Skip to main content

Privacy & Cybersecurity

Viewpoints

Filter by:

When is a gallon of gas like an iTunes track? That may sound like a riddle from a Lewis Carroll novel, but it was one of the questions considered by the California Supreme Court during oral arguments in Apple v. Superior Court (Krescent) as Apple, Inc. attempted to persuade the Court that the Song-Beverly Credit Card Act of 1971, which prohibits retails from recording a customer’s personal identification information as a condition of accepting a credit card payment, does not apply to online retailers.
Read more
Sometimes the most interesting things that emerge from conferences are whispered across the aisle just after a presentation or debated by attendees off-site over a glass or two of wine.
Read more

California's AG Puts Mobile Apps on Notice

November 6, 2012 | Blog | By Cynthia Larose

If a haunted house or trick-or-treating was your scariest experience last week, you must not be one of the 100 mobile application developers who received a notice of non-compliance from California Attorney General Kamala D. Harris. 
Read more

The FTC Fires Back Against Wyndham

November 2, 2012 | Blog | By Cynthia Larose

The Federal Trade Commission (the “FTC”) has filed its response to the Wyndham Hotel & Resorts LLC’s (“Wyndham”) Motion to Dismiss. 
Read more

Barnes & Noble PIN Pad Devices Hit By Hackers

October 25, 2012 | Blog | By Cynthia Larose

As the New York Times reports, Barnes & Noble disclosed this week that it learned over one month ago – on September 14 – that hackers broke into point of sale PIN pad devices at 63 Barnes & Noble stores around the country and stole credit and debit card information for customers who had made purchases at those stores.
Read more
Class action plaintiffs asserting claims against Sony in connection with the 2011 Sony PlayStation Network (“PSN”) data breach face permanent dismissal of their claims unless they can allege actual losses resulting from the breach.
Read more
Last week, the U.S. Department of Health and Human Services Office of Inspector General (OIG) released the results of a study entitled CMS Response to Breaches and Medical Identity Theft.
Read more
Facebook announced last week that it now has upwards of 1 billion active users. That same week, over 10 million Twitter messages were sent during the U.S. presidential debate.
Read more

Two Upcoming Privacy Events

October 4, 2012 | Blog | By Cynthia Larose

We have two "Save the Date" announcements today - for registration information click on the links below:
Read more
It’s time for an updated version of our “Mintz Matrix” – the Mintz Levin matrix of state data security breach notification laws. We update this matrix quarterly, or as developments dictate.
Read more

Recommended Reading - BYOD and Reasonable Security

September 28, 2012 | Blog | By Cynthia Larose

Much has been written, in this space and elsewhere, on the concept of "reasonable security" -- what constitutes "reasonable security," how much security is "reasonable," etc.  
Read more

Friday Privacy Funny

September 28, 2012 | Blog | By Cynthia Larose

How true........
Read more

Beware the Weakest Link: Human Behavior

September 27, 2012 | Blog | By Cynthia Larose

Today's Washington Post includes a front page article that should serve as a warning to any employer about increasingly sophisticated social engineering attacks that exploit one key vulnerability that is essentially immune to technical solutions: their employees. 
Read more
This week, Apple shareholders requested that its Board of Directors publish a report explaining how the board oversees privacy and data security risks. The proposal was prompted by concern that recent issues such as the unauthorized access to iPhone users’ address books and the release of one million Unique Device IDs could place the company’s growth opportunities at risk.
Read more

Mass Eye and Ear Infirmary Hit with $1.5M Breach Settlement

September 19, 2012 | Blog | By Cynthia Larose

As the old saying goes, "no good deed goes unpunished...." The most recent, published Office for Civil Rights (OCR) HIPAA enforcement action serves as an important reminder that self-reported breaches can and do lead to investigations and enforcement.
Read more
Senator John D. Rockefeller IV (D., W.Va.) recently sent a letter to the CEOs of all Fortune 500 companies asking the companies for more information about their cybersecurity practices. 
Read more

Broad new data security rule proposed for federal contractors

September 11, 2012 | Blog | By Cynthia Larose

A new rule proposed for federal government contractors will require that all federal contracts over $100,000 (including contracts for commercial items and those to small businesses) will have to include a clause requiring the contractor to implement  basic data security protections for any non-public data provided to the contractor by the federal government or generated by the contractor for the government. 
Read more

FTC to Mobile App Developers: Get Privacy Right from the Start

September 5, 2012 | Blog | By Cynthia Larose

Mobile app developers have some unique challenges when it comes to preparation and implementation of privacy policies. But, regulators have made it quite clear that the general privacy laws and regulations apply whether the application is online or mobile. 
Read more

Wyndham Motion Puts the FTC on the Defensive

August 31, 2012 | Blog | By Cynthia Larose

Wyndham Hotel & Resorts LLC (“Wyndham”) has filed a Motion to Dismiss the Federal Trade Commission’s (the “FTC”) Complaint against it, which alleges that Wyndham committed unfair and deceptive acts related to three data security breaches that Wyndham has suffered since 2008.
Read more
Lorene Schaefer, a mediator, arbitrator and workplace investigator, has reported on the One Mediation blog that by a letter of August 3, 2012 the Buffalo, New York office of the EEOC notified an employer that the employer’s written policy warning employees who participate in an investigation not to discuss the matter and providing that employees who do so may be subject to discipline including termination of employment may be a “flagrant violation” of Title VII and itself an adverse employment action.
Read more

Explore Other Viewpoints: