Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more
10/12/2023
/ Crisis Management ,
Cyber Attacks ,
Cyber Insurance ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Events ,
Incident Response Plans ,
Risk Mitigation
In the past 5 years businesses felt the increasingly intricate data management rules (GDPR, CCPA, BIPA) pressed against an explosion in hacking and ransomware. Companies experience pressure from legislators, regulators,...more
3/15/2022
/ Biometric Information ,
Continuing Legal Education ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Use Policies ,
Geolocation ,
Hackers ,
New Legislation ,
Privacy Laws ,
Ransomware ,
State Privacy Laws ,
Webinars
This week I read a worried headline claiming that, in a recent consumer data breach, the hackers had managed to access consumers’ telephone numbers. This was treated as an important and troubling revelation....more
11/19/2021
/ ATDS ,
Bots ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Digital Wallets ,
Hackers ,
Mobile Apps ,
Multi-Factor Authentication ,
Online Banking ,
Phishing Scams ,
Phone Numbers ,
Popular ,
Spyware
Most people have a warped and deeply unrealistic understanding of data security.
There is no such thing as absolute security. For a thing to have value, you must be able to access the value – in effect, to use it. In order...more
Although it seems that every day less people care about their privacy, the ability to maintain parts of your life as private remains crucial to our democracy, our economy, and our personal wellbeing. Many people expose their...more
6/5/2020
/ Anonymity ,
Big Data ,
Coercion ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Personal Information ,
Privacy Concerns ,
Privacy Laws ,
Reputation Management ,
Reputational Injury ,
Video Privacy Protection Act
Don’t wait to implement your California Consumer Privacy Act (CCPA) compliance as it could require changes to your operations. CCPA can apply to businesses even if they do not have offices or employees in California. It can...more
8/2/2019
/ California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Protection ,
Disclosure Requirements ,
Opt-Outs ,
Personal Data ,
Personally Identifiable Information ,
Right to Delete
Last week, the New York State Senate, at the request of the state attorney general, passed the “Stop Hacks and Improve Electronic Data Security Act” (the “Shield” Act). The bill is currently working its way through the New...more
Oregon amended its data breach notice statute (ORS §§ 646A.600 – 646A.628) on May 24, 2019. Beginning January 1, 2020, Oregon will be the first state to explicitly require vendors to notify the attorney general about data...more
Now a business that was hacked may be successfully sued under state common law by data subjects whose information was compromised in the crime. For the first time, a state supreme court has held that a company that was...more
1/3/2019
/ Breach of Duty ,
Cybersecurity ,
Data Breach ,
Data Security ,
Economic Loss Doctrine ,
Employer Liability Issues ,
Negligence ,
PA Supreme Court ,
Personally Identifiable Information ,
Popular ,
Reasonable Care
Tacking an entirely new direction from other US states, Ohio has decided to offer defensive legal protection to businesses who have built a cybersecurity regime around well-known industry standards, even where those...more
11/7/2018
/ Blockchain ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Federal Information Security Modernization Act (FISMA) ,
GLBA Privacy ,
Health Insurance Portability and Accountability Act (HIPAA) ,
New Legislation ,
NIST ,
Popular ,
Safe Harbors ,
Smart Contracts
Canada now follows the US trend to require reporting of personal data exposures. Beginning November 1, 2018, a change in the law will require companies subject to Canada’s federal data protection laws to report data breaches...more
Companies have a responsibility to protect the sensitive employee and consumer data they hold, but we do not know how much of their revenues must be spent on this effort before it is considered enough. We do not know what...more
6 Months To Go The EU’s General Data Protection Regulation goes into effect on May 25, 2018. GDPR replaces the EU Data Protection Directive. GDPR can apply to US-based businesses even if they do not have offices or employees...more
11/30/2017
/ Contract Amendments ,
Cyber Policies ,
Cybersecurity ,
Data Breach ,
Data Controller ,
Data Processors ,
Data Protection Officers (DPOs) ,
EU ,
General Data Protection Regulation (GDPR) ,
Personal Data ,
Vendor Contacts ,
Written Agreements
7 Months To Go -
The EU’s General Data Protection Regulation goes into effect on May 25, 2018. GDPR replaces the EU Data Protection Directive. GDPR can apply to US-based businesses even if they do not have offices or...more
11/1/2017
/ Contract Amendments ,
Cyber Policies ,
Cybersecurity ,
Data Breach ,
Data Controller ,
Data Processors ,
Data Protection Officers (DPOs) ,
EU ,
General Data Protection Regulation (GDPR) ,
Personal Data ,
Vendor Contacts ,
Written Agreements
On October 25, 2016, the Federal Trade Commission (FTC) released its nonbinding “Data Breach Response” guide with an accompanying blog post and video, all directed to help businesses prepare a data breach response plan. The...more
A hotel is a personal place, even if you share it with thousands of other people. The very obscurity in a crowd can make you feel anonymous, and the private living space allows for the most private of conversations and...more
9/30/2016
/ Big Data ,
Cell Phones ,
Data Breach ,
FCC ,
Hilton ,
Hospitality Industry ,
Hotels ,
Hyatt ,
International Travel ,
Invasion of Privacy ,
iPhone Tracking ,
Malware ,
Marriott ,
No-Blocking Rules ,
Personal Data ,
Surveillance ,
Web Tracking ,
Wifi
In Travelers Indemnity Co. of America v. Portal Healthcare Solutions, LLC, the Fourth Circuit Court of Appeals reverses the recent trend of insurance companies avoiding any liability for data breaches under commercial general...more
We all know why selecting appropriate data security standards is difficult. No two business are the same. Different businesses have different assets to protect and different bank accounts to tap. Different sized businesses...more
In the third privacy-related enforcement action of the year, the FCC Enforcement Bureau entered into a $595,000 settlement with Cox Communications to resolve an investigation into the company’s loss of customer personal data....more