation. The central question in Carpenter v. United States asks whether the government violates the Fourth...more

Getting Past Spectre and Meltdown: A Practical Guide

Recently, there has been a lot of discussion regarding the Spectre and Meltdown vulnerabilities. This alert provides a simple overview of what these vulnerabilities are, what systems could be affected, as well as steps that...more

Athletes and their Biometric Data – Who Owns It and How It Can Be Used

More than ever before, biometric data, a term often used broadly to refer to metrics related to human characteristics, is being collected at a faster pace. Devices of all kinds are now able to able to track and store data...more

Insurance Commissions Approve Data Security Model Law

The National Association of Insurance Commissioners (NAIC) has approved its draft of the Insurance Data Security Model Law (Model Law) via a meeting of its Executive and Plenary Committees. This important development follows...more

Senators Re-Introduce Bill Requiring 30-Day Notification of Company Data Breaches

As we near the end of a year that has seen more than its share of massive data breaches, two bills have been introduced (one re-introduced) in the U.S. Senate....more

Proposed Ohio Law May Encourage Businesses to Adopt Cyber Standards

Recently proposed legislation in Ohio could provide businesses with special protection from lawsuits in the event of a hack under certain circumstances. Senate Bill 220 would shelter businesses that have been proactive in...more

FTC Provides Additional Guidance on COPPA Policy for Voice Recordings

The Federal Trade Commission (FTC) clarified in recent guidance how the Children’s Online Privacy Protection Act (COPPA) applies to internet-connected device companies and other businesses that collect and use children’s...more

Equifax Breach: Three Takeaways from the First Four Days

On September 7, 2017, Equifax, one of the three large credit reporting bureaus, announced a cybersecurity incident impacting approximately 143 million U.S. consumers. According to Equifax, the breach occurred mid-May through...more

The FTC’s Uber Consent Order: A Warning to Fast-Growing Companies

Recently, Uber agreed to a proposed Federal Trade Commission (FTC) consent order (“Consent Order”) to settle charges in an FTC complaint (“Complaint”) regarding behavior stemming back to at least 2014. Acting Chairman Maureen...more

FTC Asked to Investigate Google’s Matching of “Bricks to Clicks”

Recently, the Electronic Privacy Information Center (“EPIC”) asked the FTC to begin an investigation into a Google program called “Store Sales Management.” The purpose of Store Sales Management is to allow for the matching...more

FTC Reaffirms that IoT Devices Must Comply with COPPA

The Internet of Things (“IoT”) can be thought of as a group of different devices that can communicate with each other, perhaps over a network such as the internet. We have written extensively about many of the privacy...more

US-CERT Encourages Companies to Act on FBI Guidance to Protect Email Systems

Recently the United States Computer Emergency Readiness Team (US-CERT), an organization within the Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD) and a branch of the Office of...more

6/2/2017  /  Cybersecurity , DHS , Email , FBI , NCCIC , Phishing Scams , US-CERT

Cloudbleed: Three Risk Management Lessons Learned 

Recently, a Google researcher discovered a serious flaw with the content delivery network (CDN) provided by CloudFlare. This vulnerability has now become known as Cloudbleed, in a nod to the earlier Heartbleed SSL...more

Data Breaches Will Cost Yahoo and Verizon Long After Sale

Five Things You (and Your M&A Diligence Team) Should Know - Recently it was announced that Verizon would pay $350 million less than it had been prepared to pay previously for Yahoo as a result of data breaches that...more

SEC May Leverage Investigation of Yahoo! Data Breaches to Clarify Prior Guidance

The Securities and Exchange Commission (SEC) is investigating whether Yahoo! should have reported the two massive data breaches it experienced earlier to investors, according to individuals with knowledge. The SEC will...more

California AG Guidance for the Ed Tech Industry: 6 Recommendations to Protect Student Data Privacy

Developers and operators of educational technology services should take note. Just before the election, California Attorney General Kamala Harris provided a document laying out guidance for those providing education...more

How did the Internet of Things allow the latest attack — on the Internet?

Over the last week, details have become available to explain how an attack against a well-known domain name service (DNS) provider occurred. What about the potential legal risks? We will attempt to provide insights into...more

3 Guidelines to Maximize Value of Data

Imagine you are the CEO of company sitting across from an interviewer. The interviewer asks you the age old question, “So tell me about your company’s strengths and weaknesses?” You start thinking about your competitive...more

Attorney General Kamala D. Harris Provides New Online Tool to Report California Online Privacy Protection Act (CalOPPA) Violations

It’s time for a compliance check on those website or mobile app privacy policies, before the California Attorney General comes knocking. Attorney General Kamala D. Harris has announced the release of a new tool for...more

Three Steps to the Right Cloud for Your Business

The term “cloud computing,” — a process by which remote computers are used to store, manage and process data — is no longer an unfamiliar term. According to at least one estimate, “approximately 90 percent of businesses...more

20 Results
/
View per page
Page: of 1

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.