Mondaq USA: Privacy
Strasburger & Price, L.L.P.
Data breaches are on the rise. So are the number of breach-related class actions.
Fox Rothschild LLP
This blog post is the third installment of a six-part series discussing the best practices relating to cyber security. The first two blog posts discussed the best practices for preparing a business in case of a cyberattack.
Wilson Elser Moskowitz Edelman & Dicker LLP
Continuing the trend of states expanding their data privacy laws, companies that store and transmit personal information about residents of Nevada, Washington and North Dakota must now take note of additional data-element definitions and notice requirements following data breach incidents.
Wilson Elser Moskowitz Edelman & Dicker LLP
The California Police Chiefs Association expressed its concern that SB 178 will hamper law enforcement efforts.
Wilson Elser Moskowitz Edelman & Dicker LLP
During the 2013 holiday season, Neiman Marcus, like many other retailers, discovered that its payment card systems had been compromised and customers' credit and debit card information was potentially stolen.
Duane Morris LLP
The Ashley Madison site declares on its home page that "Life is short. Have an affair." The home page goes on to state that "Ashley Madison is the world's leading married dating service for discreet encounters."
Foley Hoag LLP
Data breaches are often followed by class action suits in which the affected individuals seek damages.
Fox Rothschild LLP
HIPAA does not protect animals' health information – it applies to the protected health information (or PHI) of an "individual", defined as "the person who is the subject of" the PHI.
Reed Smith
On Friday, July 24, the United States Judicial Panel on Multidistrict Litigation issued an Order consolidating in the D.C. Circuit Court of Appeals three timely petitions for review of a July 10, 2015 Declaratory Ruling and Order of the Federal Communications Commission (FCC).
Foley Hoag LLP
A key distinguishing feature of U.S. data privacy laws is their patchwork nature.
Wilson Elser Moskowitz Edelman & Dicker LLP
A recall notice to fix critical control software on 1.4 million vehicles should raise concerns for companies, brokers and insurers across several business lines.
McDermott Will & Emery
Remember KITT? KITT (the Knight Industries Two Thousand) was the self-directed, self-driving, supercomputer hero of the popular 1980s television show Knight Rider.
Seyfarth Shaw LLP
The question for many telemarketers and their ilk then became how much human intervention would be enough to remove a semi-automated dialing mechanism, or SMS message platform from the TCPA's purview.
FTI Consulting
The price of disks has been dropping for years. According to Gartner, the cost of disk storage per terabyte has been falling, too.
Seyfarth Shaw LLP
In any case involving a data breach of customer or employee information, the first line of defense for the defendant is to assert that the plaintiff(s) lack standing to bring suit.
Stoll Keenon Ogden PLLC
Data breaches at government agencies and mega companies lead daily news cycles.
Fox Rothschild LLP
On July 20, 2015, in Remijas v. Neiman Marcus Group, LLC, No. 14-3122 (7th Cir. 2015), the Seventh Circuit held that the United States District Court for the Northern District of Illinois wrongfully dismissed a class action suit brought against Neiman Marcus after hackers stole their customers' data and debit card information.
BakerHostetler
Evidence collected by the U.S. Department of Homeland Defense (DHS) shows that cyberattacks on key energy infrastructure – particularly the electric system – are increasing in both sophistication and frequency.
Troutman Sanders LLP
The appellate decision is styled Remijas et al. v. The Neiman Marcus Group LLC, Case No. 14-3122.
Fox Rothschild LLP
This is the second installment in a six-part discussion on the best practices to prevent a cyberattack. The first part discussed four critical steps to prepare a business in the case of a cyberattack.
Latest Video
Most Popular Recent Articles
Sheppard Mullin Richter & Hampton
Unless you've been living in the 18th century you are aware that the records of approximately 4 million current and former federal employees were compromised as a result of a recently disclosed network breach...
Orrick
There are too many differences between cyber policies to cover in one blog post, and the market, still in its youth, is rapidly evolving.
Davis & Gilbert
The Federal Communications Commission recently announced that it will be issuing a package of rulings on 21 long-standing petitions concerning the Telephone Consumer Protection Act.
Holland & Knight
Cyber liability insurance policies vary widely, with dramatic difference in coverage.
Jones Day
The U.S. Department of State, Directorate of Defense Trade Controls ("DDTC") recently published proposed revisions to the International Traffic in Arms Regulations ("ITAR") to add or change a number of key definitions.
Klein Moynihan Turco LLP
Last month, a working group for the Internet Corporation for Assigned Names and Numbers ("ICANN") issued a report that contemplates whether the owners of certain commercial websites should be forbidden from using WHOIS proxy services to hide their identities.
Orrick
On Feb. 3, the Securities and Exchange Commission (SEC) and the Financial Industry Regulatory Authority (FINRA) each released reports regarding cybersecurity issues for brokerage and advisory firms...
Foley Hoag LLP
Concluding our three-part analysis of the White House’s first Summit on Cybersecurity and Consumer Protection
Jones Day
In our last post we addressed cyber coverage for fines and penalties imposed by governmental authorities.
Kilpatrick Townsend & Stockton LLP
Cyber risk events – hacking and other forms of data privacy breach – unquestionably have hit the big time.
Article Search Using Filters
Related Topics
Mondaq Advice Center (MACs)
Popular Authors
Popular Contributors
Tools
Font Size:
Translation
Channels
Mondaq on Twitter
Partners