News & Analysis as of

Data Security Privacy Concerns Data Breach

Paul Hastings LLP

NFL Draft Provides Wake-Up Call on Protecting Confidential Information While Working Remotely

Paul Hastings LLP on

Last week’s NFL draft highlighted more than the accomplishments of athletes at the combine or on the field. While there was extensive coverage of the merits of each player, one of the major headlines coming out of the draft...more

Winthrop & Weinstine, P.A.

Holding Government Contractors Accountable: Safeguarding Taxpayer Data

Taxpayer confidentiality isn’t just a legal technicality—it’s a fundamental pillar of trust in the U.S. tax system. Federal law is designed to ensure that individuals and businesses can comply with tax obligations without...more

Jones Day

Jones Day Global Privacy & Cybersecurity Update | Vol. 21

Jones Day on

UNITED STATES - Regulatory—Policy, Best Practices, and Standards - NIST Evaluates Advances in Face Recognition Software - On November 30, 2018, the National Institute of Standards and Technology ("NIST") published a...more

Bradley Arant Boult Cummings LLP

Technology at a Price: Risks With Using Biometric Scanning in the Workplace - Labor & Employment Newsletter

Parents who took their children to Disney World in recent years may have been surprised when Disney “cast members” asked the young princes and princesses to place a finger on a scanner before entering the parks. Biometric...more

Epiq

Internet of Things

Epiq on

Regulating the Internet of Things (“IoT”) is a highly debated topic because it is hard for lawmakers to keep up with evolving technology. Simply put, IoT refers to a system of connected devices that can retain, analyze, and...more

Proskauer - New Media & Technology

Unanticipated Mobile Data Leaks Remain an Ongoing Issue

There has been a lot of attention in the media lately with respect to the Facebook/Cambridge Analytica issue and its fall-out (including today’s coverage of the announcement that Facebook suspended almost 200 apps pending a...more

Fisher Phillips

The Future Is Now: Robots And Artificial Intelligence In The Workplace

Fisher Phillips on

While it may be some time before we commute to work in flying cars or seek a transfer to our company’s lunar outpost, another concept once thought outside the realm of modern reality is now increasingly ordinary in the...more

A&O Shearman

Privacy and Cybersecurity Checklist When Designing a Family Office

A&O Shearman on

As family office executives set up a family office or review an existing family office, it is important to make sure the privacy and cybersecurity concerns are addressed and the governance and information security...more

Patterson Belknap Webb & Tyler LLP

Post-Spokeo Standing: An Evolving Landscape

Several recent federal court decisions have shed additional light on the still-unsettled question of when a plaintiff has Article III standing to sue based on a data breach or other data security or privacy event. These...more

Robinson+Cole Data Privacy + Security Insider

Centene announces search for missing hard drives containing PHI of 950,000 individuals

Centene Corporation, a health insurer headquartered in St. Louis, announced on January 25, in a press release that it is undertaking an, “ongoing comprehensive internal search for six hard drives that are unaccounted for in...more

Littler

Recent Amendments to Security Breach Notification Laws Further Complicate Breach Notification for Employers

Littler on

It is not a matter of "if" but "when" an employer will be required to notify employees of a security breach.  Forty-seven states require employers to notify employees when defined categories of personal information, including...more

BakerHostetler

NAIC Adopts Cybersecurity Bill of Rights

BakerHostetler on

The National Association of Insurance Commissioners (“NAIC”) continued its efforts to advance cybersecurity in the insurance industry when it recently adopted the Cybersecurity Bill of Rights. The Cybersecurity Bill of Rights...more

Foley & Lardner LLP

Three Trending Topics in IoT: Privacy, Security, and Fog Computing

Foley & Lardner LLP on

Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more

BakerHostetler

Colleges and Universities Are Prime Cyberattack Targets: What’s Behind the Threat?

BakerHostetler on

When it comes to cyberattack targets, many think of retailers and associated credit card transactions or customer information, or perhaps healthcare providers with their ever-increasing storage and transmission of electronic...more

Bilzin Sumberg

Alphabet Soup and Data Security

Bilzin Sumberg on

In the span of two days, mobile device users learned of two data breaches that could compromise their personal data. In one, Experian (a credit reporting agency) reported that it was hacked, potentially putting 15 million...more

Akerman LLP - Health Law Rx

“My, what beautiful eyes you have . . .” – Biometric Data and Privacy

Biometric data – obviously not in just the movies anymore. It is alive, well, and increasingly being used in our everyday society. But, on September 23, 2015, when the Office of Personnel Management revealed that fingerprint...more

Snell & Wilmer

Jury Clears UCLA Health in Lawsuit Stemming From Improper Access to PHI by Plaintiff’s Romantic Rival

Snell & Wilmer on

A UCLA employee and patient now has celebrity-level security on her protected health information (PHI) as maintained by the UCLA Health system, but a jury denied her the $1.25 million in emotional distress damages she sought...more

Ballard Spahr LLP

Federal Reserve Bank of Cleveland Reports on Online Small Business Lending Focus Groups

Ballard Spahr LLP on

The Federal Reserve Bank of Cleveland recently issued a special report on the results of online focus groups it conducted with the Federal Reserve Board “to better understand small businesses’ perceptions of online...more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity Update - August 2015

Third Circuit Affirms FTC’s Authority Over Cybersecurity: In the Wyndham case, the Third Circuit affirmed that the FTC has the authority to regulate cybersecurity under Section 5 of the FTC Act, and that the language of...more

Pillsbury - Internet & Social Media Law Blog

Ashley Madison and Coming to “Terms” with Data Protection

A recent massive data hack of an online dating site Ashley Madison once again proves that what one publishes, says, or does online, even in seemingly private forums, is never completely private. It’s also a reminder that the...more

20 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide