Mondaq USA: Privacy
McGuireWoods LLP
According to a European Commission study, 51 percent of companies that are Safe Harbor certified process human resources data of EU employees.
Fox Rothschild LLP
Scott L. Vernick was quoted in the Law360 article, "RadioShack Deal Sets Standard for Consumer Data Transfers."
Ropes & Gray LLP
A closely divided Federal Trade Commission has signaled support for the agency's recent focus on mobile device privacy.
WilmerHale
The Federal Trade Commission (FTC) recently launched a new Start with Security initiative that aims to provide businesses with resources, education and guidance on best practices for data security.
Orrick
In a prior Orrick Alert, we discussed some of the implications from the proposed data breach notification amendments in Washington State, which were largely included in the version of the bill that passed last month.
Jones Day
The court did not decide whether the NSA's program is constitutional.
Jones Day
On April 15, the National Protection and Programs Directorate ("NPPD")—a division of DHS—released written testimony for the Senate Committee on Appropriations...
Jones Day
The two agreed to increase information-sharing between the two countries in an effort to combat intellectual property theft and focus on "cross-border, cyber-enabled crime."
Borden Ladner Gervais LLP
In April 2015, the United States Securities and Exchange Commission issued updated cybersecurity guidance for registered investment companies and registered investment advisers.
BakerHostetler
Needless to say, there is no magic bullet. However, customers and providers can take the foregoing steps as part of an information governance program to help mitigate the risks of human foibles in the cloud.
Ropes & Gray LLP
As set out in revised Requirements 2.2.3, 2.3, and 4.1, "new implementations" may not use SSL or early TLS to satisfy PCI DSS requirements.
Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.
The insurance applications and underwriting questionnaires prepared in connection with cyber insurance do matter.
Jones Day
The Director noted that the number of FBI investigations related to computer intrusions has increased by 80 percent since 2002, and that to counter this threat, the FBI requested a $10M budget increase to support its cyber efforts.
Jones Day
On March 23, the Privacy and Civil Liberties Oversight Board issued a request for public comment on the privacy and civil liberties implications of the federal government's counterterrorism activities.
Jones Day
On April 1, President Obama issued Executive Order 13964, in which he declared a national emergency relating to foreign "malicious cyber-enabled activities."
Orrick
The Connecticut Supreme Court on Monday affirmed the lower courts' decisions in Recall Total Information Management, Inc. v. Federal Ins. Co., a case on which we have previously commented.
BakerHostetler
The EMV liability shift is coming. Sounds ominous, but what does it really mean?
McGuireWoods LLP
Last week, the FTC launched a new resource, www.identitytheft.gov, designed to help victims report and recover from identity theft.
Fox Rothschild LLP
Scott L. Vernick was featured in the 6 ABC report, "Drone Usage, Popularity Is on the Rise."
Reed Smith
Cybersecurity and data breach risk were prominent subjects at the 35th Annual Ray Garrett Corporate and Securities Law Institute held on April 30, 2015 at Northwestern Law School in Chicago.
Latest Video
Most Popular Recent Articles
Butler Snow LLP
A putative class action lawsuit against Google, alleging that the technology giant invaded the privacy of its Google Wallet customers by sharing their personal information with third-party...
Jones Day
On April 15, 2015, the Payment Card Industry Security Standards Council released Version 3.1 of the Payment Card Industry Data Security Standard.
Holland & Knight
Cybersecurity is everywhere in the news today because hackers have been very successful in exploiting human weaknesses across a broad array of industries.
Holland & Knight
The New York State Department of Financial Services recently issued a report, analyzing the cybersecurity requirements that financial institutions put in place for their third-party service providers.
Bradley Arant Boult Cummings LLP
In light of recent changes to the ABA Model Rules of Professional Conduct, what are a lawyer’s ethical duties arising from new technology? And what should a lawyer know about technology?
Reed Smith
In separate cases, one Illinois federal judge issued several rulings favorable to Telephone Consumer Protection Act (TCPA) plaintiffs on key issues.
Orrick
The Middle District of Tennessee recently issued a key decision in the ongoing Genesco, Inc. v. Visa U.S.A., Inc. data breach litigation.
Troutman Sanders LLP
Advertising agency Campbell-Ewald Co. began sending text messages through its subcontractor, MindMatic LLC, in 2006 as part of a Navy-approved effort to tap new technologies in recruitment campaigns, the company says.
Troutman Sanders LLP
The Guide is broadly applicable to anyone that is a HIPAA Covered Entity or Business Associate as well as Medicare Eligible Professionals under the CMS Electronic Health Record (EHR) Incentive Programs.
McGuireWoods LLP
While DPS issues can arise in many M&A transactions, the appropriate level of focus on DPS is usually driven by the specifics of the underlying transaction.
Article Search Using Filters
Related Topics
Popular Authors
Popular Contributors
Tools
Font Size:
Translation
Channels
Mondaq on Twitter
Partners