On July 25, the Connecticut Supreme Court issued an opinion in High Watch Recovery Center Inc. v. Department of Public Health that addresses the subject of the right to file an appeal of a certificate-of-need, or CON,...more
On July 25, 2023, the Connecticut Supreme Court issued an opinion in High Watch Recovery Center, Inc. v. Dept. of Public Health that addresses the subject of the right to file an appeal of a Certificate of Need (CON) decision...more
Effective October 25, 2021, the Federal Trade Commission (FTC) has adopted a new policy providing increased scrutiny of merger and acquisition activity for potential anti-competitive effects. The new policy applies to consent...more
It is so hard to keep up with the latest ways the bad guys try to infiltrate company data. One new technique is called warshipping, and its implementation is pretty simple and a little old school.
...more
8/12/2019
/ Air Traffic Control Systems ,
Blockchain ,
Call Centers ,
Cyber Attacks ,
Cybersecurity ,
Data Privacy ,
Drones ,
Federal Aviation Administration (FAA) ,
Hackers ,
Mobile Apps ,
Personally Identifiable Information ,
Privacy Settings
As we head toward 2020, expect significant public debate relating to smartphone applications designed to increase turnout and participation in upcoming elections. The Democratic Party has dipped its toe in the water by...more
In some instances in which a company finds itself in the cross-hairs of a patent infringement cease-and-desist letter or lawsuit, a license may not be a viable option. That is often the case when the patent holder is a...more
Cybercriminals have launched a new campaign that not only requires the victim to pay a ransom to have their data decrypted, but when the victim is directed to a PayPal account to pay the ransom and get the decryption key to...more
1/21/2019
/ Biometric Information ,
California Consumer Privacy Act (CCPA) ,
Cell Phones ,
Commercial General Liability Policies ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data-Sharing ,
Drones ,
Geological Data ,
Hackers ,
HIPAA Breach ,
Personally Identifiable Information ,
Ransomware ,
Right to Privacy ,
Risk Management ,
Rulemaking Process ,
WISP
On January 8, 2019, the California Department of Justice hosted the first in a series of six public forums on the California Consumer Protection Act (CCPA). ...more
1/15/2019
/ California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Personal Data ,
Personally Identifiable Information ,
Privacy Laws ,
Public Forum ,
Regulatory Agenda ,
Rulemaking Process ,
State and Local Government
New Year’s is a time to look back on the happenings of the year and focus on the lessons and reminders those events have provided. For our final newsletter of the year, we’d like to share with you our top 10 most read posts...more
12/31/2018
/ Banking Sector ,
Blockchain ,
Connected Items ,
Cryptocurrency ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Distributed Ledger Technology (DLT) ,
Drones ,
Federal Aviation Administration (FAA) ,
Financial Conduct Authority (FCA) ,
Hackers ,
Initial Coin Offering (ICOs) ,
Investment Opportunities ,
Personally Identifiable Information ,
Popular ,
Wells Fargo
FIRRMA Pilot Program Puts Critical Technology in the Spotlight -
On November 10, 2018, the inter-agency Committee on Foreign Investment in the United States (CFIUS) will begin a pilot program that will implement certain...more
Some analysts have predicted that by 2020, there will be 20 billion Internet of Things (IoT) connected devices worldwide, which could grow to over 80 billion by 2025. Global sales of IoT devices were $80 billion in 2017, and...more
12/3/2018
/ Cybersecurity ,
Data Privacy ,
Drones ,
FSB ,
General Data Protection Regulation (GDPR) ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HIPAA Breach ,
Identity Theft ,
Internet of Things ,
IRS ,
OCR ,
Tax Scams ,
Unmanned Aircraft Systems ,
Vendors
The “security principle” under the General Data Protection Regulation (GDPR) requires that organizations process personal data securely by means of “appropriate” technical and organizational measures....more
11/27/2018
/ Corporate Counsel ,
Cybersecurity ,
Data Protection ,
Encryption ,
EU Data Protection Laws ,
General Data Protection Regulation (GDPR) ,
International Data Transfers ,
Passwords ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
Risk Management ,
UK ,
UK ICO
According to a new report by Datto, Inc. (its third annual Global State of the Channel Ransomware Report), ransomware continues to be the top cyber-attack experienced by small- and medium-sized companies. Some managed service...more
11/21/2018
/ Connected Cars ,
Data Privacy ,
Drones ,
Fingerprints ,
France ,
General Data Protection Regulation (GDPR) ,
Incident Response Plans ,
Internet of Things ,
Phishing Scams ,
Popular ,
Ransomware ,
Wire Fraud
Last month, the French data protection authority (the CNIL) issued initial guidance addressing issues that applications utilizing blockchain technology should consider in order to comply with the European General Data...more
11/15/2018
/ Blockchain ,
CNIL ,
Data Controller ,
Data Processors ,
Data Protection ,
Data Protection Authority ,
Distributed Ledger Technology (DLT) ,
EU ,
France ,
General Data Protection Regulation (GDPR) ,
International Data Transfers ,
Personal Data ,
Popular ,
Regulatory Standards ,
Right to Erasure
On October 1, 2018, the Food and Drug Administration (FDA) issued its “Medical Device Cybersecurity Regional Incident Preparedness and Response Playbook” to address continued threats to medical devices that could affect...more
10/8/2018
/ Airspace ,
ATDS ,
Auto-Dialed Calls ,
Bitcoin ,
Cryptocurrency ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Digital Currency ,
Drones ,
Facebook ,
Food and Drug Administration (FDA) ,
Hackers ,
Investment Opportunities ,
Medical Devices ,
OMB ,
Online Platforms ,
Part 107 ,
Popular ,
Public Safety ,
Robocalling ,
Social Media ,
Social Networks ,
Toyota ,
Trading Platforms ,
Unmanned Aircraft Systems ,
Virtual Currency
As part of its Virtual Markets Integrity Initiative, on September 18, 2018, the New York Attorney General’s Office issued a report reviewing the platforms of various cryptocurrency exchanges. ...more
10/2/2018
/ Bitcoin ,
BitLicense ,
Cryptocurrency ,
Currency Exchange ,
Digital Currency ,
Financial Instruments ,
Financial Markets ,
Initial Coin Offering (ICOs) ,
Investment Opportunities ,
State Attorneys General ,
Token Sales ,
Trading Platforms ,
Virtual Currency
There has been a recent surge of lawsuits and demand letters alleging company websites are violating the Americans with Disability Act (the “ADA”). In the first six months of 2018, there were at least 1,053 lawsuits alleging...more
10/1/2018
/ Americans with Disabilities Act (ADA) ,
Disability Discrimination ,
DMCA ,
Product Labels ,
Proposition 65 ,
Public Accommodation ,
Regulatory Standards ,
Safe Harbors ,
Title III ,
Warning Labels ,
Website Accessibility ,
Website Owner Liability ,
Websites
We reported last week that a spyware maker recently compromised users’ and victims’ sensitive information. Since that time, another spyware maker, mSpy, which holds itself out as having over a million users employing its...more
9/11/2018
/ Banking Sector ,
Class Action ,
Class Certification ,
Consumer Privacy Rights ,
Criminal Convictions ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Cybersecurity Framework ,
Data Breach ,
Financial Services Industry ,
Hackers ,
Insurance Industry ,
Legislative Agendas ,
NYDFS ,
Pending Legislation ,
Personally Identifiable Information ,
Popular ,
Spyware ,
State and Local Government ,
Vulnerability Assessments ,
Yahoo!
On September 4, 2018, the third stage of compliance deadlines under the New York Department of Financial Services’ (DFS) expansive cybersecurity regulation went into effect....more
9/10/2018
/ Banking Sector ,
Chief Information Security Officer (CISO) ,
Confidential Information ,
Cybersecurity ,
Cybersecurity Framework ,
Data Protection ,
Financial Institutions ,
Financial Services Industry ,
Information Technology ,
Insurance Industry ,
NYDFS ,
Personally Identifiable Information ,
Policies and Procedures ,
Risk Management ,
Third-Party Service Provider
It has been reported that a hacker was able to break into the servers of TheTruthSpy, a company that is described as “one of the most notorious stalkerware companies out there” (Motherboard, August 2018) and was able to steal...more
9/4/2018
/ Airspace ,
Arbitration ,
Biometric Information ,
Biometric Information Privacy Act ,
Blockchain ,
Commercial Use ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Distributed Ledger Technology (DLT) ,
Do Not Call List ,
Drones ,
Emerging Technology Companies ,
Employee Privacy Rights ,
Employer Liability Issues ,
Employment Litigation ,
Federal Aviation Administration (FAA) ,
General Data Protection Regulation (GDPR) ,
Hackers ,
Personally Identifiable Information ,
Popular ,
Safety Standards ,
Southwest Airlines ,
Unmanned Aircraft Systems
Proponents of blockchain technology, the distributed ledger system underlying bitcoin and other cryptocurrencies, view the technology’s applications as potentially providing significant efficiencies to the provision of...more
The Federal Bureau of Investigation (FBI) released a Public Service Announcement on August 2, 2018, entitled “Cyber Actors Use Internet of Things Devices as Proxies for Anonymity and Pursuit of Malicious Cyber Activities,”...more
As previously detailed, the California Consumer Privacy Act of 2018 was hastily passed by the California legislature as a compromise designed to avoid a more far-reaching ballot initiative....more
The Federal Energy Regulatory Commission (FERC) announced on July 19, 2018, that it is directing the North American Electric Reliability Corporation (NERC) “to develop and submit modifications to the NERC Reliability...more
7/30/2018
/ Banking Sector ,
Bitcoin ,
Blockchain ,
Bulk Electric System ,
Cyber Attacks ,
Cyber Incident Reporting ,
Cybersecurity ,
Dark Web ,
Digital Currency ,
Distributed Ledger Technology (DLT) ,
Drones ,
Electricity ,
Energy Sector ,
FERC ,
Final Rules ,
Financial Fraud ,
Financial Institutions ,
Financial Services Industry ,
Hackers ,
LifeLock ,
Malware ,
National Security ,
NERC ,
Phishing Scams ,
Popular ,
Reliability Standards ,
Reporting Requirements ,
Sensitive Business Information ,
US Air Force ,
Utilities Sector ,
Virtual Currency
Add Connecticut, Ohio and Vermont to the list of states passing legislation focused on the potential disruptive impact of blockchain – the technology underlying cryptocurrencies such as Bitcoin. ...more
7/24/2018
/ Bitcoin ,
Blockchain ,
Cryptocurrency ,
Digital Currency ,
Distributed Ledger Technology (DLT) ,
Financial Instruments ,
Financial Transactions ,
New Legislation ,
Popular ,
Regulatory Oversight ,
Regulatory Requirements ,
State and Local Government ,
Virtual Currency