Latest Publications

Share:

Update on The Panama Papers

The International Consortium of Investigative Journalists (ICIJ) announced that on May 9, it will release selected data purported to be leaked or stolen from the internal records of the Panamanian law firm Mossack Fonseca....more

Update on the U.S.- EU Privacy Shield

As we previously reported, this February, United States (U.S.) and European Union (EU) negotiators announced the “U.S.-EU Privacy Shield” as a replacement to the U.S. Safe Harbor. Many U.S. companies relied on the Safe Harbor...more

WhatsApp adds end-to-end encryption

More than a billion people on the planet use online messaging service WhatsApp to send and receive messages, photo and videos and to make phone calls over the Internet. Most of WhatsApp’s users are outside the United States....more

Council of European Union and the European Parliament approve General Data Protection Regulation; U.S. Privacy Shield faces...

The General Data Protection Regulation (GDPR) was recently approved by the 28 member states of the Council of European Union. By plenary vote, the European Parliament approved GDPR on April 14. The GDPR will take effect...more

Panama law firm Mossack Fonseca faces leak of 11 million documents exposing thousands of clients

In late 2014, an anonymous source secretly leaked to a German newspaper reporter nearly four decades of confidential and proprietary data about shell companies registered by the multinational Panamian based law firm Mossack...more

Apple ordered by federal magistrate judge to assist with unlocking of San Bernardino shooter’s iPhone

Apple was ordered by a federal magistrate judge to provide “reasonable technical assistance” to federal investigators to unlock the password and access the encrypted data on a specific iPhone 5c used by Syed Farook, one of...more

2/22/2016  /  Apple , Encryption , iPhone , Terrorist Acts

Backdoors to encryption protocols vs. cybersecurity: weighing priorities in the U.S. and abroad

With the revelations that the Paris and San Bernardino attackers used encrypted communications to recruit, communicate and plan their attacks, the U.S. government is again pushing the tech industry to provide it backdoor...more

Volkswagen refuses to share emails with the U.S. Investigators, citing privacy concerns

German auto manufacturer Volkswagen (VW) is reportedly using German privacy laws to resist turning over its top executives’ internal corporate emails and other communication materials to United States attorneys general and...more

NLRB: Employers cannot block employees from recording or taking photos in the workplace

The National Labor Relations Board (NLRB), in a 2-1 decision, ruled against blanket employer policies banning employees from taking photos or recordings in the workplace. Such policies would, in the view of the NLRB, having a...more

Quincy Credit Union ATM machines compromised in skimming scheme

Hundreds of Quincy Credit Union (Massachusetts) customers reported that unauthorized ATM withdrawals were made from their accounts over the holiday weekend. Officials now believe that skimmers were placed on ATM machines in...more

Twitter Ordered by Irish Court to Disclose Information about Author of Tweet

Twitter International Company (TIC) in Dublin, Ireland was reportedly ordered by a High Court to disclose data about the source of tweets about a whistleblower. The tweets, which included allegations of insurance fraud, are...more

NIST draft report: international cybersecurity standardization needed

An interagency working group led by The National Institute of Standards and Technology (NIST) and The Department of Commerce recently published a draft report (the “Report”) recommending that the U.S. government increase its...more

Canada’s amendments to PIPEDA now largely in force

Canada’s Personal Information Protection and Electronic Documents Act (“PIPEDA”) has been amended by The Digital Privacy Act (the “DPA”). DPA updates PIPEDA and modernizes Canadian data privacy and security law. DPA is now...more

Warrantless access to cell phone location data may be heard by the Supreme Court

A number of courts have considered whether the Fourth Amendment requires the government to obtain a warrant to access historical and/or real time cell phone geographic location information, known as CSLI. CSLI is cell site...more

What European Union privacy reform means for U.S. Companies

The European Union (EU) General Data Protection Regulation (GDPR) is one step closer to replacing the EU’s 1995 data privacy directive, known as 95/46/EU. In late June, the Council of Ministers from the EU member states...more

Security bug found in Samsung® smartphones

Samsung recently announced that about more than 600 million Samsung mobile devices contained a factory installed third party software produced by SwiftKey that predicts the words you will types on your keyboards. The issue...more

Oral Argument Scheduled in Microsoft Foreign Data Demand Appeal

The U.S. Second Circuit Court of Appeals scheduled oral argument for September 9, 2015 on Microsoft’s appeal of a district court opinion upholding the validity of the U.S. government’s search warrant for customer data stored...more

Healthcare Organizations not Immune from Criminal Attacks on Sensitive Information

This month, the Ponemon Institute released its Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data and its findings are generating a good deal of attention. In the past, the Study has found that most data...more

RadioShack bankruptcy court approves sale of personal information collected by debtor

Earlier this year, an affiliate of the hedge fund Standard General LP assumed more than 1,700 RadioShack® store leases in an auction sale in the electronics retailer’s bankruptcy. Standard General reportedly plans to partner...more

Hackers seek to access intellectual property assets of higher educational institutions

College and universities, like many other businesses and organizations, defend against millions of cyberattacks each day. Most recently, Penn State’s College of Engineering discovered a multi-year long cyberattack seeking...more

New York State Department of Financial Services Publishes Survey Results on Banking Industry Third-Party Service Providers and...

The New York State Department of Financial Services (NYDFS) recently published the results of its cybersecurity survey of more than 150 regulated small, medium, and large banking organizations. The survey asked for...more

Regulators Examining Cybersecurity Policies and Practices for the Insurance Industry

Shortly after the discovery of a cybersecurity breach at the health insurance company Anthem, Inc., the National Association of Insurance Commissioners (NAIC) called for a multi-state examination of Anthem’s cybersecurity...more

Microsoft versus the Federal Government; Round Three

Microsoft Corporation’s (Microsoft U.S.) reply brief is due this week in its appeal of The District Court for the Southern District of New York’s order to comply with the U.S. government’s warrant requiring the turnover of a...more

4/10/2015  /  Appeals , Email , Ireland , Microsoft , Search Warrant

Toysmart Pt. Deux

An auction of RadioShack assets which concluded this week included the names and physical addresses of 65 million customers and email addresses of 13 million customers. The auction result and transfer of assets is still...more

101 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide