Privacy & Cybersecurity
Viewpoints
Filter by:
When You Care Enough to Spy on the Very Best: NSA Greeting Card Program is First Step in Rebranding Campaign
April 1, 2014 | Blog | By Cynthia Larose
If you’ve had a birthday in the past two weeks, you may have received a greeting card from an unlikely source; the National Security Agency. Following President Obama’s call for large-scale reform of the NSA, the agency has initiated a rebranding campaign in the hopes of winning back the trust and favor of the American public.
Read more
Banks Withdraw Lawsuits Against Target and Trustwave
April 1, 2014 | Blog | By Cynthia Larose
In what apparently is a big "oops," two banks that took legal action against Target over its recent data breach have withdrawn their claims. The suits were withdrawn due to an erroneous allegation against Trustwave, a security vendor also named in the suit.
Read more
Privacy Monday - March 31, 2014 OPENING DAY!
March 31, 2014 | Blog | By Cynthia Larose
Last Monday in March (Opening Day for you baseball fans) - some privacy/security bits and bytes to close out the month.
Read more
The Target Breach Update
March 27, 2014 | Blog | By Cynthia Larose
It has been difficult to keep up with all the various permutations of the Target data breach saga.
Read more
Online Protection for Children: Delaware following California?
March 25, 2014 | Blog | By Cynthia Larose
Delaware state representative Darryl Scott recently introduced the Child Online Protection Act (House Bill 261 or the “Bill”), to the state's House of Representatives.
Read more
Law360: Microsoft Steps in Privacy Quagmire with Email Snooping
March 25, 2014 | Blog | By Cynthia Larose
Mintz Levin employment lawyer Don Schroeder was recently quoted in this Law360 Article entitled Microsoft Steps in Privacy Quagmire With Email Snooping. The article focuses on the controversial choice by Microsoft Corp. to search a blogger’s e-mail account for evidence of leaked trade secrets by its former employee.
Read more
Privacy Monday - March 24, 2014
March 24, 2014 | Blog | By Cynthia Larose
Welcome to March Madness -- although if your brackets look anything like mine do this morning, it is not particularly "welcome." Let's just say that there is no danger of my winning Warren Buffet's $1 billion.
Read more
REMINDER - Cybersecurity event at Mintz Boston tomorrow
March 24, 2014 | Blog | By Cynthia Larose
Mintz is presenting a roundtable discussion tomorrow titled: NIST Framework: How to Best Mitigate Cyber Risk for Your Organization
Read more
Unauthorized Children’s In-App Purchases Round Two: Google Faces Class Action
March 19, 2014 | Blog | By Cynthia Larose
Just two months after Apple’s settlement with the FTC over lax parental controls over children’s in-app purchases (see our prior blog post), Google takes the spotlight with claims of unauthorized children’s in-app purchases in the Google Play Store!
Read more
Over 20 Million Customer Accounts Affected by Data Breaches in California; Attorney General Harris Promises Increased Enforcement
March 18, 2014 | Blog | By Cynthia Larose
When you think of catastrophic events that take place online and have a devastating effect on millions of people, you probably think of HBO Go crashing during the True Detective finale. However, California Attorney General Kamala Harris wants to remind you that you should be thinking about data breaches.
Read more
Boston Discussion - NIST Framework - March 25
March 4, 2014 | Blog | By Cynthia Larose
NIST Framework: How to Best Mitigate Cyber Risk for Your Organization The National Institute of Standards and Technology (NIST) last month released its final Cybersecurity Framework.
Read more
Data: Big, Borderless and Beyond Control? Five Things You Can Do
March 3, 2014 | Blog | By Cynthia Larose
There’s been a lot of talk about big data over the last few years and the breaches at Target and Neiman Marcus have many companies running in circles trying to figure out how to protect their systems and their data. So what are some of the big issues in our current technology landscape?
Read more
Risky Business: Target Discloses Data Breach and New Risk Factors in 8-K Filing… Kind Of
February 28, 2014 | Blog | By Cynthia Larose
After Target Corporation’s (NYSE: TGT) net earnings dropped 46% in its fourth quarter compared to the same period last year, Target finally answered the 441 million dollar question – To 8-K, or not to 8-K? Target filed its much anticipated Current Report on Form 8-K on February 26th, just over two months after it discovered its massive data breach.
Read more
"Sophisticated" Breach Exposes 300,000 Student Records at University of Maryland: 3 Questions You Should Ask
February 21, 2014 | Blog | By Cynthia Larose, Julia Siripurapu
Officials at the University of Maryland (“University” or “UMD”) announced that UMD was the victim of a significant security breach that took place on Tuesday, February 18 (the “Breach” or “Incident”).
Read more
Complaint from BBB Triggers HarperCollins COPPA-Compliance Measures
February 20, 2014 | Blog | By Cynthia Larose
The Children’s Advertising Review Unit (CARU) announced that it has recommended that HarperCollins Publishers Ltd. (the “Company”) modify its information collection practices on its Ruby Redfort child-directed website (the “Site”) to better protect the privacy of children under 13 (“Children”) and that the Company has agreed to do so.
Read more
FTC Approves Another COPPA Safe Harbor Program
February 18, 2014 | Blog | By Cynthia Larose
The FTC has announced its unanimous approval for the kidSAFE Seal Program proposed by Samet Privacy, LLC under the “safe harbor” provision of the COPPA Rule (the “kidSAFE Seal Program”). The Commission’s decision comes after an extended public comment period due to the agency’s shutdown last year.
Read more
New Payment Card Technology Finally Coming to US? Target Takes the Lead
February 14, 2014 | Blog | By Cynthia Larose
In the wake of the recent massive data breaches suffered by Target and Neiman Marcus, many banks and retailers have renewed the call for a change in the way that consumers in the United States pay for goods and services.
Read more
NIST Framework for Critical Infrastructure Released
February 13, 2014 | Blog
The release yesterday of the Framework for Improving Critical Infrastructure Cybersecurity by the National Institute of Standards and Technology caps a year-long effort by NIST to find an industry consensus for assessing and improving the cybersecurity of the nation's privately-owned critical infrastructure.
Read more
California Moves to Restrict Collection of Consumer Personal Information Online: the Process, History and Politics Behind Senate Bill 383
February 6, 2014 | Blog | By Cynthia Larose
The California Senate has passed a bill restricting the information that certain online retailers can collect in connection with consumer purchases. Senate Bill 383 would amend Sections 1747.02 and 1747.08 of the California Civil Code to address the collection of customer information in connection with credit card purchases in online transactions for downloadable products.
Read more
Federal Data Security Breach Notification – is 2014 the Year?
February 5, 2014 | Blog | By Cynthia Larose
Data privacy legislation has been introduced regularly, but has yet to pass, could this be the year? The recent breaches at Target and Neiman Marcus have drawn national attention and may be the impetus needed to pass the legislation.
Read more
Explore Other Viewpoints:
- Antitrust
- Appellate
- Arbitration, Mediation & Alternate Dispute Resolution
- Artificial Intelligence
- Awards
- Bankruptcy & Restructuring
- California Land Use
- Class Action
- Complex Commercial Litigation
- Construction
- Consumer Product Safety
- Cross-Border Asset Recovery
- Debt Financing
- Direct Investing (M&A)
- Diversity
- EB-5 Financing
- Education & Nonprofits
- Employment, Labor & Benefits
- Energy & Sustainability
- Environmental Enforcement Defense
- Environmental Law
- FDA Regulatory
- Federal Circuit Appeals
- Financial Institution Litigation
- Government Law
- Growth Equity
- Health Care
- Health Care Compliance, Fraud and Abuse, & Regulatory Counseling
- Health Care Enforcement & Investigations
- Health Care Transactions
- Health Information Privacy & Security
- IP Due Diligence
- IPRs & Other Post Grant Proceedings
- Immigration
- Insolvency & Creditor Rights Litigation
- Institutional Investor Class Action Recovery
- Insurance & Financial Services
- Insurance Consulting & Risk Management
- Insurance and Reinsurance Problem-Solving & Dispute Resolution
- Intellectual Property
- Investment Funds
- Israel
- Licensing & Technology Transactions
- Life Sciences
- Litigation & Investigations
- M&A Litigation
- ML Strategies
- Medicare, Medicaid and Commercial Coverage & Reimbursement
- Mergers & Acquisitions
- Patent Litigation
- Patent Prosecution & Strategic Counseling
- Portfolio Companies
- Privacy & Cybersecurity
- Private Client
- Private Equity
- Pro Bono
- Products Liability & Complex Tort
- Projects & Infrastructure
- Public Finance
- Real Estate Litigation
- Real Estate Transactions
- Real Estate, Construction & Infrastructure
- Retail & Consumer Products
- Securities & Capital Markets
- Securities Litigation
- Special Purpose Acquisition Company (SPACs)
- Sports & Entertainment
- Strategic IP Monetization & Licensing
- Tax
- Technology
- Technology, Communications & Media
- Trade Secrets
- Trademark & Copyright
- Trademark Litigation
- Venture Capital & Emerging Companies
- White Collar Defense & Government Investigations
- Women's Health and Technology