Latest Posts › Personally Identifiable Information

Share:

Poor Richard’s Four Easy Steps To Compliance With the California Consumer Privacy Act (CCPA)

2019 is a nonstop carnival of consultants and lawyers sending you hither and thither as each new state effort to solve the purported ills of the digital world flashes its shiny omnibus bill for a moment before being dragged...more

Keep Your Eye on Biometrics: Illinois High Court Waves Six Flags at Spokeo

Attention all who collect fingerprints and other biometric information of Illinois residents: a private right of action is now available for a mere technical violation of the Illinois Biometric Information Privacy Act...more

Cyber Winter is Here, and Coming to Regulation: New York Cybersecurity Rule Ice Dragon Heading for the Wall

The State of New York’s response to two large cybersecurity breaches may fuel the transformation of the state regulation of corporate cybersecurity in the U.S. Unlike typical state data breach statutes which focus on...more

D.C. District Court Expands Government Contractors’ Exposure to Consumer Data Breach Class Actions

The United States District Court for the District of Columbia recently endorsed private citizens bringing data breach claims directly against a government contractor where the contractor failed adequately to safeguard the...more

Unintended Plaintiffs: United States District Court Allows Private Citizens to Sue a Government Contractor For Failing to...

In a remarkable opinion with potentially wide-ranging implications, the United States District Court for the District of Columbia recently allowed a member of the public to sue a federal government contractor directly for...more

Your Company's Website Privacy Policy Probably Needs a Refresh (Before February 1, 2017)

As 2016 has come to a close, now is a good time to take stock of new disclosure obligations for website privacy policies introduced over the course of the year. It is likely that if your company’s privacy policy has not been...more

Beyond Breach: Challenges in Cybersecurity & Coverage

Some of the biggest threats to cybersecurity involve controlling, damaging and interrupting systems, denying access to critical data and destroying data; “breach” not so much. Organizations need to make sure that their...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide