The Security Summit, consisting of the Internal Revenue Service (“IRS”), state tax agencies, and private-sector tax industry officials, is encouraging tax professionals during the 2019 summer season to take some time to...more
8/9/2019
/ Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Federal Trade Commission (FTC) ,
Identity Theft ,
Information Security ,
IRS ,
Personally Identifiable Information ,
Popular ,
Tax Planning
The Federal Trade Commission (“FTC”) has described itself as “Your cop on the privacy beat” and a top federal regulator of consumer-facing data security practices. An example of how the FTC asserts itself when it comes to...more
3/26/2019
/ Administrative Appeals ,
Administrative Law Judge (ALJ) ,
Appeals ,
Consumer Protection Laws ,
Cybersecurity ,
Data Security ,
Enforcement Actions ,
Federal Trade Commission (FTC) ,
FTC Act ,
Internet of Things ,
Section 5 ,
Unfair or Deceptive Trade Practices
Data breaches are fast becoming a fact of life. Experiencing a data breach is never a pleasant experience, regardless of how it happens – by accident, by criminal intent, or by system failure. Someone steals a company...more
The lengthy saga between the Federal Trade Commission (FTC) and LabMD, Inc. reached another turning point on July 28, 2016. The FTC issued its unanimous Opinion in which it found that LabMD’s data security practices were...more
8/13/2016
/ Actual Injuries ,
Administrative Law Judge (ALJ) ,
Data Breach ,
Data Security ,
Enforcement Actions ,
Federal Trade Commission (FTC) ,
FTC Act ,
LabMD ,
Section 5 ,
Standard of Review ,
Unfair or Deceptive Trade Practices
Businesses engaged in big data practices should be mindful of a new report issued by the Federal Trade Commission (FTC), in which the FTC serves notice of its intention to monitor areas where big data practices can violate...more
On February 2, 2016, the European Commission announced a last-minute “political agreement” with the United States concerning a new privacy framework for transatlantic data transfers. The accord, called the “EU-U.S. Privacy...more
As part of the government’s recent clarion call to improve our individual and collective cybersecurity posture, several federal and state agencies have released a variety of guidelines, frameworks, best practices and tips. ...more
9/8/2015
/ Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Department of Justice (DOJ) ,
FCC ,
Federal Trade Commission (FTC) ,
Hackers ,
National Security Agency (NSA) ,
NIST ,
SBA ,
Securities and Exchange Commission (SEC) ,
Small Business ,
U.S. Commerce Department ,
Websites
In a highly-anticipated decision, the U.S. Court of Appeals for the Third Circuit has ruled in FTC v. Wyndham Worldwide Corporation that the Federal Trade Commission (“FTC”) is authorized to pursue lawsuits against those who...more
8/27/2015
/ Administrative Authority ,
Consumer Information ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Security ,
Federal Trade Commission (FTC) ,
FTC v Wyndham ,
Privacy Policy ,
Unfair or Deceptive Trade Practices ,
Wyndham
Yes, today is “World Password Day 2015? (#PasswordDay). While it may not have the same panache as Cinco de Mayo, a day devoted to passwords still can be useful, especially for those who use terms like “bieber”, “123456”,...more
In Part 1, we covered some basic privacy policy concepts. Here in Part 2, we address three problems associated with privacy policies in practice.
1. You Don’t Have One, But You Really Should -
There is no...more
For many companies, the prospect of a dreadful, costly and reputation-damaging cyber-attack and data breach is all the motivation they need to assess and improve their cyber security and data protection posture RIGHT NOW. ...more
The federal government continues to steadily ratchet up its focus on cybersecurity. On February 13, 2015, President Obama signed an Executive Order to improve real-time sharing of cyber-threat information between government,...more
2/20/2015
/ Barack Obama ,
CTIIC ,
Cybersecurity ,
Cybersecurity Summit ,
Department of Justice (DOJ) ,
Executive Orders ,
Federal Trade Commission (FTC) ,
Information Sharing ,
ISAOs ,
Private Sector ,
Public Entities
Companies that are looking to sell, transfer or buy personally identifiable information (“PII”) via bankruptcy asset sales would be wise to confirm that such a transfer is consistent with the debtor’s privacy policy. If it...more