Companies using Google Analytics (“Analytics”) or similar platforms may be interested in recent rulings of several European data protection authorities that found Analytics data transfers to the U.S. to be non-compliant with...more
In a decision that could throw the debt-collection industry into turmoil, on April 21, 2021, the Eleventh Circuit Court of Appeals released its opinion in the case Hunstein v. Preferred Collection & Mgmt. Servs., Inc., No....more
On January 15, the Court of Justice of the European Union’s (CJEU) Advocate General (AG) Manuel Campos Sánchez-Bordona delivered his Opinion on four references for preliminary rulings on the topic of retention of and access...more
As the issues surrounding data protection become increasingly complex, in recent years the advisory guidelines (Guidelines) issued by the Personal Data Protection Commission of Singapore (PDPC) have been invaluable in guiding...more
On 1 February, 2019, the National Information Security Standardization Technical Committee issued an amended version of the GB/T 35372-2017 Information Technology – Personal Information Security Specification for public...more
The EU’s General Data Protection Regulation (GDPR), which went into effect in May 2018, requires companies to implement appropriate security measures when handling personal data....more
The Federal Bureau of Investigation (FBI) released a Public Service Announcement on August 2, 2018, entitled “Cyber Actors Use Internet of Things Devices as Proxies for Anonymity and Pursuit of Malicious Cyber Activities,”...more
With the growth of technology and the development of the fintech market, an unprecedented amount of consumer financial data has become available. While protections through the FTC Safeguard Rule and EFTA provide certain...more
On August 18, 2017, the FTC released its fourth “Stick with Security” principle, which explained the importance of keeping confidential data only when needed, and securely storing the data when it must be kept. To that end,...more
All lawyers face technology threats, ranging from the inconvenient to practice-threatening disasters. From unauthorized access, lawyers risk having confidential information stolen, destroyed or made inaccessible. Hackers...more
The law applies to all “network operators” and introduces cybersecurity mechanisms. On November 7, 2016, the Chinese government released a draft version of the Cybersecurity Law (CSL) that will govern China’s cyberspace...more
With expenditures of over $ 3 trillion of market in the field of health care in the United States is huge. Incentives of the Federal Government for the introduction of electronic medical records resulted increasingly in the...more
In today’s world, consumer data is a huge asset for companies across all industries, in particular those in technology-focused spaces like social media, apps, wearables, and retailers involved in e-commerce. The value of such...more
The below chart constitutes a summary of the laws of various jurisdictions that govern data breach notifications...more