Latest Publications

Share:

4 Questions to Consider When Dealing With Children’s Data in the US

The FTC and many state attorneys general aggressively monitor apps, websites, and internet-connected products for COPPA compliance. In the United States, collecting data directly from children under 13 years of age is...more

FTC Hearings Discuss the State of Data Security in the 21st Century

Ninth hearing on Competition and Consumer Protection in the 21st century highlights challenges of addressing persistent threats to data security. On December 11 and 12, the Federal Trade Commission (the FTC or the...more

Deep Dive on Deep Learning: FTC Considers Artificial Intelligence

Seventh Hearing on Competition and Consumer Protection considers ethical, practical, and legal dimensions of artificial intelligence and machine learning. On November 13 and 14, the Federal Trade Commission (FTC) held the...more

FTC Hearing Evaluates Regulatory Oversight of Big Data and Privacy

Sixth hearing on Competition and Consumer Protection in the 21st Century features disagreement over FTC’s enforcement priorities for consumer data. The Federal Trade Commission (FTC) recently held the sixth hearing in its...more

A New Era for Data Protection in Brazil

The Brazilian Congress has been working on a bill relating to the protection of personal data for over eight years. The Senate approved the bill, known as the General Data Protection Act (GDPA), on 10 July 2018, and the bill...more

California Consumer Privacy Act of 2018 May Usher in Sweeping Change

Businesses active in California should promptly assess whether the law applies to their practices and start planning towards compliance with the new law. Key Points: ..A sweeping new privacy law — the California...more

Boardroom Perspectives: 5 Key Takeaways on Cybersecurity

What directors really need to know about the SEC guidance that has generated so much chatter. With so much boardroom attention on cybersecurity, directors continue to focus on the Securities and Exchange Commission (SEC)...more

US Government Contractors Face New Cybersecurity Requirements

As of December 31, 2017, many United States government contractors face a new compliance requirement involving cybersecurity. This requirement will govern most new Department of Defense (DoD) contracts and, significantly,...more

New DoD Cybersecurity Requirements Go Into Effect

The DFARS final rule requires contractors to safeguard information systems and imposes investigation and reporting requirements in the case of cyber incidents. As of December 31, 2017, many United States government...more

How Can Healthcare Organizations Prepare for the Next Cyberattack?

HHS OCR issues checklist, iterative guidance in wake of WannaCry and Petya attacks; Anthem breach settlement provides additional lessons. Key Points: ..Healthcare organizations are particularly vulnerable to ransomware...more

New Executive Order on “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure”

Trump Administration’s required cybersecurity assessments provide potential for new round of public-private collaboration. The Trump Administration recently issued a much anticipated Executive Order (EO) addressing...more

Trump Administration Issues New Executive Order Focused on Strengthening Federal Cybersecurity

The Trump Administration has issued a much anticipated Executive Order (EO),“Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure,” directing federal executive agency heads to undertake various...more

Ransomware Attacks: When Is Notification Required?

Ransomware is not only a growing security threat but a potentially thorny notification issue. Ransomware is one of the most prevalent cybersecurity threats afflicting businesses today. When an attack hits, a victim...more

Keeping Your Company’s Data Safe This Tax Season

Tax-related identity theft is nothing new, but tax season 2016 took tax schemes to a new level. Last year, our cyber experts advised a large cluster of clients (public and private companies) over a period of only two...more

NYSDFS Revises Cybersecurity Rules to Accommodate Industry Concerns

The revised regulations eliminate many of the categorical requirements in the original proposal and instead adopt a more risk-based approach. On December 28, 2016, the New York State Department of Financial Services...more

Financial Institutions Await Response to Concerns Over NYSDFS’ Proposed Cybersecurity Rules

Comments submitted on the proposed regulations criticize the lack of a risk-based approach, overbroad definitions, potential extraterritorial implications, an excessive breach notification threshold and a daunting annual...more

China Issues Its First Network Security Law

The Standing Committee of the National People’s Congress of the People’s Republic of China (PRC) has introduced China’s first and comprehensive Network Security Law (also referred to as Cybersecurity Law). The law will have...more

China Issues Its First Network Security Law

The law will have far-reaching implications for parties that utilize the Internet and handle network data and personal information in the PRC. On November 7, 2016, the Standing Committee of the National People’s Congress...more

Prevent and Prepare for a Cybersecurity Breach

Hacking of organizations’ systems is becoming increasingly commonplace, even with advancements in security practices. To mitigate risk, a company must have an enterprise-level, cross-functional incident response plan that is...more

FCC Institutes New Privacy Regime for Broadband Providers and Other Telecommunications Carriers

Landmark ruling establishes a variety of new obligations, but long-term effects remain unclear. On November 2, 2016, the US Federal Communications Commission (FCC) released an order adopting new privacy rules that will...more

Mitigating Cybersecurity Risks

Hacking of organisations’ systems is becoming increasingly commonplace, even with advancements in security practices. To mitigate risk, a company must have an enterprise-level, cross-functional incident response plan that is...more

5 Preventative Steps to Manage Legal Risk Following a Cybersecurity Breach

Preparing for and rehearsing how to respond to a breach is as important as improving security systems and protocols. Hacking of organizations’ systems is becoming increasingly commonplace, even with advancements in...more

Employee Notice Provision of Defend Trade Secrets Act – Immediate Action Needed

New law requires employers to give notice of immunity rights in order to recover enhanced damages. President Obama signed the Defend Trade Secrets Act (DTSA) into law on May 11, 2016. Certain relief available to...more

FCC Proposes Sweeping Broadband Privacy Rules

Broadband Internet access service providers would face a new, top-to-bottom consumer privacy regime. Twelve months after the US Federal Communications Commission (FCC) imposed common-carrier telecommunications rules on...more

Privacy Shield is on its Way

On March 17, 2016, the Civil Liberties Committee convened to discuss whether the Privacy Shield framework that will replace Safe Harbor provides adequate protection to the data of EU citizens. A number of experts were...more

66 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide