Latest Posts › Popular

Share:

Court: Stored Communications Act Warrant Cannot Be Used to Seize Data Held Overseas

In a case that may have significant impact for companies providing public Internet and cloud services, the Second Circuit has ruled that a federal court may not issue a criminal warrant ordering a U.S. company to produce...more

Ninth Circuit Vastly Expands Scope of Criminal, Civil Liability for Computer Fraud

In a pair of highly anticipated decisions, the Ninth Circuit significantly reshaped criminal and civil liability under the federal Computer Fraud and Abuse Act (CFAA). The court’s recent decisions in United States v. Nosal...more

Cybersecurity, Use of Internet of Things Technology Concern Manufacturers

Powered in part by the growing use of Internet of Things (IoT) technologies, cybersecurity has surged to become one of the leading concerns for global manufacturers, according to a recently released study....more

European Parliament Adopts EU General Data Protection Regulation; 12 Steps Businesses Should Take Now

The European Parliament has voted to adopt the draft text of the General Data Protection Regulation (GDPR), which imposes enhanced requirements on organizations processing personal data in the European Union and transferring...more

California Data Breach Report Defines “Reasonableness” Standard for Data Protection

Nearly three in five Californians were victims of a data breach in 2015, according to a report released by state Attorney General Kamala D. Harris. The report adopts minimum standards of ''reasonable security'' for personal...more

President Creates Cybersecurity National Action Plan and Commission on Enhancing National Cybersecurity

President Obama's Cybersecurity National Action Plan (CNAP), a comprehensive plan to address the nation's cybersecurity challenges through increased funding, a more robust cybersecurity workforce, and education initiatives,...more

DOJ/DHS Issue Interim Guidance on Implementation of Cybersecurity Information Sharing Act

The Department of Homeland Security (DHS) and the Department of Justice (DOJ) have released Interim Guidance Documents (Guidance Documents) to implement the Cybersecurity Information Sharing Act of 2015 (CISA). The Act...more

Use of Big Data May Violate Federal Consumer Protection Laws, FTC Report Warns

A new Federal Trade Commission (FTC) report, "Big Data: A Tool for Inclusion or Exclusion? Understanding the Issues," warns that certain uses of big data consisting of consumer information may implicate various federal...more

FTC Takes Action against App Developers on COPPA Allegations Involving Persistent Identifiers

The FTC has announced enforcement actions against two app developers that allegedly violated the Children’s Online Privacy Protection Act (COPPA) by using persistent identifiers to serve advertising to children. The...more

Company Prevails in Challenge to FTC Data Security Complaint

A recent decision by the Federal Trade Commission (FTC) Chief Administrative Law Judge (ALJ) dismissed the FTC’s complaint against LabMD, Inc. (LabMD) asserting the company’s alleged failure to protect consumer data in two...more

NIST Guide Highlights Cybersecurity Considerations for Utilities and Manufacturing Companies

In 2013 alone, the U.S. Department of Homeland Security (DHS) and its Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to more than 256 cyber-incident reports—more than half of them in the energy...more

Penn Study Unlikely to Result in Flood of Fracking Lawsuits

A recently released study from scientists at the University of Pennsylvania suggests a link between hydraulic fracturing ("fracking") for gas and oil and cardiac and neurological illnesses. Whether the report triggers a rash...more

FDA Issues Guidance on Mobile Medical Devices

The Food and Drug Administration’s recent guidance on mobile medical applications illustrates the FDA’s growing efforts to combat emerging cybersecurity issues that affect patient safety. The guidance, issued in February...more

Anthem's Breach: How Employers Should Respond

With the news of the breach of security at Anthem health plans, many employers have been wondering whether their employees are affected and how they should respond. The breach extends to members in Anthem-affiliated plans and...more

Internet of Things: Federal Agencies Offer Privacy and Data Security Best Practices

The recently released Federal Trade Commission staff report, Internet of Things: Privacy & Security in a Connected World, provides companies with insight into the FTC's consumer privacy and data security expectations for the...more

Phishing Attacks Target University Employee Payroll Information

In a recent advisory, the Research and Education Networking Information Sharing and Analysis Center (REN-ISAC) warned higher education institutions about sophisticated phishing attacks that target faculty and staff...more

Massive Hacking Operation Further Reveals Weakness of Passwords

A small private cybersecurity firm recently revealed that a Russian computer hacking organization amassed more than 1.2 billion username and password combinations. The data was collected across a wide swath of websites, from...more

67 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide