Large companies holding sensitive data – including financial services, telecommunications, business process outsourcing, hospitality, and cryptocurrency firms – as well as their IT helpdesks, are increasingly being targeted...more
11/28/2023
/ Cyber Attacks ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Breach ,
Data Collection ,
FBI ,
NIST ,
Popular ,
Publicly-Traded Companies ,
Ransomware ,
Reporting Requirements ,
Securities and Exchange Commission (SEC) ,
Sensitive Business Information
Though the final results of the 2020 presidential race took a few days to become clear, it was obvious by the morning of November 4 that cannabis legalization had run the table: from deep red Montana, South Dakota, and...more
Editors’ Note: This is the second in our fifth-annual end-of-year series examining important trends in data privacy and cybersecurity in the coming year. Read our previous post on Energy.
Though the final results of the...more
12/30/2020
/ California Consumer Privacy Act (CCPA) ,
Cannabis Products ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
EU ,
General Data Protection Regulation (GDPR) ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Legalization ,
Medical Marijuana ,
State and Local Government
On October 1, 2019, China’s new regulation to protect personal data related to children – called the “Measures on Online Protection of Children’s Personal Data” – went into effect.
As we wrote in June, when a draft of the...more
10/3/2019
/ China ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
Internet Service Providers (ISPs) ,
New Regulations ,
Online Platforms ,
Online Safety for Children ,
Parental Consent ,
Personal Data ,
Personally Identifiable Information
In early June, the Cyberspace Administration of China released for public comment new draft regulations applicable to the collection of personal information relating to children under 14 by online service providers.
The...more
6/7/2019
/ China ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Use Policies ,
Encryption ,
Internet Service Providers (ISPs) ,
Online Safety for Children ,
Parental Consent ,
Personal Data ,
Personally Identifiable Information ,
Proposed Regulation ,
Security Risk Assessments
Over one year ago, our colleague Chris Hart argued that the District of New Jersey court’s decision in FTC v. Wyndham Worldwide Corp. et. al., No. 13-1887-ES, “point[ed] to the possibility that the FTC has potentially broad...more
8/28/2015
/ Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Due Process ,
Enforcement Actions ,
Federal Trade Commission (FTC) ,
FTC Act ,
FTC v Wyndham ,
Hackers ,
Personally Identifiable Information ,
Unfair or Deceptive Trade Practices ,
Wyndham
The first ever Summit on Cybersecurity and Consumer Protection was convened today at Stanford University, keynoted by President Obama. The purpose of the summit: to “bring[] together major stakeholders on consumer financial...more
2/16/2015
/ American Express ,
Apple ,
Bank of America ,
Banking Sector ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data-Sharing ,
NCCIC ,
Popular ,
Right to Privacy
The highly publicized hacking of the iCloud accounts of dozens of celebrities was disclosed over Labor Day weekend and has raised larger, more serious concerns regarding the security of personal and corporate data held in the...more