News & Analysis as of

Encryption

State Data Breach Notification Statutes: 2017 Year in Review

by Fisher Phillips on

Continuing a trend in the last few years, in 2017, eight states amended their security breach notification laws to expand definitions of “personal information”, specify the timeframe in which notification must be provided,...more

Forever 21 Latest Retailer to Suffer Credit Card Breach

Forever 21 has warned customers who used a credit card at any of its stores between March and October 2017 that their credit card may have been compromised....more

Latest OCR Cybersecurity Newsletter Tackles Mobile Devices

The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) released its October Cybersecurity Newsletter last week with a focus on mobile devices. Given the amount of work conducted on mobile devices...more

FTC Provides Guidance on Reasonable Data Security Practices (Part III of III)

by Patrick Law Group, LLC on

This is the third in a series of three articles on the FTC’s Stick with Security blog. Over the past 15 years, the Federal Trade Commission (FTC) has brought more than 60 cases against companies for unfair or deceptive...more

Privacy & Cybersecurity Update - October 2017

In this month's edition of our Privacy & Cybersecurity Update, we examine the European Commission's annual review of the Privacy Shield, a potential threat to the European Union's "standard contractual clauses," a push by...more

Use This Checklist to Assess Your Cybersecurity Preparedness

by Steptoe & Johnson PLLC on

When was the last time your organization did an assessment of its cybersecurity preparedness? October was designated as Cybersecurity Awareness Month. Even though October is coming to a close, it is important to continue your...more

The Data Report Episode 19: Data Security Regulations in China & Russia

by Bilzin Sumberg on

Module Five: International Law (Part IV) In this episode of The Data Report, Litigation attorney Jay Ward discusses two other big players in the international data security scene, Russia and China. Jay begins by discussing...more

Building a Health App? Part 6: HIPAA and Other Privacy and Security Considerations

Consumers are increasingly turning to health apps for a variety of medical and wellness-related purposes. This has in turn caused greater amounts of data—including highly sensitive information—to flow through these apps....more

FTC Provides Guidance on Reasonable Data Security Practices (Part II of III)

by Patrick Law Group, LLC on

This is the second in a series of three articles on the FTC’s Stick with Security blog... Over the past 15 years, the Federal Trade Commission (FTC) has brought more than 60 cases against companies for unfair or deceptive...more

Significant WiFi vulnerability exposed

What is the problem? Belgian researchers have published information about a vulnerability in the most popular WiFi encryption protocol that makes monitoring of all communications possible, except those communications that...more

FTC’s “Stick With Security” #4: Store Sensitive Information Securely & Protect It During Transmission

by Snell & Wilmer on

On August 18, 2017, the FTC released its fourth “Stick with Security” principle, which explained the importance of keeping confidential data only when needed, and securely storing the data when it must be kept. To that end,...more

Avoiding Glittering Generalities in Selecting eDiscovery Software – Considering Security: eDiscovery Best Practices

by CloudNine on

...The security of data is fast becoming one of the most prominent and visible areas of concern in the selection of eDiscovery software solutions. With public examples of data security failures increasing in regularity and...more

Equifax and SEC Breaches Show You Can’t Hide from Hackers

by Wilson Elser on

Cited as one of the largest incidents of its kind in history, the recent Equifax data breach underscores that every business and individual is vulnerable to theft of sensitive information by unscrupulous hackers. In less than...more

FTC’s ‘Stick with Security’ Series Carries On

Continuing with its “Stick with Security” series of blog posts for businesses, the Federal Trade Commission worked its way through several more items found in the “Start with Security” guidance....more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

As expected, the Fed left interest rates at current levels yesterday, though it hinted at another December rate hike and officially unveiled the start of its bond wind-down next month....more

Beyond Care, Custody, and Control: Data Security Best Practices for the Transportation and Logistics Sector

by Benesch on

The receipt, storage, and handling of sensitive shipper data occurs, often frequently and in real-time, alongside the flow of goods. Commercial shippers are well aware of the supply chain security risk to the materials and...more

Time to Review Your Encryption Classifications – BIS Updates Primary Purpose Exemption

by Kelley Drye & Warren LLP on

The Bureau of Industry and Security (BIS) recently published changes to its encryption regulations in an effort to simplify the text and focus the scope of controls. The biggest change is that Note 4, the “primary purpose...more

Delaware Passes Amendment to Data Breach Notification Law

by Wilson Elser on

For the first time since 2005, Delaware has amended its data breach notification law (DE Code Tit. 6, 12B-101-104). Whereas Delaware’s previous law only required companies to notify affected residents of a breach “as soon as...more

Hogan Lovells supports Vodafone Group in its 2017 Law Enforcement Disclosure Statement

by Hogan Lovells on

Earlier this year Vodafone Group (“Vodafone“) published an update to its Law Enforcement Disclosure Statement (“Statement“), including an annexe summarizing law enforcement and encryption laws in 28 countries. The Statement...more

DOJ Obtains Price-Fixing Guilty Plea

by Jones Day on

Texas-based e-commerce company Zaappaaz, Inc.—doing business as WB Promotions, Inc., Wrist-Band.com, and Customlanyard.net—and its president both agreed to plead guilty to conspiring to fix prices for customized promotional...more

Get Ready for New Data Transfer Security Standard for POS Systems

by Bryan Cave on

Retailers are still feeling the pain from implementing EMV-compliant POS systems. An article by Kate Fitzgerald in the PaymentsSource Technology newsletter (August 8, 2017) caught our eye....more

German Government Tightens Rules for German Investment Control Covering M&A Transactions by Foreign Acquirers

by White & Case LLP on

On July 18, 2017, the Ninth Regulation Amending the Foreign Trade and Payments Regulation (Neunte Verordnung zur Änderung der Außenwirtschaftsverordnung ("AWV")) entered into force. The federal government is thus responding...more

Alert: Export Control Reminder: Semi-Annual Encryption Reporting Deadline 8/1/17

by Cooley LLP on

August 1, 2017, is the deadline for submitting semi-annual reports for certain ENC Restricted encryption items exported or re-exported between January 1 and June 30, 2017, pursuant to paragraphs (b)(2) and (b)(3)(iii) of...more

Multi-level Encryption Patent Survives § 101 Challenge in District Court

by Knobbe Martens on

On May 23, 2017, the District Court for the Eastern District of Virginia (“District Court”) denied a motion for summary judgment that the patent claims asserted in a lawsuit brought by TecSec, Inc. (“TecSec”) are invalid...more

Cybersecurity Steps Every Lawyer Should Consider

All lawyers face technology threats, ranging from the inconvenient to practice-threatening disasters. From unauthorized access, lawyers risk having confidential information stolen, destroyed or made inaccessible. Hackers...more

340 Results
|
View per page
Page: of 14
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.