Skip to main content

Privacy & Cybersecurity

Viewpoints

Filter by:

WEBINAR: Transferring Data from the EU under the GDPR

January 10, 2017 | Blog | By Susan Foster

Since September, the Mintz Levin Privacy Webinar Series has focused on the upcoming EU General Data Protection Regulation to help businesses understand the reach and scope of the GDPR and prepare for the potentially game-changing privacy regulation.
Read more

The FINRA WORM Turns

January 6, 2017 | Blog | By Cynthia Larose

It's a new year, and time for the Financial Industry Regulatory Authority (FINRA)'s annual Regulatory and Examination Priorities Letter (the "2017 Letter"). We remind regulated entities of this list of examination priorities every year, because cybersecurity appears high on the list every year.  2017 is no exception.
Read more

New York Delays Cybersecurity Rules for Banks/Insurers Until March 1, 2017

January 5, 2017 | Blog | By Cynthia Larose, Natalie Prescott

The New York State Department of Financial Services has announced -- much to the relief of the multitude of financial services companies and insurers regulated by DFS -- that it will revamp its recently proposed cybersecurity rule.
Read more

#MLWashingtonCyberWatch: 2017 FTC and Google Complaint

January 4, 2017 | Blog | By Cynthia Larose, Michael Katz, Joanne Dynak

Google’s recent changes to its privacy policy are coming under fire from a complaint filed late last year with the Federal Trade Commission (“FTC”) that accuses the company of downplaying “transformational change” in its handling of user data. 
Read more

Welcome to 2017

January 3, 2017 | Blog | By Cynthia Larose

It's likely that 2017 will see still more data breaches and hacking stories, and companies should be looking closely at cybersecurity as a risk management issue, and not as an IT issue (we've been saying that for years ....).
Read more
An old saw defines insanity as doing the same thing over and over again and expecting a different result. Wendy’s shareholders recently flouted that maxim by filing a derivative action this week against officers and directors of the fast-food chain seeking recovery on behalf of the corporation for damages arising from a data breach that affected over 1,000 franchise locations between October 2015 and June 2016.
Read more
The Obama White House has grappled with cybersecurity more than any administration in history: China’s 2009 hack of Google, the 2015 Office of Personnel Management breach, and the recent investigation of Russian cyberattacks during the 2016 election, to name just a few examples.
Read more

WEBINAR: Data Protection Officers: Do you need one?

December 12, 2016 | Blog | By Susan Foster

For the past few months, the Mintz Levin Privacy Webinar Series has focused on the upcoming EU General Data Protection Regulation (GDPR) to help businesses understand the reach and scope of the GDPR and prepare for the potentially game-changing privacy regulation.
Read more

HIPAA-Regulated Entities: Watch Out for Phishing Scam

December 2, 2016 | Blog | By Cynthia Larose

As we reported earlier this week, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights described a phishing campaign that is attempting to convince recipients of their inclusion in OCR’s Phase 2 audit program.
Read more
An attempt to impose liability on corporate officers and directors for data breach-related losses has once again failed. On November 30, 2016, a federal judge in Atlanta issued a 30 page decision dismissing a shareholder derivative action arising out of the September 2014 theft of customer credit card data from point-of-sale terminals in Home Depot stores.
Read more

House Energy & Commerce Committee Holds Hearing on Security of the Internet of Things

December 1, 2016 | Blog | By Cynthia Larose, Michael Katz

The growing scale of cybersecurity concerns is prompting action from government leadership on the federal level.
Read more

NIST Issues Internet of Things (IoT) Guidance

November 29, 2016 | Blog | By Michael Katz

Smart machines connected to the internet have become ubiquitous in our daily lives. They make up the Internet of Things (“IoT”), a vast web of interconnected iPhones and Fitbits, tablets and cameras, even baby monitors and implantable medical devices, and all are designed to improve and enrich our lives. 
Read more

The Cyber President? What To Expect From the Trump Administration On Cybersecurity And Privacy

November 17, 2016 | Blog | By Cynthia Larose, Christopher Harvie, Susan Foster, Michael Katz

Even president-elect Donald Trump has been the victim of a data breach. Several times actually. The payment card system for his Trump Hotel Collection was infected by malware in May 2014 and 70,000 credit card numbers were compromised by the time the hack was discovered several months later.  
Read more
Developers and operators of educational technology services should take note. Just before the election, California Attorney General Kamala Harris provided a document laying out guidance for those providing education technology (“Ed Tech”).
Read more

What You Need to Know about the New Broadband Privacy Regulations

October 31, 2016 | Blog | By Christopher Harvie, Ari Moskowitz

As we previewed last week, the Federal Communications Commission (FCC) has adopted new privacy rules that govern Internet service providers' (ISPs) handling of broadband customer information.
Read more
Over the last week, details have become available to explain how an attack against a well-known domain name service (DNS) provider occurred. What about the potential legal risks?
Read more

FCC Adopts Controversial Broadband Privacy Regs

October 27, 2016 | Blog | By Cynthia Larose

BREAKING NEWS -
The FCC has voted 3-2 along party lines to require internet service providers (ISPs) to get a customer's explicit consent before they can use or share what is termed "sensitive" personal information.
Read more

Insurance Regulators Fine Tuning Cybersecurity Guidance

October 25, 2016 | Blog | By Julia Siripurapu, Michael Katz

You may not realize how much personal information your insurance company has about you. Scarier still is that much of this data is sensitive and valuable to hackers – such as your Social Security number, financial information, medical history, even itemized schedules of your most expensive personal property.
Read more

3 Guidelines to Maximize Value of Data

October 24, 2016 | Blog | By Cynthia Larose

Imagine you are the CEO of company sitting across from an interviewer. The interviewer asks you the age old question, “So tell me about your company’s strengths and weaknesses?" You start thinking about your competitive advantages that distinguish you from competitors.
Read more
It's time for a compliance check on those website or mobile app privacy policies, before the California Attorney General comes knocking.
Read more
Sign up to receive email updates from Mintz.
Subscribe Now

Days Left Until CCPA

Explore Other Viewpoints: