
Privacy & Cybersecurity
Viewpoints
Filter by:
Notes from the Joint OCR/NIST HIPAA Security Conference
October 1, 2014 | Blog | By Cynthia Larose
As a service to our readers, we have distilled last week’s joint HHS Office of Civil Rights (OCR) and National Institute of Standards in Technology (NIST) conference, “Safeguarding Health Information: Building Assurance through HIPAA Security” into three phrases: (i) risk assessment, (ii) workforce training, and (iii) adequate encryption.
Read more
Time to Step Up Your COPPA Compliance
September 25, 2014 | Advisory | By Cynthia Larose
The Federal Trade Commission (FTC) has made good on its promise to actively enforce the recently amended Children’s Online Privacy Protection Act (COPPA). Here is what you should know about the latest enforcement actions against Yelp and TinyCo and how these might affect your business.
Read more
Time to Step Up Your COPPA Compliance
September 25, 2014 | Blog | By Cynthia Larose
As we promised in our post on the Yelp and TinyCo Federal Trade Commission COPPA enforcement actions, the Mintz Privacy Team has prepared an extensive review and analysis of both actions, and a helpful guide to avoiding COPPA violations.
Read more
Privacy Monday - September 22, 2014
September 22, 2014 | Blog | By Cynthia Larose
Happy autumnal equinox
Home Depot Breach - By the Numbers
Read more
Home Depot Breach - By the Numbers
BREAKING NEWS: THE COPPA ENFORCEMENT ACTIONS ARE HERE!
September 17, 2014 | Blog | By Cynthia Larose
As we predicted in prior blog posts (here and here), the Federal Trade Commission has begun its vigorous enforcement of the Amended COPPA Rule. And one of the players is not a child-related site, so read on.
Read more
NIST Issues Draft Report Enumerating Risks and Protections to Consider When Evaluating Mobile Apps for Your Enterprise
September 12, 2014 | Blog | By Cynthia Larose
As the world recovers from the excitement leading up to Tuesday’s Apple Live Event announcement of the new iPhone 6 and Apple Watch, mobile app developers are chomping at the bit to create software that leverages the new operating system and Apple’s widely-anticipated “HealthKit,” a purportedly secure platform that allows mHealth apps to share user’s health and fitness data with the new Health app and with each other.
Read more
California Sets the Curve with New Regulations on Collection and Use of Student Data
September 5, 2014 | Blog | By Cynthia Larose
When one thinks of the use of technology in school, often the first image that comes to mind is of students sending ill-advised Snapchats and making in-app purchases that line the pockets of the Kardashian family, rather than paying attention in geometry.
Read more
Another day, another data breach.....DIYers, beware. This time it's Home Depot.
September 3, 2014 | Blog | By Cynthia Larose
It appears that the data breach victim of the week (perhaps of the year) is The Home Depot. Brian Krebs has reported that it appears that two large dumps of purloined credit card numbers have made an appearance on the black market and that those numbers may have originated at Home Depot locations.
Read more
"Backoff" Update -- More Widespread, PCI Council Issues Call to Action -- If You Accept Credit Cards Via Point-of-Sale, You Need to Read This
August 28, 2014 | Blog | By Cynthia Larose
Some weeks ago, we wrote a piece "What You Need to Know About Backoff Malware: The New Threat Targeting Retailers". It's apparently gotten worse. Any business utilizing point-of-sale (POS) terminals for "swiping" credit cards needs to pay attention to this threat and assess vulnerability.
Read more
NIST Seeks Comments on Cybersecurity Framework
August 28, 2014 | Blog
The National Institute of Standards and Technology (NIST), publishers of the Framework for Improving Critical Infrastructure Cybersecurity (the “Framework”) last February, have published a Request for Information in the Federal Register seeking comments on industry experience with the Framework to date.
Read more
Do you want your under 13 kid to have a Gmail or YouTube account? Google does.....
August 22, 2014 | Blog | By Cynthia Larose
According to recent media reports, Google is allegedly designing a Google account for children under 13 which would permit children in this age group to officially create their own Gmail account and to access a kid-friendly version of YouTube.
Read more
Data Privacy and Security Roundtable: Anticipating the Inevitable
August 22, 2014 | Blog | By Cynthia Larose
Technology, retail, medical, financial services, education ..... and more experience data losses on a daily basis through employee negligence, poor controls, insider attacks, advanced persistent threats from malevolent outsiders or computer viruses.
Read more
Wearable Devices in the Workplace Challenge Data Security and Privacy
August 21, 2014 | Blog
Wearable devices, including health and activity monitors, video and audio recorders, location trackers, and other interconnected devices in the form of watches, wristbands, glasses, rings, bracelets, belts, gloves, earrings and shoes are being heavily promoted in the next wave of consumer electronics.
Read more
Wearable Devices in the Workplace Challenge Data Security and Privacy
August 21, 2014 | Advisory | By Jonathan T. Cain
Wearable devices, including health and activity monitors, video and audio recorders, location trackers, and other interconnected devices in the form of watches, wristbands, glasses, rings, bracelets, belts, gloves, earrings, and shoes are being heavily promoted in the next wave of consumer electronics.
Read more
Massive Data Breach Affects 4.5 Million Patients in 29 States
August 20, 2014 | Blog | By Cynthia Larose
Community Health Systems, Inc. (the “Company”), one of the largest hospital organizations in the country, announced via a public filing (Form 8K) made yesterday with the Securities and Exchange Commission (“Report”) that the Company was the target of a cyber attack that compromised the health data of 4.5 million individuals.
Read more
Cybersecurity Risks: Discussion for the Board Room (and for the General Counsel)
August 19, 2014 | Blog | By Cynthia Larose
The issue of cyberliability risk is finally making its way to the board room. We have written about the importance of board education and board involvement in the assessment of cyber threats and liability risk and the Securities and Exchange Commission is looking carefully at public company disclosures of cybersecurity risks as a factor for the investing public.
Read more
Google, the House of Lords and the timing of the EU Data Protection Regulation
August 19, 2014 | Blog
(LONDON) Could the European Court of Justice’s May 13, 2014 Google Spain decision delay the adoption of the EU Data Protection Regulation?
Read more
Privacy Monday - August 18, 2014
August 18, 2014 | Blog | By Cynthia Larose
There is another retail data breach to talk about in this Privacy Monday post – privacy & security bits and bytes to start your week.
Read more
Privacy Monday - August 11, 2014
August 11, 2014 | Blog | By Cynthia Larose
We are just two Mondays away from Labor Day, the traditional end of summer in the United States. Here are some privacy tidbits to get your week started. See especially Jake Romero's piece on the new Delaware data destruction law.
Read more
Microsoft Loses Round in Fight Over Email Held in Irish Data Center
August 8, 2014 | Blog | By Cynthia Larose
Rarely do Microsoft, AT&T, Verizon, Apple, Cisco and the ACLU all agree on a particular subject; rarer still that such an unlikely coalition fails.
Read more
Explore Other Viewpoints:
- Data Centers & Digital Infrastructure
- AI: The Washington Report
- Antitrust
- Appellate
- Arbitration, Mediation & Alternate Dispute Resolution
- Artificial Intelligence
- Awards
- Bankruptcy & Restructuring
- California Land Use
- Cannabis
- Class Action
- Complex Commercial Litigation
- Construction
- Consumer Product Safety
- Corporate Governance (ESG)
- Cross-Border Asset Recovery
- DEI Legal Developments
- Debt Financing
- Direct Investing (M&A)
- Diversity
- EB-5 Financing
- Education & Nonprofits
- Employment
- EnforceMintz
- Environmental (ESG)
- Environmental Enforcement Defense
- Environmental Law
- Environmental, Social, and Corporate Governance (ESG)
- FDA Regulatory
- False Claims Act
- Federal Circuit Appeals
- Financial Institution Litigation
- Government Law
- Growth Equity
- Health Care
- Health Care Compliance, Fraud and Abuse, & Regulatory Counseling
- Health Care Enforcement & Investigations
- Health Care Transactions
- Health Information Privacy & Security
- IP Due Diligence
- IPRs & Other Post Grant Proceedings
- Immigration
- Impacts of a New US Administration
- Insolvency & Creditor Rights Litigation
- Institutional Investor Class Action Recovery
- Insurance & Financial Services
- Insurance Consulting & Risk Management
- Insurance and Reinsurance Problem-Solving & Dispute Resolution
- Intellectual Property
- Investment Funds
- Israel
- Licensing & Technology Transactions
- Life Sciences
- Litigation & Investigations
- M&A Litigation
- ML Strategies
- Medicare, Medicaid and Commercial Coverage & Reimbursement
- Mergers & Acquisitions
- Patent Litigation
- Patent Prosecution & Strategic Counseling
- Pharmacy Benefits and PBM Contracting
- Portfolio Companies
- Privacy & Cybersecurity
- Private Client
- Private Equity
- Pro Bono
- Probate & Fiduciary Litigation
- Products Liability & Complex Tort
- Projects & Infrastructure
- Public Finance
- Real Estate Litigation
- Real Estate Transactions
- Real Estate, Construction & Infrastructure
- Retail & Consumer Products
- Securities & Capital Markets
- Securities Litigation
- Social (ESG)
- Special Purpose Acquisition Company (SPACs)
- Sports & Entertainment
- State Attorneys General
- Strategic IP Monetization & Licensing
- Sustainable Energy & Infrastructure
- Tax
- Technology
- Technology, Communications & Media
- Technology, Communications & Media Litigation
- Trade Secrets
- Trademark & Copyright
- Trademark Litigation
- Unified Patent Court (UPC)
- Value-Based Care
- Venture Capital & Emerging Companies
- White Collar Defense & Government Investigations
- Women's Health and Technology