Everyone loves a good courtroom drama. So just imagine this pitch: henchmen of an evil dictator hack their way into a movie studio computer system. Once inside, they steal the most sensitive personal information of the...more
The general definition of “personal information” used in the majority of statutes is: An individual’s first name or first initial and last name plus one or more of the following data elements: (i) Social Security number, (ii)...more
Not only is it “March Madness” time, it is also prime tax return filing time. That means that the email scammers are out in full force as well.
In the last 10 days, we have seen a marked uptick in what are called...more
California Attorney General Kamala Harris has released a report of the data breaches that have been reported to her office from 2012 until 2015. Although the California data breach notification law took effect in 2003,...more
Receently, we reviewed the staggering numbers in California Attorney General Kamala Harris’ 2016 Data Breach Report.
In addition to providing a comprehensive analysis of four years of data breaches, the report provides...more
Remember this? -
“Wetware” – coder slang for biological life forms (i.e., people) – is the weak link in most companies’ data security protections, according to a new data security report issued by the Association of...more
The years-long saga of the Federal Trade Commission’s suit against Wyndham Hotels over data breaches that occurred at least as early as April 2008 is finally coming to an end with a proposed settlement filed today with the...more
The recent data breach of Hong Kong-based electronic toy manufacturer VTech Holdings Limited (“VTech” or the “Company”) is making headlines around the world for good reason: it exposed sensitive personal information of over...more
For the first Tuesday in November, we have 10 easy steps to make sure that your data breach incident response planning is viewed from that pesky point of view of a litigator....more
11/3/2015
/ Cyber Incident Reporting ,
Cybersecurity ,
Data Breach ,
Data Breach Plans ,
Data Privacy ,
Data Protection ,
Data Security ,
Email Policies ,
Personally Identifiable Information ,
Popular ,
Tone At The Top ,
Training
For your convenience, a short list of JD Supra writers covering the myriad issues raised surrounding Cybersecurity, date privacy and protection, and related matters. ...more
Rather than our usual Privacy Monday “bits and bytes,” we have a breaking story relating to the ongoing Wyndham/FTC saga.
Today, Wyndham Worldwide Corp. lost a critical round in the Third Circuit. Anticipated since...more
8/25/2015
/ Best Practices ,
Credit Cards ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Security ,
Federal Trade Commission (FTC) ,
FTC Act ,
FTC v Wyndham ,
Personally Identifiable Information ,
Section 5 ,
Unfair or Deceptive Trade Practices ,
Wyndham
Target has announced that it has entered into a settlement with Visa to resolve claims of issuers of Visa credit and debit cards arising from Target’s November 2013 data breach. The proposed settlement will pay issuers of...more
Seventh Circuit Rules Consumers Have Standing to Sue in Neiman Marcus Payment Card Data Breach Case -
In Remijas v. Neiman Marcus Group, LLC, the Seventh Circuit reversed a district court decision dismissing consumer...more
7/22/2015
/ Appeals ,
Article III ,
Clapper v. Amnesty International ,
Class Action ,
Data Breach ,
Debit and Credit Card Transactions ,
Imminent Harm ,
Neiman Marcus ,
Retailers ,
Spokeo v Robins ,
Standing
Once again, data breaches and hacks are front and center, so here are three stories you should know about to start your week....more
7/21/2015
/ Auto-Dialed Calls ,
Breach Notification Rule ,
Credit Monitoring ,
Cyber Crimes ,
Data Breach ,
Encryption ,
FCC ,
Hackers ,
Personally Identifiable Information ,
Robocalling ,
TCPA ,
UCLA ,
UCLA Medical Center
Welcome to the dog days of summer 2015. Three privacy & security bits and bytes to start your week (if you are reading this on vacation … good for you!)
1. ICYMI: Massive Data Breach at OPM Claims Victim — The Director...more
7/14/2015
/ China ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Cybertheft ,
Data Breach ,
Data Protection ,
Office of Personnel Management (OPM) ,
Personally Identifiable Information ,
Russia ,
Third-Party ,
United Nations
It’s appropriate that the “boys of summer” feature prominently in today’s post.
Strike three for the St. Louis Cardinals?
On another summer Privacy Monday in 2014, we made note of a reported hack into the Houston...more
In the absence of any meaningful moves in Congress to enact uniform data breach notification, the states continue to make adjustments to existing laws to better protect affected residents in their states.
Connecticut is...more
The news continues to pour in about the two-part massive hack into the federal government’s Office of Personnel Management (OPM) and the compromise of personal information of millions of present and former federal...more
As an update to our blog post, “Data Breach Affects Millions of Current and Former Government Workers”, a union representing federal workers is now claiming that the hack may be worse than originally feared. Yesterday, the...more
Key takeaway: The insurance applications and underwriting questionnaires prepared in connection with cyber insurance do matter.
Cyber security, and cyber insurance, have dominated the industry headlines for several...more
Another federal agency has weighed in with “guidance” on cybersecurity preparation and breach response. The Department of Justice (DOJ) is the latest to issue guidance on how companies should respond to data breaches. The...more
State legislatures are not waiting for Congressional action on a national data breach notification standard.
Montana — Montana has amended its 10-year old breach notification law (see Mintz Matrix) to expand the...more
By now (unless you have been under a snow drift), you have likely heard about the apparent intrusion into a database at the nation’s largest health insurer, Anthem, Inc. Rather than reiterate the facts as currently known...more
2/11/2015
/ Anthem Blue Cross ,
Corporate Counsel ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Health Insurance ,
Insurance Industry ,
Personally Identifiable Information ,
Popular ,
Risk Mitigation
Welcome to the first Privacy Tuesday of 2015!
We hope that you enjoyed our 12 Days of Privacy series (and if you missed it, they are all linked in the right column of the blog…).
Three things that you should...more
1/6/2015
/ Board of Directors ,
C-Suite Executives ,
Chick-Fil-A ,
Cybersecurity ,
Data Breach ,
Experian ,
Federal Trade Commission (FTC) ,
Hackers ,
PHI ,
Privacy Laws ,
Privacy Policy ,
Snapchat
sing it with me now….
Five Golden Rules…….(well, five new privacy laws/requirements)
There are five significant new privacy laws/amendments that will be effective as of New Year’s Day — January 1, 2015 — and...more