News & Analysis as of

Cybersecurity Privacy Concerns Data Security

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Paul Hastings LLP

NFL Draft Provides Wake-Up Call on Protecting Confidential Information While Working Remotely

Paul Hastings LLP on

Last week’s NFL draft highlighted more than the accomplishments of athletes at the combine or on the field. While there was extensive coverage of the merits of each player, one of the major headlines coming out of the draft...more

HaystackID

The Great Encryption Standoff: Apple vs. the UK’s Surveillance Push

HaystackID on

In the quiet corridors of Apple’s headquarters, executives face a decision that could reshape the future of digital privacy for billions of users worldwide. The catalyst? A controversial order from the United Kingdom’s...more

J.S. Held

Data Privacy for the Future: Strategies to Limit Digital Risk and Liability

J.S. Held on

Your perspectives and perceptions towards a problem drive your approach to solving that problem. Managing data privacy challenges are no different. Therefore, to address today’s issues, it is a worthwhile exercise to review...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #427 – Ahead of the TikTok Ban, Users are Turning to Another Chinese App with Similar Privacy Concerns – What you...

TikTok users are seeking alternate platforms to share and view content as the U.S. is set to ban the popular social media app on January 19, 2025. Instead of turning to U.S.-based companies like Facebook or Instagram, users...more

Sheppard Mullin Richter & Hampton LLP

Cybersecurity Labeling Program to Increase Transparency of IoT Device Security

In response to a constantly-evolving cyber threat landscape, the Biden Administration recently announced the launch of a new cybersecurity labeling program – the U.S. Cyber Trust Mark program – in an effort to enhance...more

Spilman Thomas & Battle, PLLC

Decoded - Technology Law Insights, Issue 21, 2022

EU and U.S. Agree to New Data-Sharing Pact, Offering Some Respite for Big Tech “For over a year, officials on either side of the Atlantic have been hashing out a deal to replace the so-called Privacy Shield.” Why this...more

Womble Bond Dickinson

Amazon Sidewalk Shares Your Home WiFi with the Neighbors

Womble Bond Dickinson on

We always suspected that the Amazon Echo resting quietly in your family room was more insidious than it seemed. Now we have confirmation. We know that the Echo can hear us.  We also know that it records private conversations...more

Womble Bond Dickinson

The UK Sets Out to Prove That You Are You

Womble Bond Dickinson on

There is a reason we don’t all have a definitive digital identifier. I am describing a digital ID to be used by everybody for everything we do online – any bank would know you anywhere and know what funds it could give...more

Sheppard Mullin Richter & Hampton LLP

Developing a Right-Sized Privacy Program

Later this week, January 28, 2021 will mark International Privacy Day: a day corporations release educational efforts around privacy and data protection. There are many reasons to approach privacy proactively in 2021: (1)...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #249 – Use of Personal Assistants While Working from Home

I continue to be quite surprised at the lack of understanding that people have about personal assistants such as Alexa and Echo. It seems logical to me that when you yell out “Alexa, turn on the lights!”...more

Farella Braun + Martel LLP

Zoom Successfully Addresses New York’s Privacy and Security Concerns

A few weeks ago on this blog, we addressed some of the legal issues that have arisen for Zoom, as it becomes a significant part of American daily life during the COVID-19 pandemic. Among those legal issues was an inquiry...more

Akin Gump Strauss Hauer & Feld LLP

Summary of FTC COPPA Workshop – Key Issues and Takeaways

On October 7, the Federal Trade Commission (FTC or the “Commission”) brought together privacy and technology stakeholders for a public workshop aimed at informing updates to regulations promulgated under the Children’s Online...more

International Lawyers Network

The Role of Artificial Intelligence

The use of artificial intelligence (AI) in the fashion and beauty industries — and the marketing of the same — has steadily gained traction over the last few years and it’s not hard to see why. AI provides a myriad of...more

Jones Day

Jones Day Global Privacy & Cybersecurity Update | Vol. 21

Jones Day on

UNITED STATES - Regulatory—Policy, Best Practices, and Standards - NIST Evaluates Advances in Face Recognition Software - On November 30, 2018, the National Institute of Standards and Technology ("NIST") published a...more

Foley Hoag LLP - Security, Privacy and the...

MaHIMA Webinar: "Alexa, What Medication Am I Taking?" (Presentation)

"Open the pod door, HAL" • Commercial voice-activated intelligent personal assistants from Amazon, Apple, Google, and Microsoft, among others, are growing in popularity. • A report from NPR and Edison Research states...more

Bradley Arant Boult Cummings LLP

Technology at a Price: Risks With Using Biometric Scanning in the Workplace - Labor & Employment Newsletter

Parents who took their children to Disney World in recent years may have been surprised when Disney “cast members” asked the young princes and princesses to place a finger on a scanner before entering the parks. Biometric...more

Sheppard Mullin Richter & Hampton LLP

Pass It On: Locks Don’t Prevent Leaks

It is common for individuals to see the “padlock icon” on their browser bar when visiting a website, and assume they are safe. Sadly, this assumption is no longer valid. As we approach Data Privacy Day (January 28, 2019) many...more

Epiq

Internet of Things

Epiq on

Regulating the Internet of Things (“IoT”) is a highly debated topic because it is hard for lawmakers to keep up with evolving technology. Simply put, IoT refers to a system of connected devices that can retain, analyze, and...more

McManis Faulkner

Hackers are Vampires - Keep Them from Feeding on Your Private Information

McManis Faulkner on

According to myth, vampires can only enter your home if you let them in. Hackers, the vampires of cyber-world, are out there, waiting for you to ‘invite’ them in so they may feed on your private information. There is no...more

Bass, Berry & Sims PLC

Privacy Perils: Beware the Perpetually Curious Shoulder Surfers

Bass, Berry & Sims PLC on

Given the volume of reporting on the data security risks posed by hackers and other bad actors online, it can be easy to overlook the "visual privacy" risks we encounter every day in the real world. As any "perpetually...more

Proskauer - New Media & Technology

Unanticipated Mobile Data Leaks Remain an Ongoing Issue

There has been a lot of attention in the media lately with respect to the Facebook/Cambridge Analytica issue and its fall-out (including today’s coverage of the announcement that Facebook suspended almost 200 apps pending a...more

A&O Shearman

Privacy and Cybersecurity Checklist When Designing a Family Office

A&O Shearman on

As family office executives set up a family office or review an existing family office, it is important to make sure the privacy and cybersecurity concerns are addressed and the governance and information security...more

Robinson+Cole Data Privacy + Security Insider

World Energy Council warns utility industry of advanced malware

The World Energy Council recently warned the utility industry that one of the top threats to the energy sector is advanced malware attacks. The warning noted that the utility sector is vulnerable because of the size of the...more

Robinson+Cole Data Privacy + Security Insider

Backdoors to encryption protocols vs. cybersecurity: weighing priorities in the U.S. and abroad

With the revelations that the Paris and San Bernardino attackers used encrypted communications to recruit, communicate and plan their attacks, the U.S. government is again pushing the tech industry to provide it backdoor...more

Littler

Recent Amendments to Security Breach Notification Laws Further Complicate Breach Notification for Employers

Littler on

It is not a matter of "if" but "when" an employer will be required to notify employees of a security breach.  Forty-seven states require employers to notify employees when defined categories of personal information, including...more

42 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide