News & Analysis as of

Privacy General Business

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:

Planning for Cybersecurity Risks in M&A Transactions

by K&L Gates LLP on

A glance at any media outlet shows that cyber risk is pervasive and increasing, and that virtually no company is immune to a cyber incident. Almost all companies and associations collect and store some type of data, whether...more

FTC Seeks Public Comment on Sears’ Petition to Modify Order Regarding Software Tracking Application

by Balch & Bingham LLP on

The FTC is seeking public comment on a petition by Sear’s to reopen and modify its 2009 consent order to restrict the broad definition of “tracking application”. In 2009, the FTC issued an order settling charges that Sears...more

Brexit: IoT to the rescue?

by Womble Bond Dickinson on

For retailers, speed and efficiency in supply chains are paramount. With the possibility of a "hard" or "no deal" Brexit, retailers must adapt to a new operating environment. The UK government is exploring the potential for...more

10 Steps to GDPR Compliance - Privacy Matters

by Katten Muchin Rosenman LLP on

Privacy Matters examines the General Data Protection Regulations (GDPR) and practical tips on achieving compliance in advance of its implementation on May 25, 2018. This issue provides 10 steps that businesses and legal...more

The evolving cyber insurance market: How IT companies, financial institutions, and other nontraditional players can offer cyber...

by Hogan Lovells on

In this hoganlovells.com interview, Hogan Lovells counsel Robert Fettman discusses the evolution of cyber insurance, the level of regulatory oversight applied to covered entities, and ways that noninsurance companies can...more

Proposed Ohio Law May Encourage Businesses to Adopt Cyber Standards

Recently proposed legislation in Ohio could provide businesses with special protection from lawsuits in the event of a hack under certain circumstances. Senate Bill 220 would shelter businesses that have been proactive in...more

National security reviews 2017: A global perspective — United Kingdom

by White & Case LLP on

National security interventions have, with one exception, involved defense considerations - Unlike many other jurisdictions, acquisitions in potentially sensitive industries do not, as a matter of course, require parties...more

Defending The Business-To-Business Data Breach Lawsuit

by Ellis & Winters LLP on

Hardly a day goes by without a headline announcing that a prominent company has fallen victim to a data breach. These headlines are followed, almost inevitably, by reports of class action lawsuits filed by consumers whose...more

U.S. Employs Rarely Used Tool to Probe China IP Practices

As President Trump visits China, U.S. is investigating a longstanding issue in bilateral relationship—technology transfer/intellectual property requirements—that has potential implications for trade. U.S. business and...more

How Employers Can Become Experts at Data Breaches: HR service providers

by Bryan Cave on

A large portion of the data breaches that occur each year involve human resource related issues. This includes situations in which HR data was lost, employees were inadvertently responsible for the loss of information about...more

SEC Cyber Watch: Finally, New Guidelines for Breach Disclosures?

The U.S. Securities and Exchange Commission has signaled that it expects to issue updated guidelines on reporting cybersecurity incidents. “I think this issue is important enough, wide-ranging enough that we should tackle...more

UK proposal for three-tier fee model for data controllers from May 2018

by Ropes & Gray LLP on

With the deadline for enforcement of the GDPR looming closer, many data controllers had believed that, with the abolition of the requirement to notify the Information Commissioner’s Office (ICO) of their data processing...more

Congress to Consider a Broad Overhaul of CFIUS

by Morrison & Foerster LLP on

On November 8, 2017, bipartisan coalitions in both the House and the Senate announced new legislation that would substantially overhaul current law governing the Committee on Foreign Investment in the United States (CFIUS)...more

SEC Enforcement Division Priorities Pertaining to Retail Investors and Cybersecurity

by Dechert LLP on

In a keynote speech to the Securities Enforcement Forum on October 26, 2017, U.S. SEC Division of Enforcement (Division) Co-Director Stephanie Avakian emphasized the protection of retail investors and cybersecurity as...more

The Data Report Episode 21: Employee Negligence Related to Data Security

by Bilzin Sumberg on

Module Six: Workplace Data Security (Part II) Litigation attorney Jay Ward discusses employee negligence related to data security in this episode of The Data Report. He highlights the importance of incorporating good data...more

Auto Dealerships And What Dealerships Can Do

by Jackson Lewis P.C. on

Automobile dealerships’ cybersecurity vulnerabilities can drive away customers, according to a survey by auditing firm Total Dealer Compliance. Automotive News said the survey of 200 dealerships in five states found...more

Ninth Circuit Confirms Privacy Exclusion Bars TCPA Claims

by Carlton Fields on

Claims under the Telephone Consumer Protection Act (TCPA) present numerous issues for insurance companies and policyholders. Because TCPA claims lend themselves to class action suits, the potential exposure can be...more

How Employers Can Become Experts at Data Breaches: Incident Response Plans

by Bryan Cave on

A large portion of the data breaches that occur each year involve human resource related issues. This includes situations in which HR data was lost, employees were inadvertently responsible for the loss of information about...more

Informing Illinois Newsletter - November 2017

by Hinshaw & Culbertson LLP on

When Records Are Not Reasonably Accessible - The Illinois Freedom of Information Act (FOIA) was amended in December, 2014 to provide that a public body is not required to copy a public record that is published on the...more

Cybersecurity Best Practices — How General Counsel Can Prepare For The Worst

by Cozen O'Connor on

Take note GCs: The question is not if you will have to respond to a cybersecurity incident—the question is when. That was the message from speakers and panelists at the Association of Corporate Counsel’s annual meeting this...more

Privacy Shield Gets Passing Grade

In reviewing the first year of implementation of the European Union-United States Privacy Shield, the Commission to the European Parliament and the Council declared it “adequate.”...more

The First Step to GDPR Compliance Is Reintroducing Yourself to the Individual

by NAVEX Global on

The European Union’s looming new General Data Protection Regulation will be one of the biggest GRC issues companies face in 2018. Its extraterritorial reach is sweeping, potential penalties are high, and conceivable...more

FTC Provides Guidance on Reasonable Data Security Practices (Part III of III)

by Patrick Law Group, LLC on

This is the third in a series of three articles on the FTC’s Stick with Security blog. Over the past 15 years, the Federal Trade Commission (FTC) has brought more than 60 cases against companies for unfair or deceptive...more

Second Circuit Refuses to Rehear Consent Revocation Case

In the TCPA lawsuit, Reyes v. Lincoln, filed in 2015, Reyes leased a new luxury Lincoln and provided his cell phone number in his lease application. The application included a provision that Reyes “expressly consent[ed]” to...more

Business Email Compromise: What It Is and What You Can Do

by Snell & Wilmer on

Business email compromise (“BEC”) is a type of cyberattack that is increasing at an alarming pace. The U.S. Federal Bureau of Investigation estimated in a May 2017 alert that global losses due to BEC scams totaled more than...more

3,865 Results
|
View per page
Page: of 155
Cybersecurity

Follow Privacy Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.