Latest Publications

Share:

EU Retail News - February 2018

Do You Need to Appoint a Data Protection Officer in Your Organisation? Under the EU General Data Protection Regulation (GDPR), any company that monitors individuals on a "large scale" or has "large scale" collections of...more

GDPR’s Most Frequently Asked Questions: Does the GDPR apply if my company has no employees or offices in the EU?

The European Union’s General Data Protection Regulation (“GDPR”) is arguably the most comprehensive – and complex – data privacy regulation in the world. As companies prepare for the GDPR to go into force on May 25, 2018,...more

EU’s General Data Protection Regulation Takes Effect in May — Are You Compliant?

The European Union’s General Data Protection Regulation (“GDPR”), arguably the most comprehensive – and complex – data privacy regulation in the world, goes into force on May 25, 2018. As retailers and other companies...more

GDPR’s Most Frequently Asked Questions: What Does It Mean To Be “Established” In The EU?

The European Union General Data Protection Regulation (“GDPR”) is arguably the most comprehensive – and complex – data privacy regulation in the world. As companies prepare for the GDPR to go into force on May 25, 2018, there...more

GDPR’s Most Frequently Asked Questions: Does the GDPR apply to all EU citizens’ data?

The European Union’s General Data Protection Regulation (“GDPR”) is arguably the most comprehensive – and complex – data privacy regulation in the world. As companies prepare for the GDPR to go into force on May 25, 2018,...more

GDPR: The Most Frequently Asked Questions: Does the GDPR data breach notification provision cover the same type of data as United...

The European Union’s General Data Protection Regulation (“GDPR”) is arguably the most comprehensive – and complex – data privacy regulation in the world. As companies prepare for the GDPR to go into force on May 25, 2018,...more

Tax Filing Fraud

Tax returns and W-2s are information rich documents. Among other things they contain the name and Social Security Number of an employee, as well as information concerning their salary and address, and personal behavior and...more

Defining Sensitive Personal Information

Like the terms “personal information,” “personally identifiable information,” or “PII,” the terms “sensitive information,” “sensitive personal information,” and “special categories of information” are often left undefined in...more

GDPR: The Most Frequently Asked Questions: Is a Service Provider’s Privacy Shield Certification Good Enough?

The European Union’s General Data Protection Regulation (“GDPR”) is arguably the most comprehensive – and complex – data privacy regulation in the world. As companies prepare for the GDPR to go into force on May 25, 2018,...more

GDPR: The Most Frequently Asked Questions: Are the Standard Contractual Clauses Enough?

The European Union’s General Data Protection Regulation (“GDPR”) is arguably the most comprehensive – and complex – data privacy regulation in the world. As companies prepare for the GDPR to go into force on May 25, 2018,...more

Companies Perceived By The FTC As Top Violators

The Federal Trade Commission collects complaints about organizations that allegedly violate the data privacy, data security, advertising, and marketing laws. Each month the FTC creates an internal “Top Violators” report...more

Data Privacy and Security: A Practical Guide for In-House Counsel, 2018 Edition

Five years ago few legal departments were concerned with – let alone focused on – data privacy or security. Most of those that were aware of the terms assumed that these were issues being handled by IT, HR, or marketing...more

Firms Breed Misconceptions and Confusion Surrounding the GDPR

Anytime a new statute or regulation comes along some service providers can’t help but jump on the fearmongering bandwagon. This seems to be worse the longer the statute, and the more complex and obscure (and therefore hard to...more

Causes of Healthcare Data Breaches

Pursuant to the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”), covered entities (e.g. healthcare providers and health plans) must notify the Department of Health and Human Services (“HHS”) of breaches...more

Data Maps and Data Inventories

Knowing the type of data that you collect, where it is held, with whom it is shared, and how it is transferred is a central component of most data privacy and data security programs. The process of answering these questions...more

Collecting Information From Children

The United States has relatively few restrictions on collecting information from children off-line. Efforts to collect information from children over the internet, however, are regulated by the Children’s Online Privacy...more

Bounty or Bug Programs

Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. Some security officers, however,...more

Bring Your Own Device (“BYOD”) Policies

Many companies permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

How Employers Can Become Experts at Data Breaches: Errant Emails

A large portion of the data breaches that occur each year involve human resource related information. Bryan Cave has put together a multi-part series to help human resource managers understand, prepare for, and react to, a...more

How Employers Can Become Experts at Data Breaches: Lost Laptops and USBs

A large portion of the data breaches that occur each year involve human resource related information. Bryan Cave has put together a multi-part series to help human resource managers understand, prepare for, and react to, a...more

How Employers Can Become Experts at Data Breaches: Tax and W2 Breaches

A large portion of the data breaches that occur each year involve human resource related information. Bryan Cave has put together a multi-part series to help human resource managers understand, prepare for, and react to, a...more

How Employers Can Become Experts at Data Breaches: Managing a crisis

A large portion of the data breaches that occur each year involve human resource related information. Bryan Cave has put together a multi-part series to help human resource managers understand, prepare for, and react to, a...more

How Employers Can Become Experts at Data Breaches: Retaining a third party forensic investigator

A large portion of the data breaches that occur each year involve human resource related information. Bryan Cave has put together a multi-part series to help human resource managers understand, prepare for, and react to, a...more

How Employers Can Become Experts at Data Breaches: Preserving the evidence of a breach

The immediate reaction of many organizations when they discover that a system may be infected with a virus or malware is to remove, erase, and rebuild the potentially infected system as quickly as possible in an effort to...more

How Employers Can Become Experts at Data Breaches: Creating an incident response team

A large portion of the data breaches that occur each year involve human resource related information. Bryan Cave has put together a multi-part series to help human resource managers understand, prepare for, and react to, a...more

207 Results
/
View per page
Page: of 9

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.