News & Analysis as of

Security and Privacy Controls Corporate Counsel

Fenwick & West LLP

The SEC is Cracking Down on Misleading Cybersecurity Disclosure

Fenwick & West LLP on

On October 22, 2024, the SEC charged two current reporting companies, Unisys Corp. and Check Point Software Technologies, and two former public companies, Mimecast Limited and Avaya Holdings Corp., with making materially...more

WilmerHale

Year in Review: CCPA Litigation Trends from 2023

WilmerHale on

This post is part of a series of articles we are doing on 2023 data protection litigation trends. While the California Consumer Privacy Act (CCPA) is most known for its onerous privacy compliance obligations, the law also...more

WilmerHale

California Settles with Glow App Over Alleged Privacy and Security Violations

WilmerHale on

In September, the California Attorney General (the “AG”) reached a settlement with Glow, Inc. (“Glow”), a technology company that is responsible for an ovulation and fertility-tracking mobile application called the Glow app....more

Benesch

CCPA Compliance Is on the Horizon - What You Need to Know to Be Ready

Benesch on

Enforcement Begins July 1 - On July 1, businesses operating in California and collecting and processing California consumer personal data will begin to experience enforcement of California Consumer Privacy Act (“CCPA”)...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

Looming Data Security Requirements Under the New York SHIELD Act: What Businesses Need to Know

By March 21, 2020, nearly every business - not only those that conduct business in New York State - that owns or licenses computerized data that includes the private information of any New York State resident, will be...more

BCLP

Cyber Security Trends: Tips from recent UK enforcement - Part 1

BCLP on

What insights into cyber security norms can organisations glean from the UK ICO’s recent enforcement decisions, most of which have been released since the GDPR came into force? Final fines are still awaited on the UK’s...more

BCLP

CCPA Security FAQs: What Categories of Information Could Trigger A Consumer Class Action if Breached?

BCLP on

Consumers can successfully bring suit under the CCPA if they can prove the following five elements...more

Burns & Levinson LLP

The Likelihood of Company Executives Being Fired Post-Data Breach – It Isn’t Pretty

Burns & Levinson LLP on

In April 2018, Verizon released the 11th edition of its Data Breach Investigations Report. As usual, the Verizon DBIR contained interesting data points culled from more than 53,000 incidents and 2,216 confirmed data breaches....more

A&O Shearman

FBI Director States That Companies That Suffer Data Breaches Will Be Treated As Victims For Law Enforcement Purposes

A&O Shearman on

At a March 7, 2018 Conference on Cyber Security co-hosted by Boston College and the Federal Bureau of Investigation (“FBI”), Director of the FBI Christopher Wray spoke about the FBI’s efforts to combat cyber threats. Among...more

Morgan Lewis

How Corporations Can Stay Vigilant Against Online Banking Fraud – Lessons from Recent Court Judgments

Morgan Lewis on

Due to the general flexibility granted to banks by their standard account opening terms, corporate victims of online banking frauds often face substantial hurdles in court in their attempts to recover the sums lost from the...more

WilmerHale

FTC Brings First-Ever “Connected” Toys Privacy and Data Security Case; US, Canada, and Hong Kong Privacy Regulators Coordinate...

WilmerHale on

On January 8, 2018, the Federal Trade Commission (FTC) brought its first-ever privacy and data security case involving Internet-connected toys. VTech Electronics Limited and its US subsidiary (VTech), maker of...more

Wilson Sonsini Goodrich & Rosati

Key New Takeaways from Uber’s Privacy and Data Security Settlement with the FTC

On August 15, 2017, the Federal Trade Commission (FTC) announced that it had reached an agreement with Uber Technologies to settle allegations that the ride-sharing company had deceived consumers by failing to live up to its...more

BCLP

Data Privacy and Security: A Practical Guide for In-House Counsel, 2017 Edition

BCLP on

Boulder Partner David Zetoony published the 2017 edition of his handbook, Data Privacy and Security: A Practical Guide for In-House Counsel, on Jan. 28 – Data Privacy Day. The guide provides an overview of laws relevant to a...more

Patterson Belknap Webb & Tyler LLP

Lessons from LinkedIn: Privacy and Data Security Representations in the M&A Context

Microsoft’s blockbuster acquisition of LinkedIn earlier this month—a deal where concerns for privacy and data security loomed large—provides a glimpse into the growing trend of including separate privacy and data security...more

BakerHostetler

2016 Mobile Data Privacy and Security Update and 2015 Review

BakerHostetler on

To say that mobile device usage has reached a tipping point would be an understatement. There are now more mobile devices than people in the world, a staggering 7.9 billion mobile devices for 7.4 billion people on Earth. In...more

Epstein Becker & Green

When Do Data Security Breaches Cause Substantial Consumer Harm? Lessons from the LabMD FTC Complaint Dismissal

Epstein Becker & Green on

On November 19, 2015, an Administrative Law Judge (the “ALJ”) at the Federal Trade Commission (“FTC”) dismissed the FTC’s 2013 complaint against LabMD, a clinical testing laboratory, stating that the FTC failed to demonstrate...more

Ervin Cohen & Jessup LLP

The Top 10 Priorities For Your Information Governance Program

The title, of course, begs the question: does your business even have an Information Governance Program? If not, you should get one—quick. An integrated Information Governance Program is considered a “best practice” to...more

BakerHostetler

A Deeper Dive: Risk Assessments Are a Necessary Step in Creating Layered Cyber Defenses

BakerHostetler on

Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more

BakerHostetler

Cybersecurity is a Real Risk, So Become “Compromise Ready”

BakerHostetler on

Many have heard that “it is not a matter of if a company will be attacked, but when.” Statements like this used to be met with skepticism – companies would say we do not have information hackers want, we outsource our...more

19 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide