Latest Publications

Share:

Use of the Blockchain to Contract Digitally

Smart contracts are self-executing agreements written in code on the blockchain. Parties contract digitally using distributed ledger technology. This article offers a layperson’s, non-technical summary of the underlying...more

The Uber Breach and the Need for an Independent Privacy Function

The 2016 data breach involving 57 million Uber riders and drivers and the ensuing efforts to conceal the breach appears to have tapped into the public’s — and the government’s — frustration with a series of increasingly large...more

Top 10 Things to Do in the Event of a Data Breach

This webinar focuses on strategies for mitigating reputational, litigation, and regulatory risk in the post-data breach environment. We will offer specific practice tips to implement during this crisis period that are...more

Data Breach Response Planning: Laying the Right Foundation

Part of Bradley Arant’s Privacy and Information Security Team’s seven-part Data Breach Toolkit Webinar Series, the “Data Breach Response Planning: Laying the Right Foundation” webinar, led by Paige Boshell and Amy Leopard,...more

Merchandising 101: Missouri Supreme Court Addresses Applicability of State’s Merchandising Practices Act to Mortgage Loan...

Two new en banc opinions from the Supreme Court of Missouri, both released on August 19, 2014, may be of interest to mortgage loan servicers with borrowers in this state. The opinions — Conway v. CitiMortgage, Inc., ---...more

Commonwealth of Kentucky enacts data breach notification law

On the heels of the widely publicized Target breach, states continue to enact legislation designed to provide notice to their citizens when a security breach involving personal data occurs. Kentucky is the latest state to...more

Don’t forget to close the back door: Vendor management and privacy

When you enter into a contract with a vendor that will access, use or disclose your customer or employee personal information, assume that you are responsible for any unauthorized access to, use, or disclosure of that...more

Moving forward after going public with a data breach: Managing ongoing messaging

The time period between the discovery of a data breach and a company’s public announcement is never stress-free, even if you have managed the responses to other data breaches and your company has a preplanned response...more

Regulatory double jeopardy? FTC enforcement of privacy and security in healthcare

How should health care companies strengthen their HIPAA compliance programs to manage the risk of a potential FTC investigation? While the U.S. Department of Health and Human Services (HHS) Office for Civil Rights...more

5/16/2014  /  Data Protection , EHR , FTC , HHS , HIPAA , Jurisdiction , OCR , PHI

The Evolution of FTC Privacy Enforcement

The FTC has recently undertaken further reviews of specific security practices past its historical boundaries - The Federal Trade Commission (FTC) has asserted its enforcement authority as “the chief federal agency on...more

Marketing in a Wired World: Telemarketing, Text and E-mail Marketing

Electronic advertising is on the rise as companies seek to meet consumers where they live: online and on their cell phones. Advertising by electronic mail and text messaging can be tailored to the desired market segment....more

Privacy and Information Security Alert

The final Federal Cybersecurity Framework is imminent. Find out how the Framework operates and how it may impact your business. Learn what government and industry leaders say about the Framework and the need for related...more

Privacy and Security Alert: January 9th, 2014

On December 5, 2013, the Office of Inspector General (OIG) reported on the Office for Civil Rights’ (OCR) compliance as of May 2011 with oversight and enforcement of the Security Rule and compliance with federal cybersecurity...more

Update: Banks Must Protect Depositors' Social Security and Other Federal Benefits from Garnishments - Treasury Issues Final Rule

The U.S. Treasury and four other federal agencies jointly issued their final rule1requiring depository institutions to protect up to two months’ worth of their depositors’ direct deposits of Social Security and certain other...more

14 Results
/
View per page
Page: of 1

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.