Data Privacy Legislation: Part 1
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
Unique Privacy Concerns for Mobile Apps
Social Media Law Report - Who Owns Your LinkedIn Account, FTC Guidance on Social Ads, More...
As we discussed in a recent webcast, there has been a surge in litigation focused on companies’ use of Meta Pixel, which is tracking code that enables the sharing of user online activity with Facebook. Recent litigation has...more
On June 25, 2021, the Supreme Court issued an important decision on Article III standing in class actions that will have a significant impact on the way class actions are certified - and will likely scuttle numerous ...more
Seyfarth Synopsis: The second key trend from our 16th Annual Workplace Class Action Litigation Report involves rulings by the U.S. Supreme Court. Over the past few years, the Supreme Court has issued a number of rulings that...more
As we face mounting data breaches and fears over loss of privacy, the article notes that, “as the public opinion evolves and increasingly concludes that merely possessing private data puts consumers at risk, consumers may...more
Delta Air Lines scored a victory when a California federal court granted the company’s motion to dismiss a putative class action based on a data breach, primarily by arguing that its publicly posted privacy policy is not a...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
This Update highlights key legal and policy developments in cybersecurity and privacy law that may impact important trends for 2019 and beyond. A central takeaway from 2018 is that regulators in the U.S. and abroad are...more
UNITED STATES - Regulatory—Policy, Best Practices, and Standards - United States and China Renew Promise Not to Hack - On October 4, U.S. and Chinese officials agreed to not engage in targeted hacking. Per a...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more
On July 21, 2017, Judge John A. Ross of the U.S. District Court for the Eastern District of Missouri issued a preliminary approval of a settlement agreement between the owner of AshleyMadison.com and the class representing...more
The Decline and Fall of the Section 230 Safe Harbor? - 2016 was a tough year for a lot of reasons, most of which are outside the scope of this blog (though if you’d like to hear our thoughts about Bowie, Prince or...more
Back in December 2013, a U.S. magistrate issued a seemingly routine warrant in a narcotics case demanding that Microsoft turn over messages from a customer’s email account that resided on a server in Ireland. That warrant,...more
The Pennsylvania Superior Court held yesterday in Dittman v. UPMC et al. that an employer owes no common law duty under a negligence theory to use reasonable care in the collection and storage of employee information and...more
In Parts One and Two of this e-alert series, we discussed the federal Computer Fraud And Abuse Act ("CFAA") and its California corollary the California Computer Data Access And Fraud Act (CDAFA). In Part Three, we provide a...more
Part One: The Computer Fraud And Abuse Act (18 U.S.C. § 1030 Et Seq.) - Data security is top-of-mind in today's corporate world. According to The Ponemon Institute's 2015 Cost of Data Breach Study, the average total...more
Businesses in California have a number of tools with which to fight off unauthorized intrusions into their electronic data whether perpetrated by employees, former employees, disreputable competitors or random hackers....more
While the recent hack of Sony was prominent news because of the celebrity ties and potential geo-political implications, other prominent cyber-attacks over the last few months are enough to give any company pause. The January...more
One hot area of data privacy litigation over the past several years has been data breach class actions brought under the California Confidentiality of Medical Information Act (“CMIA”), which provides that a person may recover...more
In 2013, theories of injury and damages revealed themselves to be deciding factors at the class certification stage of litigation and whether plaintiffs are able to prove damages on a class-wide basis. Even in those cases...more
A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more
A federal Magistrate has recommended dismissal with prejudice of all of the cardholder plaintiffs’ claims against payment processor Global Payments, Inc. in a widely-reported data breach case....more