By: David Bender Special Counsel, Data Privacy, GTC Law Group. Since 2000, the Safe Harbor program has provided a relatively painless way for U.S. companies to import into the United States the personal information of European Union (EU) residents in compliance...
By: Eric M. Dobrusin, Kristen L. Pursley, and Daniel P. Aleksynas , The Dobrusin Law Firm. A broad range of attorneys represent technology companies in some capacity, and therefore, potentially handle and store sensitive information related to patents or trade...
By: Angela Bozzuti Product Manager, Lexis Practice Advisor. THE CHILDREN’S ONLINE PRIVACY PROTECTION ACT AND Rule ( COPPA ) is a federal law that places parents and legal guardians in control over the collection, use, and disclosure of their children’s...
By: Mark W. Brennan , Hogan Lovells US LLP. AS THE USE OF MOBILE DEVICES SUCH AS SMARTPHONES and tablets has become increasingly prevalent, mobile applications (mobile apps or apps) have also proliferated. Consumers use mobile apps to access social networks,...
By: Geoffrey H. Wold As cyber criminals become more sophisticated in their efforts to target cyber victims, organizations must also grow their capabilities to successfully combat and defeat them. The evolving nature of Internet crime presents a unique set of...
By: James B. Astrachan and Christoper J. Lyon , Astrachan Gunst Thomas, P.C. IN JUNE 2001, THE LATE JUSTICE ANTONIN SCALIA REMARKED , “It would be foolish to contend that the degree of privacy secured to citizens by the Fourth Amendment has been entirely...
By: David A. Zetoony, Bryan Cave LLP and Courtney K. Stout, Davis Wright Tremaine LLP. MOST RETAILERS DO NOT REALIZE THAT BY ACCEPTING credit cards they expose themselves to the risk of a data security breach and significant costs and legal liabilities. This...
By: Elizabeth C. Rogers , Greenberg Traurig, LLP. A data breach occurs when sensitive, protected, and/or confidential information is stolen, accessed, or used without authorization. The information may include an individual’s personally identifiable information...
By Mark W. Brennan , Hogan Lovells US LLP The Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act), 15 U.S.C. §§ 7701–7713 , imposes a number of detailed requirements on persons and entities that initiate...
By: Elizabeth C. Rogers , Greenberg Traurig, LLP. While there is no universal legal requirement that every company have a published privacy policy, consumers have become increasingly sensitized to...
FEDERAL DEPOSIT INSURANCE CORPORATION STAYS FOCUSED ON CYBERSECURITY THE FDIC UPDATED ITS CYBERSECURITY WEBPAGE TO highlight what it called “a number of important steps to significantly enhance the protection of information held by the agency.” ...