
Privacy & Cybersecurity
Viewpoints
Filter by:
More Detail on Quan Case
December 16, 2009 | Blog | By Cynthia Larose
My colleague, Martha Zackin, has published a more extensive discussion of the issues before the U.S. Supreme Court in the Quan case --
Read more
Holiday Privacy Watch: Take care before you donate that cell phone
December 8, 2009 | Blog | By Cynthia Larose
During the holiday season, many organizations are soliciting donations of old cell phones to be repurposed. This is an excellent way to "reuse, reduce, and recycle" and puts those useless (to you) items to use in a positive way, but please remember -- important and private data reside in your cell phone's internal memory, even if your phone has a removable SIM card.
Read more
Court issues written opinion explaining decision regarding applicability of Red Flags Rule to attorneys
December 3, 2009 | Blog | By Cynthia Larose
As we first blogged here, hours before the last Red Flags enforcement deadline, a federal court judge in the D.C. Circuit ruled from the bench that attorneys would not be subject to the Red Flags Rule. The court released Judge Walton's written opinion was released on December 1, 2009, which provides clarification of his comments from the bench.
Read more
$1.8 Million Verdict in Pretexting Case
October 29, 2009 | Blog | By Cynthia Larose
A Cook County, Illinois jury recently awarded $1.8 million dollars to Kathy Lawlor, who claimed that her former employer, North American Corp. of Illinois, violated her privacy rights by hiring a private investigator who fraudulently obtained her telephone records through the use of “pretexting” – or by pretending to be Lawlor herself.
Read more
More on the real cost of the Heartland breach
October 7, 2009 | Blog | By Cynthia Larose
Nearly 10 months after disclosing a months-long data breach that affected millions of consumers, the financial impact of the Heartland data breach continues to unfold.
Read more
Vets Data At Risk? Again?
October 6, 2009 | Blog | By Cynthia Larose
Wired.com reports on a possible breach at -- of all places -- the National Archives and Records Administration (NARA) that, if verified, could affect tens of millions of records about U.S. military veterans.
Read more
Check your employee handbook - what you might think is fraud and abuse may not be a federal case....
September 25, 2009 | Blog | By Cynthia Larose
My colleagues over at the Employment Matters blog report on an interesting decision drawing attention to the need for clear and explicit policies regarding "acceptable use" of computers and company information and the absolute necessity to terminate access once an employee or contractor is terminated.
Read more
What is "reasonable expectation of privacy" in an employment context?
September 21, 2009 | Blog | By Cynthia Larose
A recent decision by the Maine Supreme Court highlights the tension between an employee's reasonable expectation of privacy in conducting personal business through a company's computer system and the individual's right to prevent the company's publishing of such material.
Read more
BREAKING NEWS - Changes to 201 CMR 17.00
August 17, 2009 | Blog | By Cynthia Larose
Just released - proposed amendments to the Massachusetts data security regulations -- and a three-month extension of time to comply. Stay tuned for a full analysis.
Read more
Privacy and Security Bits and Bytes
August 14, 2009 | Blog | By Cynthia Larose
Just some nuggets to wrap up the week:
Read more
Data Breach du Jour ....
August 14, 2009 | Blog | By Cynthia Larose
The Associated Press reports that American Express has notified some card-holders that their information may have been compromised. According to an American Express spokesperson, the breach resulted from an employee’s recent theft of data.
Read more
Do you market to 'tweens?? Better watch out for the new Maine law.....
July 24, 2009 | Blog | By Cynthia Larose
Maine Governor John Baldacci has signed a sweeping new law called "An Act to Prevent Predatory Marketing Practices to Minors." While that is a laudatory effort and responsible marketers would not want to be predatory, it is not difficult to see this law as overreaching.
Read more
State BT Legislation
July 13, 2009 | Blog | By Cynthia Larose
Much as it is with general federal privacy legislation, nature abhors a vacuum, and the states take up the "hot potato."
Read more
North Korea behind denial of service attacks?
July 9, 2009 | Blog | By Cynthia Larose
Reports today are indicating that several South Korean Web sites have been attacked again. Several officials have voiced speculation that North Korea was behind both today's denial of service attacks and last week's wave of outages that hit sites in both the U.S. and South Korea. No comment from Pyongyang.
Read more
Not "Clear" What Happens to Passenger Data.....
June 23, 2009 | Blog | By Cynthia Larose
Bad news if you were a frequent flyer who ponied up the $199 annual fee to participate in Verified Identity Pass, Inc.'s registered traveler program, branded as "Clear." Last night, the company announced that it was "unable to negotiate an agreement with its senior creditor" and shut down. Membership fees will not be refunded.
Read more
FTC Issues Consent Order for GLBA Violations
June 18, 2009 | Blog | By Cynthia Larose
In the run-up to the enforcement deadline for the Identity Theft Red Flag Rule (August 1, 2009 - more on that in another post), enforcement of the Gramm-Leach-Bliley Privacy Rule and Safeguards Rule has not been forgotten by the Federal Trade Commission.
Read more
Explore Other Viewpoints:
- Data Centers & Digital Infrastructure
- AI: The Washington Report
- Antitrust
- Appellate
- Arbitration, Mediation & Alternate Dispute Resolution
- Artificial Intelligence
- Awards
- Bankruptcy & Restructuring
- California Land Use
- Cannabis
- Class Action
- Complex Commercial Litigation
- Construction
- Consumer Product Safety
- Corporate Governance (ESG)
- Cross-Border Asset Recovery
- DEI Legal Developments
- Debt Financing
- Direct Investing (M&A)
- Diversity
- EB-5 Financing
- Education & Nonprofits
- Employment
- EnforceMintz
- Environmental (ESG)
- Environmental Enforcement Defense
- Environmental Law
- Environmental, Social, and Corporate Governance (ESG)
- FDA Regulatory
- False Claims Act
- Federal Circuit Appeals
- Financial Institution Litigation
- Government Law
- Growth Equity
- Health Care
- Health Care Compliance, Fraud and Abuse, & Regulatory Counseling
- Health Care Enforcement & Investigations
- Health Care Transactions
- Health Information Privacy & Security
- IP Due Diligence
- IPRs & Other Post Grant Proceedings
- Immigration
- Impacts of a New US Administration
- Insolvency & Creditor Rights Litigation
- Institutional Investor Class Action Recovery
- Insurance & Financial Services
- Insurance Consulting & Risk Management
- Insurance and Reinsurance Problem-Solving & Dispute Resolution
- Intellectual Property
- Investment Funds
- Israel
- Licensing & Technology Transactions
- Life Sciences
- Litigation & Investigations
- M&A Litigation
- ML Strategies
- Medicare, Medicaid and Commercial Coverage & Reimbursement
- Mergers & Acquisitions
- Patent Litigation
- Patent Prosecution & Strategic Counseling
- Pharmacy Benefits and PBM Contracting
- Portfolio Companies
- Privacy & Cybersecurity
- Private Client
- Private Equity
- Pro Bono
- Probate & Fiduciary Litigation
- Products Liability & Complex Tort
- Projects & Infrastructure
- Public Finance
- Real Estate Litigation
- Real Estate Transactions
- Real Estate, Construction & Infrastructure
- Retail & Consumer Products
- Securities & Capital Markets
- Securities Litigation
- Social (ESG)
- Special Purpose Acquisition Company (SPACs)
- Sports & Entertainment
- State Attorneys General
- Strategic IP Monetization & Licensing
- Sustainable Energy & Infrastructure
- Tax
- Technology
- Technology, Communications & Media
- Technology, Communications & Media Litigation
- Trade Secrets
- Trademark & Copyright
- Trademark Litigation
- Unified Patent Court (UPC)
- Value-Based Care
- Venture Capital & Emerging Companies
- White Collar Defense & Government Investigations
- Women's Health and Technology