Latest Publications

Share:

Alabama’s Data Breach Law

All U.S states now have laws about data security and what to do when there’s a data breach. Alabama recently was the 50th state to add such a law, and it takes effect on May 1, 2018. Here are its highlights....more

Business Email Compromise: What It Is and What You Can Do

Business email compromise (“BEC”) is a type of cyberattack that is increasing at an alarming pace. The U.S. Federal Bureau of Investigation estimated in a May 2017 alert that global losses due to BEC scams totaled more than...more

New Mexico’s Data Breach Law

Almost all U.S states have laws about data security and what to do when there’s a data breach. New Mexico recently added such a law for its state. Here is what’s in the New Mexico law....more

New Cybersecurity Rules for Colorado Investment Advisers and Broker-Dealers

Colorado has adopted new rules that add cybersecurity requirements for certain entities with Colorado securities licenses. The rules are from the regulatory agency the Division of Securities. It licenses securities...more

Arizona Civil Verdicts, 2016

For the past 13 years, I’ve written the cover story of the state bar magazine, Arizona Attorney, about Arizona verdicts. The latest one is out. Here are 2016’s top Arizona verdicts, significant defense verdicts, punitive...more

Colorado’s Proposed Cybersecurity Rules for Investment Advisers and Broker-Dealers

Colorado has new proposed rules that add cybersecurity requirements for certain entities with Colorado securities licenses. The proposed rules are from the regulatory agency the Division of Securities. It licenses securities...more

New Cybersecurity Requirements for New York Financial Companies

The New York Department of Financial Services has new cybersecurity regulations “designed to promote the protection of customer information as well as the information technology systems of regulated entities [financial...more

Cybersecurity Requirements Proposed for New York Financial Companies

The New York Department of Financial Services has proposed new cybersecurity regulations “designed to promote the protection of customer information as well as the information technology systems of regulated entities...more

Privacy and The Cell Phone: Arizona Says Yes

Arizona recently recognized a “legitimate expectation of privacy” in cell phones. The case was State v. Peoples, and the opinion was issued on September 12, 2016. The Peoples case was about the police’s search of a cell...more

Best Practices for Cybersecurity in Vehicles

In response to increasing cybersecurity threats in vehicles, in 2015 the Automotive Information Sharing and Analysis Center (Auto-ISAC) was formed. Its member companies include all automakers operating in North America...more

Product Liability Verdicts in Arizona

Product liability cases show a strong defense trend in Arizona. Since 2011, Arizona juries have given twelve defense verdicts and three plaintiff’s verdicts. Here are all of the Arizona product liability verdicts over the...more

What’s In The Cybersecurity Act of 2015?

The Cybersecurity Act of 2015 became law on December 18, 2015. It’s the biggest piece of cybersecurity legislation passed by Congress in recent years. It authorizes and protects certain information-sharing for cybersecurity...more

3 Defining Issues for the Internet of Things in 2016

In an era of ever-evolving ‘wired’ technology, increasing interconnectedness, and business and personal concerns about data security, we recently asked attorneys writing on JD Supra: What will be among the defining issues of...more

How to Protect and Secure Your Connected Devices

The Federal Bureau of Investigation is warning companies and the public to be aware of vulnerabilities that cybercriminals could exploit in connected devices, otherwise known as Internet of Things devices....more

“Pocket-Dial” Mobile Phone Calls: Private or Not?

If you accidentally “pocket dial” someone on your mobile phone, do you have a reasonable expectation of privacy about what’s said in that call? Here’s how courts looked at this issue recently. What Happened? James Huff...more

Product Recall Trends in 2015

What are the latest trends on product recalls in the United States? Consumer Products. The Consumer Product Safety Commission has been proactive in recent years with consumer product regulations and recalls,...more

California’s Data Breach Laws

Almost all U.S states have laws about data security and what to do when there’s a data breach. California’s was the landmark law, first taking effect in 2003. Here is what California requires. Who The Laws Apply To....more

Arizona Civil Verdicts 2014

Courage. Trial lawyers have lots of important traits and skills, and courage is at the top of the list. To be able to speak confidently to the jury who holds your client’s case in its hands, to tell that story in a way that...more

Product Liability Verdicts in Arizona

Product liability cases show a strong defense trend in Arizona. Since 2011, Arizona juries have given ten defense verdicts and only one plaintiff’s verdict. That’s nearly 91% in favor of defendants over the last four years....more

The Arizona Data Breach Law

Almost all U.S states have laws about data security and what to do when there’s a data breach. Here is what’s in the Arizona law. Who The Law Applies To. The law applies to anyone who conducts business in Arizona and...more

The Latest on Major Defense Verdicts in Arizona

What’s the latest news on Arizona’s civil defense verdicts? Here are some interesting defense verdicts from 2014: - Steak Out Restaurant & Saloon, L.L.C. et al. v. Old Lobos T&T, L.L.C. et al. Steak Out Restaurant...more

What’s The “Internet of Things” and What Are Its Legal Challenges?

The “Internet of Things” is the universe of smart devices that talk to the internet or to one another. The devices have unique identifiers and the ability to automatically transfer data over a network on their own, without...more

Travelers, Beware the “Darkhotel” Hacks Over Hotel Internet

Business travelers may be targeted and hacked through hotel Wi-Fi networks, according to a recent report by Kaspersky Lab. Hackers have been stealing company data from top executives at luxury hotels in an attack known as...more

Four New Privacy Laws and What They Mean for Businesses

Does your business operate a website, online service, application or database? California has passed a group of privacy and data security laws that apply to those types of businesses. The new laws are either effective already...more

24 Results
/
View per page
Page: of 1

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.