
Privacy & Cybersecurity
Viewpoints
Filter by:
The Tale of Two Banks: Final Settlement in Maine Bank Security Practices Case and a Failure of Bank Security Procedures in Florida
December 5, 2012 | Blog | By Cynthia Larose
People's United Bank of Maine has agreed to pay about $ 390,000 to settle a claim that its security practices allowed unauthorized persons to withdraw funds from a construction company's account (Patco Construction Co. v. People's United Bank, D. Me., No. 09-503, agreed dismissal filed 11/19/12).
Read more
Data Privacy and Security Issues for the Nonprofit
December 5, 2012 | Blog | By Cynthia Larose
Can your organization answer "yes" to any of the following questions?
Read more
OCR Issues Guidance Methods for De-Identification of PHI Under HIPAA
November 29, 2012 | Blog | By Cynthia Larose
The U.S. Department of Health and Human Services Office for Civil Rights (OCR) has released guidance on the methods that covered entities and business associates can use to de-identify protected health information (PHI) in accordance with the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule.
Read more
The Unforeseeable Transaction: Apple Argues that the California Song-Beverly Credit Card Act Should Not Apply To Online Retailers
November 20, 2012 | Blog | By Cynthia Larose
When is a gallon of gas like an iTunes track? That may sound like a riddle from a Lewis Carroll novel, but it was one of the questions considered by the California Supreme Court during oral arguments in Apple v. Superior Court (Krescent) as Apple, Inc. attempted to persuade the Court that the Song-Beverly Credit Card Act of 1971, which prohibits retails from recording a customer’s personal identification information as a condition of accepting a credit card payment, does not apply to online retailers.
Read more
From Brussels: The New EU Data Protection Regulation -- Will they or won't they? And if so, when?
November 19, 2012 | Blog | By Cynthia Larose
Sometimes the most interesting things that emerge from conferences are whispered across the aisle just after a presentation or debated by attendees off-site over a glass or two of wine.
Read more
California's AG Puts Mobile Apps on Notice
November 6, 2012 | Blog | By Cynthia Larose
If a haunted house or trick-or-treating was your scariest experience last week, you must not be one of the 100 mobile application developers who received a notice of non-compliance from California Attorney General Kamala D. Harris.
Read more
The FTC Fires Back Against Wyndham
November 2, 2012 | Blog | By Cynthia Larose
The Federal Trade Commission (the “FTC”) has filed its response to the Wyndham Hotel & Resorts LLC’s (“Wyndham”) Motion to Dismiss.
Read more
Barnes & Noble PIN Pad Devices Hit By Hackers
October 25, 2012 | Blog | By Cynthia Larose
As the New York Times reports, Barnes & Noble disclosed this week that it learned over one month ago – on September 14 – that hackers broke into point of sale PIN pad devices at 63 Barnes & Noble stores around the country and stole credit and debit card information for customers who had made purchases at those stores.
Read more
Court Decision in Sony PlayStation Data Breach Case Places Burden on Plaintiffs to Allege Actual Damages
October 17, 2012 | Blog | By Cynthia Larose
Class action plaintiffs asserting claims against Sony in connection with the 2011 Sony PlayStation Network (“PSN”) data breach face permanent dismissal of their claims unless they can allege actual losses resulting from the breach.
Read more
Centers for Medicare & Medicaid Services (CMS) Falls Short in Response to Healthcare Data Breaches
October 13, 2012 | Blog | By Cynthia Larose
Last week, the U.S. Department of Health and Human Services Office of Inspector General (OIG) released the results of a study entitled CMS Response to Breaches and Medical Identity Theft.
Read more
Online and Off-Limits: New California Legislation Prohibits Employers from Requiring Access to Social Media Accounts of Employees
October 8, 2012 | Blog | By Cynthia Larose
Facebook announced last week that it now has upwards of 1 billion active users. That same week, over 10 million Twitter messages were sent during the U.S. presidential debate.
Read more
Two Upcoming Privacy Events
October 4, 2012 | Blog | By Cynthia Larose
We have two "Save the Date" announcements today - for registration information click on the links below:
Read more
State Data Breach Notification Matrix Update - Texas and Connecticut
October 3, 2012 | Blog | By Cynthia Larose
It’s time for an updated version of our “Mintz Matrix” – the Mintz Levin matrix of state data security breach notification laws. We update this matrix quarterly, or as developments dictate.
Read more
Recommended Reading - BYOD and Reasonable Security
September 28, 2012 | Blog | By Cynthia Larose
Much has been written, in this space and elsewhere, on the concept of "reasonable security" -- what constitutes "reasonable security," how much security is "reasonable," etc.
Read more
Beware the Weakest Link: Human Behavior
September 27, 2012 | Blog | By Cynthia Larose
Today's Washington Post includes a front page article that should serve as a warning to any employer about increasingly sophisticated social engineering attacks that exploit one key vulnerability that is essentially immune to technical solutions: their employees.
Read more
Apple Shareholders Request Information From Board on Privacy/Security Risk
September 26, 2012 | Blog | By Cynthia Larose
This week, Apple shareholders requested that its Board of Directors publish a report explaining how the board oversees privacy and data security risks. The proposal was prompted by concern that recent issues such as the unauthorized access to iPhone users’ address books and the release of one million Unique Device IDs could place the company’s growth opportunities at risk.
Read more
Mass Eye and Ear Infirmary Hit with $1.5M Breach Settlement
September 19, 2012 | Blog | By Cynthia Larose
As the old saying goes, "no good deed goes unpunished...." The most recent, published Office for Civil Rights (OCR) HIPAA enforcement action serves as an important reminder that self-reported breaches can and do lead to investigations and enforcement.
Read more
You’ve Got Mail: Senator Rockefeller Sends Letter to CEOs re: Cybersecurity....Reply Requested
September 19, 2012 | Blog | By Cynthia Larose
Senator John D. Rockefeller IV (D., W.Va.) recently sent a letter to the CEOs of all Fortune 500 companies asking the companies for more information about their cybersecurity practices.
Read more
Broad new data security rule proposed for federal contractors
September 11, 2012 | Blog | By Cynthia Larose
A new rule proposed for federal government contractors will require that all federal contracts over $100,000 (including contracts for commercial items and those to small businesses) will have to include a clause requiring the contractor to implement basic data security protections for any non-public data provided to the contractor by the federal government or generated by the contractor for the government.
Read more
Explore Other Viewpoints:
- Data Centers & Digital Infrastructure
- AI: The Washington Report
- Antitrust
- Appellate
- Arbitration, Mediation & Alternate Dispute Resolution
- Artificial Intelligence
- Awards
- Bankruptcy & Restructuring
- California Land Use
- Cannabis
- Class Action
- Complex Commercial Litigation
- Construction
- Consumer Product Safety
- Corporate Governance (ESG)
- Cross-Border Asset Recovery
- DEI Legal Developments
- Debt Financing
- Direct Investing (M&A)
- Diversity
- EB-5 Financing
- Education & Nonprofits
- Employment
- EnforceMintz
- Environmental (ESG)
- Environmental Enforcement Defense
- Environmental Law
- Environmental, Social, and Corporate Governance (ESG)
- FDA Regulatory
- False Claims Act
- Federal Circuit Appeals
- Financial Institution Litigation
- Government Law
- Growth Equity
- Health Care
- Health Care Compliance, Fraud and Abuse, & Regulatory Counseling
- Health Care Enforcement & Investigations
- Health Care Transactions
- Health Information Privacy & Security
- IP Due Diligence
- IPRs & Other Post Grant Proceedings
- Immigration
- Impacts of a New US Administration
- Insolvency & Creditor Rights Litigation
- Institutional Investor Class Action Recovery
- Insurance & Financial Services
- Insurance Consulting & Risk Management
- Insurance and Reinsurance Problem-Solving & Dispute Resolution
- Intellectual Property
- Investment Funds
- Israel
- Licensing & Technology Transactions
- Life Sciences
- Litigation & Investigations
- M&A Litigation
- ML Strategies
- Medicare, Medicaid and Commercial Coverage & Reimbursement
- Mergers & Acquisitions
- Patent Litigation
- Patent Prosecution & Strategic Counseling
- Pharmacy Benefits and PBM Contracting
- Portfolio Companies
- Privacy & Cybersecurity
- Private Client
- Private Equity
- Pro Bono
- Probate & Fiduciary Litigation
- Products Liability & Complex Tort
- Projects & Infrastructure
- Public Finance
- Real Estate Litigation
- Real Estate Transactions
- Real Estate, Construction & Infrastructure
- Retail & Consumer Products
- Securities & Capital Markets
- Securities Litigation
- Social (ESG)
- Special Purpose Acquisition Company (SPACs)
- Sports & Entertainment
- State Attorneys General
- Strategic IP Monetization & Licensing
- Sustainable Energy & Infrastructure
- Tax
- Technology
- Technology, Communications & Media
- Technology, Communications & Media Litigation
- Trade Secrets
- Trademark & Copyright
- Trademark Litigation
- Unified Patent Court (UPC)
- Value-Based Care
- Venture Capital & Emerging Companies
- White Collar Defense & Government Investigations
- Women's Health and Technology