News & Analysis as of

Privacy Science, Computers & Technology Consumer Protection

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:

Is Your Business Insured Against A Cyber Attack?

by Partridge Snow & Hahn LLP on

Your business has insurance coverage for flood and fire damage. You are protected if an employee gets into a car accident. But are you covered for a cyber attack?...more

NIST Small Business Cybersecurity Act Passes in the House

by Morgan Lewis on

On October 11, 2017, the House of Representatives passed bill H.R. 2105, the NIST Small Business Cybersecurity Act (NIST Act), which would require the US Department of Commerce’s National Institute of Standards and Technology...more

The Data Report Episode 18: Privacy Shield

by Bilzin Sumberg on

Module Five: International Law (Part III) In this episode of The Data Report, Litigation attorney Jay Ward discusses compliance with the GDPR requirements. Jay examines "Privacy Shield," the framework that provides a set of...more

Privacy Tip #110 – Resources for Small Businesses to Stay Informed about Cyber Threats

The Federal Trade Commission (FTC) has concentrated on small businesses this year with the launch of www.FTC.gov/SmallBusiness , which provides data security awareness information to small businesses. The site includes...more

China Data Protection Enforcement Update – A Focus on Platform Content

by McDermott Will & Emery on

Following the first enforcement actions by local authorities in Shantou and Chongqing for violations of the new Network Security Law that came into effect this year, authorities in China have recently shown a clear initial...more

GRDP Update: WP29 Guidelines adopted for Data Protection Impact Assessment

The new GDPR is much more detailed than the 1995 Directive. The GDPR has 99 articles, versus 34 in the Directive. And a few new key concepts clearly require new guidance....more

JAMA: Cybersecurity Concerns and Medical Devices – Lessons from a Pacemaker Advisory

Interesting viewpoints from this Journal of the American Medical Association article on FDA’s August 2017 notice re: cyber security issues with certain pacemakers, including:... ...more

Pros and Cons of Hiring a Security Rating Agency

by Patrick Law Group, LLC on

One can hardly check out any news outlet today without reading or hearing about a security breach. Experts frequently advocate performing internal assessments to identify security weaknesses. Commentators tout the...more

Cybersecurity 2018 – The Year in Preview: HIPAA Compliance

Like many things in Washington, the HIPAA landscape in 2018 will be shaped by the shifting priorities of President Trump’s new administration. Early signs point to less funding for the Office of Civil Rights (“OCR”) within...more

FTC Provides Guidance on Reasonable Data Security Practices (Part II of III)

by Patrick Law Group, LLC on

This is the second in a series of three articles on the FTC’s Stick with Security blog... Over the past 15 years, the Federal Trade Commission (FTC) has brought more than 60 cases against companies for unfair or deceptive...more

FTC’s “Stick With Security” #5: Segment Your Network And Monitor Who’s Trying To Get In And Out

by Snell & Wilmer on

On August 25, 2017, the FTC released its fifth “Stick with Security” principal, which focused on how companies can protect their virtual “entrances and exits” and make life harder for hackers. The FTC believes that the...more

FTC’s “Stick With Security” #4: Store Sensitive Information Securely & Protect It During Transmission

by Snell & Wilmer on

On August 18, 2017, the FTC released its fourth “Stick with Security” principle, which explained the importance of keeping confidential data only when needed, and securely storing the data when it must be kept. To that end,...more

FTC Provides Guidance on Reasonable Data Security Practices (Part I of III)

by Patrick Law Group, LLC on

Over the past 15 years, the Federal Trade Commission (FTC) has brought more than 60 cases against companies for unfair or deceptive data security practices that put consumers’ personal data at unreasonable risk. Although the...more

FTC’s “Stick With Security” #3: Require Secure Passwords and Authentication

by Snell & Wilmer on

On August 11, 2017, the FTC released its third “Stick with Security” principle, which touched on the necessity of strong authentication practices. Secure passwords and fortified authentication practices make it that much...more

FTC’s “Stick With Security” #2: Control Access to Data Sensibly

by Snell & Wilmer on

On August 4, 2017, the FTC released its second “Stick with Security” principle, which addressed the next step a company should take after it has identified confidential data in its possession and determined what information...more

Measure Introduced In The House To Restrict Internet Surveillance Of Americans

by King & Spalding on

On October 6 a bipartisan group of lawmakers from the House Judiciary Committee unveiled the USA Liberty Act (H.R. 3989), which seeks to reform and reauthorize Section 702 of the Foreign Intelligence Surveillance Act. Section...more

Monthly TCPA Digest - September 2017

by Mintz Levin on

Ready for good news about TCPA litigation? In this edition of our Monthly TCPA Digest — providing insights on Telephone Consumer Protection Act (TCPA) cases and regulations — we point to a glimmer of hope for businesses....more

Validity of personal data export mechanism thrown into question

by Dechert LLP on

The Irish High Court recently asked the Court of Justice of the European Union (CJEU) to rule on the validity of “standard contractual clauses” as a basis for transferring personal data out of the European Economic Area...more

Equifax Fallout Could Boost Consumers' Shaky Harm Claims

Tim Toohey was quoted in Allison Grande’s article that ran in Law360 on October 6, 2017, discussing the Equifax data breach and the congressional hearings in both the Senate and House following the breach. The hearings have...more

SEC and States Are Upping Their Cyber Game, Are You Doing the Same?

September 2017 saw no respite from the relentless pace of cyber developments, not only from the perspective of rapidly evolving attacks, but also from the perspective of dynamic federal and state regulatory moves. In...more

Schrems Redux: What's the Future for Transatlantic Data Transfers?

by Bryan Cave on

What Now? With its decision on Tuesday 3 October 2017 referring a preliminary question on the validity of the European Union’s “standard contractual clauses” (“SCC”) regime to the Court of Justice of the European Union...more

State Data Breach Notification Laws

by Foley & Lardner LLP on

While most state data breach notification statutes contain similar components, there are important differences, meaning a one-size-fits-all approach to notification will not suffice. What’s more, as data breaches continue to...more

NERC Proposes to Reduce Cybersecurity Risks in CIP Supply Chains

by Morgan Lewis on

The proposed Reliability Standards focus on vulnerabilities in vendor products and services and would regulate the utility procurement process....more

Ohlhausen Examines 'Informational Injury'

Making good on her promise to focus on concrete consumer injury, Acting Chair of the Federal Trade Commission Maureen K. Ohlhausen announced a December workshop on “informational injury.”...more

FTC to hold workshop on informational injury

by Ballard Spahr LLP on

The FTC has announced that it will host a workshop on December 12, 2017 in Washington, D.C. to examine consumer injury in the context of privacy and data security....more

3,989 Results
|
View per page
Page: of 160
Cybersecurity

Follow Privacy Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.