Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more
10/12/2023
/ Crisis Management ,
Cyber Attacks ,
Cyber Insurance ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Events ,
Incident Response Plans ,
Risk Mitigation
2023 is shaping up to be a landmark year for data privacy, as comprehensive consumer privacy laws take effect in four states and a fifth state expands its already robust privacy compliance requirements. As part of Womble Bond...more
In May 2017, the world of data privacy was irreparably changed when four members of the Chinese military hacked into credit-reporting company Equifax, exposing the personal information of nearly 150 million Americans. The...more
6/22/2022
/ California Consumer Privacy Act (CCPA) ,
Compliance ,
Compliance Dates ,
Consumer Privacy Rights ,
Corporate Counsel ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Popular ,
State Privacy Laws ,
Surveys
In the past 5 years businesses felt the increasingly intricate data management rules (GDPR, CCPA, BIPA) pressed against an explosion in hacking and ransomware. Companies experience pressure from legislators, regulators,...more
3/15/2022
/ Biometric Information ,
Continuing Legal Education ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Use Policies ,
Geolocation ,
Hackers ,
New Legislation ,
Privacy Laws ,
Ransomware ,
State Privacy Laws ,
Webinars
Why don’t our new privacy laws really protect our privacy? Are we going about this the wrong way?
The topic was raised in the recent Capital Forum of state and federal enforcement agencies by FTC Chair Lena Kahn, who...more
12/15/2021
/ Analytics ,
Artificial Intelligence ,
Big Tech ,
Data Privacy ,
Data Protection ,
EU ,
Federal Trade Commission (FTC) ,
Mobile Devices ,
Notice and Comment ,
Personal Data ,
Personal Information ,
Privacy Laws ,
Regulatory Oversight ,
Sensitive Personal Information ,
Smart Devices ,
Surveillance
In meetings with data security professionals, the same topic tends to arise: Why are we fighting the same security battles now that we fought 20 years ago?
The history of network and cyber security seems to be a...more
Hell hath no fury like a bureaucracy scorned. Do you know a person who insists on having his own way all the time and who wants to control your relationships with others? I hope not, but many of us do....more
We always suspected that the Amazon Echo resting quietly in your family room was more insidious than it seemed. Now we have confirmation. We know that the Echo can hear us. We also know that it records private conversations...more
6/23/2021
/ ALEXA ,
Amazon Echo ,
Amazon Marketplace ,
Connected Items ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Internet of Things ,
Oral Communications ,
Personal Assistants ,
Privacy Concerns ,
Security Systems ,
Wifi
The recent spate of apparently eastern European cyberattacks on important U.S. commercial interests—from SolarWinds to Colonial Pipeline—should force all of us to step back and review how we organize our world. Many crucial...more
Each new technology seems to offer creative tools for both criminals and law enforcement. Telegraphs and telephones spawned wire and phone fraud. The era of digital networking ushered in the age of hacking. Digital banking...more
There is a reason we don’t all have a definitive digital identifier.
I am describing a digital ID to be used by everybody for everything we do online – any bank would know you anywhere and know what funds it could give...more
How is a refrigerator like a stoplight camera and a delivery drone?
Each of these devices and hundreds of millions of others are part of the internet of things (IoT), meaning that manufacturers are building them with sensors...more
Definitions are important.
How we define words sets the context for how we regulate them. In the U.S., the definitions of legally defended private information are changing, affecting the entire scope of information...more
The Federal Trade Commission (“FTC”) conducted an investigation into Zoom Video Communications, Inc.’s (“Zoom”) privacy and security practices and announced a settlement agreement on November 9, 2020. As a part of the...more
Privacy, the gig economy, and access to digital information in our cars were all issues on ballots Tuesday for direct response of the voters. U.S. technology companies will be affected by the results of these...more
11/9/2020
/ Ballot Measures ,
California Privacy Rights Act (CPRA) ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Collection ,
Data Privacy ,
Data Protection ,
Legislative Agendas ,
Privacy Laws ,
State and Local Government ,
Technology Sector
We all have them. Old computers sitting around in storage, never to be used again. Broken servers that have passed their prime. Laptops abandoned for their newer, shinier versions.
And what do you do with them? If these...more
10/14/2020
/ Data Protection ,
Data Security ,
Department of Homeland Security (DHS) ,
Electronics ,
Environmental Policies ,
Laptop Computers ,
Morgan Stanley ,
NIST ,
OCC ,
Recycling ,
Waste Disposal ,
Work Computer
Some companies don’t seem to care about privacy compliance. They may not have the money to build a compliance regime. They may not believe in the laws or believe that the laws would ever be applied to them. They may just not...more
Most people have a warped and deeply unrealistic understanding of data security.
There is no such thing as absolute security. For a thing to have value, you must be able to access the value – in effect, to use it. In order...more
The world just received the newest pronouncement from the EU Court of Justice, in a decision known as Schrems II, and the legal opinion extends the data war declared on the United States in the first Schrems decision....more
8/12/2020
/ Contract Terms ,
Court of Justice of the European Union (CJEU) ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Protection Authority ,
EU ,
EU-US Privacy Shield ,
International Data Transfers ,
National Security ,
Personal Data ,
Standard Contractual Clauses ,
UK Brexit
Today, July 16, 2020, the EU’s top court, the Court of Justice of the European Union (CJEU), issued its highly anticipated decision in the Schrems II case. In doing so, CJEU has invalidated the EU-US Privacy Shield Framework...more
You are being watched.
And in these trying times of COVID-19 and major political protests, surveillance matters.
It seems everyone is making judgments about whether we protect ourselves or society when we leave the...more
6/9/2020
/ Biometric Information ,
Civil Liberties ,
Criminal Investigations ,
Data Protection ,
Facial Recognition Technology ,
First Amendment ,
FL Supreme Court ,
Law Enforcement ,
Police Misconduct ,
Privacy Laws ,
Protests ,
Surveillance
Although it seems that every day less people care about their privacy, the ability to maintain parts of your life as private remains crucial to our democracy, our economy, and our personal wellbeing. Many people expose their...more
6/5/2020
/ Anonymity ,
Big Data ,
Coercion ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Personal Information ,
Privacy Concerns ,
Privacy Laws ,
Reputation Management ,
Reputational Injury ,
Video Privacy Protection Act
This is one of several client alerts in a series counting down to the date when CCPA applies (Almost 1 month to go) -
The California Consumer Privacy Act (CCPA) takes effect for businesses January 1, 2020. Don’t wait to...more
11/27/2019
/ California Consumer Privacy Act (CCPA) ,
Comment Period ,
Consumer Privacy Rights ,
Cybersecurity ,
Data Protection ,
Data Sellers ,
Employee Privacy Rights ,
Health Insurance Portability and Accountability Act (HIPAA) ,
Personal Information ,
Privacy Laws ,
Public Comment ,
Website Owner Liability
This is one of several client alerts in a series counting down to the CCPA effectuation date.
Don’t wait to implement your California Consumer Privacy Act (“CCPA”) compliance mechanisms as changes to your operations may be...more
10/24/2019
/ California Consumer Privacy Act (CCPA) ,
Consumer Privacy Rights ,
COPPA ,
Cybersecurity ,
Data Collection ,
Data Processors ,
Data Protection ,
Online Safety for Children ,
Opt-Outs ,
Personally Identifiable Information ,
Privacy Policy ,
Right to Delete ,
State Data Breach Notification Statutes
If your company holds or collects data in the US, the UK and elsewhere in the EU, you should be mapping out how data flows through those jurisdictions in anticipation of the UK “crashing out” of the European Union in October,...more