Cybersecurity & Data Privacy

     
       

Publications

  • The Future of Stablecoins, Crypto Staking and Custody of Digital Assets

    The State of the Crypto Economy in the United States

    March 3, 2023

  • Meer and DAC Beachcroft London Attorneys Co-Author Article on Legal Privilege for Forensic Reports

    DAC Beachcroft Articles

    February 28, 2023

  • Illinois Supreme Court Expands Private Entities’ Exposure to Liability & Damages

    IL Supreme Court Expands Private Entities’ Exposure to Liability & Damages

    February 28, 2023

    A recent Illinois Supreme Court ruling that treats each scan of a person’s biometric information as a separate, actionable violation arguably incentivizes plaintiffs to delay bringing suit as long as possible for purposes of “racking up” damages. This is at least the third Illinois Supreme Court opinion that seemingly justifies exorbitant damage awards as a way to encourage private businesses to comply with BIPA.

  • Illinois Supreme Court Holds Five-Year Statute of Limitations Applies to All Causes of Action Alleging Violations under All Sections of BIPA

    Illinois Supreme Court Decision in Tims v. Black Horse Carriers

    February 9, 2023

    The Illinois Supreme Court held a five-year limitations period applies to all causes of action under BIPA, rejecting the First District’s bifurcated approach, which applied a one-year limitations period to certain sections and a five-year limitations period to others.

  • Practical Implications of Travelers v. ICS for Cyber Insurance Brokers, Carriers and Policyholders: Emerging Trends & Predictions – Takeaways from the Cyber Insurance Webinar

    Cyber Insurance Trends & Predictions

    February 8, 2023

    An August 2022 Illinois District Court cyber insurance case emphasizes the need for insurers to be robust in their underwriting of potential insureds before taking on risk, while underscoring the critical requirement that potential insureds should answer questions thoroughly and truthfully and not omit any vital information that could later be construed as misrepresentations and void the policy.

  • The D&O Diary Publishes Meer on Cryptocurrency's Impact on Directors and Officers

    The D&O Diary

    February 7, 2023

  • Westlaw Today Hosts Mirarchi and DiMeo Article on Consumer Data Privacy

    Westlaw Today, Thomson Reuters

    February 7, 2023

  • How Buying Pet Stairs Led to a Class Action Lawsuit over Wiretapping

    Third Circuit Opinion under Pennsylvania’s Wiretapping and Electronic Surveillance Control Act

    February 1, 2023

    A recent Third Circuit opinion underscores the need for Pennsylvania businesses and digital marketing firms providing services in the Commonwealth to obtain consent from consumers prior to collecting their data or installing cookies on a browser.

  • Law360 Publishes Ackerman and Stutz on Compliance Issues Stemming from Employee Biometric Data Privacy

    Law360

    January 31, 2023

  • Law360 Launches Series of Das Articles on Cryptocurrency

    Law360

    January 27, 2023

  • CLM Magazine Publishes Stutz and Ackerman on BIPA Class Action Litigation Trends

    CLM Magazine

    January 25, 2023

  • Insurers Beware of “Silent Crypto” Exposure: PART IV: Crime and Custody Coverage for Crypto Assets

    Crime and Custody Coverage for Crypto Assets: Last of Four-Part Series

    January 19, 2023

    Silent cyber, move aside – silent crypto is the new kid on the block. For the past few years, as cyber-attacks have proliferated, insurance carriers have been forced to address potential “silent cyber” exposure in conventional, non-cyber liability insurance policies. Now, carriers may be forced to contend with “silent crypto” exposure that they did not intend to insure. The recent implosion of crypto firm FTX and its affiliates provides a case study for potential crypto exposure under traditional insurance policies. Using the FTX debacle, this series discusses potential liability exposure and coverage under Directors and Officers and Corporate Liability Insurance (Part I), Accountants Professional Liability Insurance (Part II), Lawyers Professional Liability Insurance (Part III), and Crime and Custody Coverage for Crypto Assets (Part IV).

  • Insurers Beware of “Silent Crypto” Exposure: PART III, Silent Crypto Exposure for Lawyers

    Silent Crypto Exposure for Lawyers: Third of Four-Part Series

    January 17, 2023

    Silent cyber, move aside – silent crypto is the new kid on the block. For the past few years, as cyber-attacks have proliferated, insurance carriers have been forced to address potential “silent cyber” exposure in conventional, non-cyber liability insurance policies. Now, carriers may be forced to contend with “silent crypto” exposure that they did not intend to insure. The recent implosion of crypto firm FTX and its affiliates provides a case study for potential crypto exposure under traditional insurance policies. Using the FTX debacle, this series discusses potential liability exposure and coverage under Directors and Officers and Corporate Liability Insurance (Part I), Accountants Professional Liability Insurance (Part II), Lawyers Professional Liability Insurance (Part III), and Crime and Custody Coverage for Crypto Assets (Part IV).

  • Insurers Beware of “Silent Crypto” Exposure: PART II, Silent Crypto Exposure for Accountants

    Silent Crypto Exposure for Accountants: Second of Four-Part Series

    January 12, 2023

    Silent cyber, move aside – silent crypto is the new kid on the block. For the past few years, as cyber-attacks have proliferated, insurance carriers have been forced to address potential “silent cyber” exposure in conventional, non-cyber liability insurance policies. Now, carriers may be forced to contend with “silent crypto” exposure that they did not intend to insure. The recent implosion of crypto firm FTX and its affiliates provides a case study for potential crypto exposure under traditional insurance policies. Using the FTX debacle, this series, discusses potential liability exposure and coverage under Directors and Officers and Corporate Liability Insurance (Part I), Accountants Professional Liability Insurance (Part II), Lawyers Professional Liability Insurance (Part III), and Crime and Custody Coverage for Crypto Assets (Part IV).

  • Insurers Beware of “Silent Crypto” Exposure: PART I, Silent Crypto for D&O and Corporate Liability Insurance

    Silent Crypto for D&O and Corporate Liability Insurance: First of Four-Part Series

    January 9, 2023

    Silent cyber, move aside – silent crypto is the new kid on the block. For the past few years, as cyber-attacks have proliferated, insurance carriers have been forced to address potential “silent cyber” exposure in conventional, non-cyber liability insurance policies. Now, carriers may be forced to contend with “silent crypto” exposure that they did not intend to insure. The recent implosion of crypto firm FTX and its affiliates provides a case study for potential crypto exposure under traditional insurance policies. Using the FTX debacle, this series discusses potential liability exposure and coverage under Directors and Officers and Corporate Liability Insurance (Part I), Accountants Professional Liability Insurance (Part II), Lawyers Professional Liability Insurance (Part III), and Crime and Custody Coverage for Crypto Assets (Part IV).

  • Insurers Beware of “Silent Crypto” Exposure

    Insurers Beware of “Silent Crypto” Exposure: INTRODUCTION TO FOUR-PART SERIES

    January 4, 2023

    Silent cyber, move aside – silent crypto is the new kid on the block. For the past few years, as cyber-attacks have proliferated, insurance carriers have been forced to address potential “silent cyber” exposure in conventional, non-cyber liability insurance policies. Now, carriers may be forced to contend with “silent crypto” exposure that they did not intend to insure. The recent implosion of crypto firm FTX and its affiliates provides a case study for potential crypto exposure under traditional insurance policies. Using the FTX debacle, described herein, this series of four articles discusses potential liability exposure and coverage under Directors and Officers and Corporate Liability Insurance (Part I), Accountants Professional Liability Insurance (Part II), Lawyers Professional Liability Insurance (Part III), and Crime and Custody Coverage for Crypto Assets (Part IV).

  • Westlaw Today Publishes Bridges on Cybersecurity Defense in Schools and Municipalities

    Westlaw Today

    December 23, 2022

  • Wilson Elser and Lockton Issue Report Summarizing Developments in the Cyber and Data Privacy Regulatory Landscape

    The Cyber Regulatory Landscape Entering 2023

    December 8, 2022

  • Wolters Kluwer Features Article by Mendez on Transatlantic Data Transfers

    The Computer & Internet Lawyer

    January 2023

  • The Demise of FTX Foreshadows the Rise of Regulatory Oversight of Crypto Markets

    FTX and the Rise of Regulatory Oversight of Crypto Markets

    November 29, 2022

    In the wake of the rapid and unprecedented collapse of Bahamas-based crypto exchange FTX Digital Markets, the SEC and Department of Justice are conducting investigations of FTX and its principals. Congressional hearings are expected to take place in December, and a new Digital Assets Working Group has been formed as a subcommittee of the U.S. House of Representatives Committee on Financial Services.
  • Westlaw Today Publishes Das on Potential Need For Regulation of Digital Assets

    Westlaw Today

    November 10, 2022

  • Westlaw Today Publishes Ross and Russell on the Hidden Perils of Cyber Breach Notification Regulations

    Westlaw Today

    November 3, 2022

  • Casting a Wide Net on Privacy: California’s Age-Appropriate Design Code Act and Implications for Businesses and Covered Entities

    California’s Age-Appropriate Design Code Act

    November 2, 2022

    Similar to the UK’s Age-Appropriate Design Code, California’s Age-Appropriate Design Code Act focuses on protecting children online by imposing heightened obligations on businesses with online products, services and features that are “likely to be accessed by a child.”

  • Class Certification Denied in California Data Breach Case

    Class Certification Denied in California Data Breach Case

    October 25, 2022

    A recent California Court of Appeal decision underscores the fact that, in the data breach context, individualized issues may predominate over common issues. Accordingly, defendants in a data breach class action should seek to oppose class action certification by demonstrating that any purported injury to each individual requires a fact-specific inquiry that does not apply to the class as a whole.

  • Bloomberg Law Features Cahill and Farmer Article on Crypto Business Deals

    Bloomberg Law, Tech & Telecom Law

    October 18, 2022

  • Law360 Publishes Das and Rizzo on Clarification of Data Breach Standing

    Law360 Expert Analysis

    October 17, 2022

  • DAOs: A Game Changer in Need of New Rules

    Westlaw Today

    October 6, 2022

  • Westlaw Today Features Article on Artificial Intelligence Co-Authored by Horres

    Thomson Reuters Westlaw Today

    September 29, 2022

  • American Data Privacy and Protection Act: Are We Finally Getting Federal Data Privacy Protection?

    American Data Privacy and Protection Act

    September 21, 2022

    Although the House Committee on Energy and Commerce has progressed the American Data Privacy and Protection Act to the House after it proposed changes, the Act probably will remain at a stand-still due to elections, but ADPPA likely will be a priority once a new Congress assembles.

  • Plaintiffs’ Attorneys Racing to Courthouses in the United States to File Data Breach Class Actions

    DAC Beachcroft

    August 29, 2022

  • NY Crypto Moratorium Would Provoke Miner Exodus

    Law360

    July 29, 2022

  • First DOJ NFT Insider Trading Charges Mark New Enforcement Era

    Bloomberg Law

    June 29, 2022

  • Westlaw Today Features Data Privacy Article by Farmer and Bortnick

    Westlaw Today

    June 26, 2022

  • Westlaw Today Publishes Horres and Steiger on AI’s Infiltration into the Legal Realm

    Westlaw Today

    June 2, 2022

  • Bitcoin Magazine Publishes Stafford on President Biden’s Executive Order on Bitcoin

    Bitcoin Magazine

    May 23, 2022

  • Northern District of Illinois Decisions Find Access or Disclosure Exclusion Precludes Coverage for BIPA Claims, Creating a New Split in the District

    Illinois Northern District Split on Coverage for BIPA Claims

    April 29, 2022

    Recent decisions in the Northern District of Illinois held the Access or Disclosure Exclusion, which is commonly found in general liability policies, unambiguously bars coverage for claims under the Illinois Biometric Information Privacy Act. This is a departure from other recent decisions within the District that held the exclusion did not unambiguously exclude such coverage.

  • Does the Employment-Related Practices Exclusion Preclude a Duty to Defend for Claims Under Illinois BIPA?

    ND Ill. Courts Split on Insurer’s Duty to Defend for Employees’ BIPA Claims

    March 22, 2022

    On March 8, 2022, a federal court in the Northern District of Illinois held an Employment-Related Practices Exclusion in a general liability policy does not preclude a defense obligation for a proposed class action brought by the insureds’ employees under the Illinois Biometric Information Privacy Act. The court further found that a jury needs to decide whether the insureds breached the “as soon as practicable” notice condition in the policy by waiting 20 months to provide notice to the insurer.

  • Westlaw Today Publishes Horres on Hiring in the AI Field

    Westlaw Today

    March 21, 2022

  • Utah Consumer Privacy Act

    Utah Consumer Privacy Act

    March 16, 2022

    The Utah Consumer Privacy Act, once signed into law, will take effect December 31, 2023, and make Utah the fourth state with a comprehensive consumer privacy law. The Act provides consumers with broad protection and rights concerning the collection, use, processing, sharing and sale of their personal information. Businesses that fail to comply may be subject to significant fines and penalties.

  • Ukraine Crisis Increases Supply Chain Cyber Risk

    Ukraine Crisis Increases Supply Chain Cyber Risk

    March 11, 2022

    Last year, cyber threats on global supply chains were in the spotlight following the unprecedented cyber-attacks on Colonial Pipeline, JBS and SolarWinds, attacks that had far-reaching consequences for downstream businesses, customers and individual consumers. The current geopolitical climate and escalating crisis in Ukraine is amplifying concerns about the increased cyber threat to global supply chains already strained by the COVID-19 pandemic..

  • Do Certain Exclusions Preclude a Duty to Defend for Claims Under the Illinois Biometric Information Privacy Act?

    Do Certain Exclusions Preclude a Duty to Defend for Claims Under Illinois BIPA?

    March 10, 2022

    Conflicting federal district court decisions highlight that the outcome of duty to defend claims under the Illinois Biometric Information Privacy Act (BIPA) may hinge on venue and/or choice of law considerations. Insurers should evaluate these considerations closely and examine how various jurisdictions handle certain general liability exclusions in other contexts in an effort to predict how a particular court may rule on coverage for BIPA claims.

  • Web Accessibility Claims Put Institutions of Higher Learning at Risk

    Web Accessibility Claims Put Institutions of Higher Learning at Risk

    March 7, 2022

    Institutions for higher education are common targets for web accessibility claims. The constantly rotating mix of students who apply to and attend school each year present a bevy of new potential plaintiffs with different disabilities and unique experiences. As such, schools must monitor compliance and continually strive to be accessible.
  • China’s New Personal Information Protection Law

    China’s New Personal Information Protection Law

    December 2, 2021

    China’s new Personal Information Protection Law affords the country’s residents greater protection and rights over their personal data. Domestic and foreign organizations are subject to the heightened requirements, and failure to comply may subject organizations to substantial regulatory fines and penalties, revocation of business licenses, legal action and even personal liability.
  • Mitigating Supply Chain Cyber Risk

    Mitigating Supply Chain Cyber Risk

    October 25, 2021

    Blissful ignorance is not a viable defense to an organization’s third-party cyber risk, and its supply chain is one of the most vulnerable areas when it comes to data security. As ransomware attacks increase, regulators are directing their scrutiny toward companies’ information security programs. While management has responded by increasing their information security program budgets, supply chain risk departments continue to be ignored. Supply chain cyber risk is a large task, but it can be brought under control by focusing on a few key steps to manage third-party risk.

  • North Carolina Federal Court Finds No Duty to Defend Illinois BIPA Suit

    North Carolina Federal Court Finds No Duty to Defend Illinois BIPA Suit

    October 13, 2021

    The Middle District of North Carolina recently found that a newer version of the “Recording and Distribution of Material or Information” exclusion barred coverage for an Illinois BIPA suit. With only a handful of decisions concerning insurance coverage for lawsuits involving Illinois BIPA claims, the North Carolina federal court recently handed a welcome victory to insurers. In finding a newer version of the “Recording and Distribution of Material or Information” exclusion barred coverage for a putative BIPA class action suit, the North Carolina court found the wording of the exclusion broader than the older wording of a similar exclusion evaluated in a recent Illinois Supreme Court decision.

  • Illinois First District Appellate Court Provides Some Clarity on BIPA Statute of Limitations

    Statute of Limitations for BIPA Claims

    September 28, 2021

    After roughly seven years of inactivity, litigation related to the Illinois Biometric Information Privacy Act has grown exponentially since 2015. While the statute provides guidelines for companies collecting biometric data, its practical application in the court system has been much less clear. Recently, one of the most significant questions was addressed by the First District: What is the statute of limitations for BIPA claims?
  • Amwins Publishes Bortnick’s Cyber Security Checklist for Company Liability Protection

    Amwins

    September 28, 2021

  • Ransom Demands: To Pay or Not to Pay?

    U.S. Treasury Advisory on Cyber Ransom Demands

    September 24, 2021

    On September 21, 2021, the U.S. Department of the Treasury issued an updated advisory cautioning companies against the potential to incur sanctions by making ransom payments to cybercriminals, putting pressure on companies not to pay.

  • Online and Offline Disclosure of Data Collection Practices under California’s Privacy Law

    Data Collection Practices Disclosure under California’s Privacy Law

    September 14, 2021

    In accordance with the California Consumer Privacy Act and associated regulations, businesses that collect personal information from a consumer must provide notice at the time of collection. Recent enforcement actions by the California Attorney General illustrate this point and remind businesses of the importance of apprising consumers online and offline of their privacy policies.

  • New Law Expands California Consumer Privacy Rights and Protections

    California Consumer Privacy Rights & Protections

    August 24, 2021

    Any organization that conducts business in the state of California, collects or processes personal information, and meets one or more select criteria should assess their compliance with the California Privacy Rights Act, set to take effect on January 1, 2023. Failure to comply may subject companies to enforcement actions and stiff fines and penalties by regulators.

  • The SEC’s Latest Salvo on Cybersecurity Disclosures: A $1 Million Penalty and Cease & Desist Order

    SEC’s Latest Salvo on Cybersecurity Disclosures

    August 20, 2021

    Federal regulators, like their state counterparts, are keenly mindful of the impact of a privacy incident and see alternative paths to protect personal information and generate revenues for their governmental bodies. The SEC has stepped into the breach, initiating a number of cybersecurity disclosure proceedings, the most recent being a civil penalty of $1 million on Pearson plc, a London-based multinational educational publishing and services company, for misleading investors about a 2018 data breach that involved the theft of millions of student records.
  • New York City Introduces Biometric Identifier Information Act

    New York City Biometric Identifier Information Act

    August 18, 2021

    Following in the footsteps of the Illinois Biometric Information Privacy Act, the City of New York has enacted its own Biometric Identifier Information Act. Like its root, this new law is designed to protect and limit the use of consumers’ biometric data, which is highly personal and irreplaceable. Companies that fail to adhere to the new law may be subject to lawsuits and sizeable statutory damages.

  • Advisen Publishes Bortnick on Privacy Compliance for Small and Medium-Sized Businesses

    August 17, 2021

  • Connecticut Expands Protection of Personal Information, Incentivizes Adoption of Cybersecurity Standards for Businesses

    Connecticut Updates Privacy and Cybersecurity Laws

    August 11, 2021

    Effective October 1, 2021, Connecticut’s updated privacy and cybersecurity laws seek to strike a balance between protecting individuals and providing businesses with guidance in compliance and risk management, including limiting potential liability for punitive damages if businesses comply with statutory requirements.
  • New York Cracks Down on Cybersecurity Compliance

    New York FAQs on Cybersecurity Compliance

    August 9, 2021

  • Bortnick Co-Authors Cybersecurity Checklist for AMWINS Newsletter

    August 9, 2021

  • Trifecta of New Privacy Laws Protect Personal Data

    Three States’ Privacy Laws Protect Personal Data Rights

    August 3, 2021

    The Colorado Privacy Act and the Virginia Consumer Data Protection Act mimic California privacy laws and the EU General Data Protection Regulation (GDPR) by imposing stringent requirements on companies that collect or process personal data of state residents.

  • PLUS Blog Features Article by Meer on Corporate Liability Concerns and BIPA

    Plus Blog

    June 30, 2021

  • The Growing Biometric Privacy Liability

    The number of electronic privacy statutes enacted in the United States and abroad has grown substantially

    June 29, 2021

  • Trasatti Authors 2020 Data Privacy Compendium

    November 11, 2020

  • California Voters Expand Consumer Data Privacy with Approval of California Privacy Rights and Enforcement Act of 2020

    California Privacy Rights and Enforcement Act of 2020

    November 6, 2020

    The California Privacy Rights and Enforcement Act goes into effect in January 2023. Although this controversial ballot measure was meant to expand and make permanent the consumer protections within the California Consumer Privacy Act of 2018 (CCPA), privacy groups have expressed concern that the new law will place an unnecessary burden on businesses that are only now learning how to properly comply with the CCPA and that it may actually reduce consumer rights in important ways.
  • U.S. Government Warns Companies of Legal Risk for Paying Ransom to Cybercriminals

    Legal Risk of Paying Ransom to Cybercriminals

    October 6, 2020

    On October 1, 2020, the U.S. Department of the Treasury issued an advisory on potential risks of sanctions for organizations that facilitate ransom payments. Companies, their cyber insurers and third parties that assist in facilitating payments to cybercriminals might be subject to liability and hefty penalties under federal laws.
  • What’s the Big Deal About Privacy? How Artificial Intelligence Is Making It Critical to Control Transactions of Data

    In-House Defense Quarterly

    Spring 2020

  • What’s the Big Deal about Privacy?

    How Artificial Intelligence Is Making It Critical to Control Transactions of Data

    Influence of Artificial Intelligence on Data Transactions

    January 30, 2020

    AI companies that work with insurers to optimize claims processing are left with a valuable resource after the data collection is complete. This article addresses how the value of a neural network − learned intelligence through artificial intelligence − has been ignored and should be considered when an insurer considers outsourcing its claims processing.

  • California Consumer Privacy Act: Are You Ready?

    January 3, 2020

    Effective January 1, 2020, the California Consumer Privacy Act (CCPA) recognizes and enforces California consumers’ right to privacy and control over their personal information.
  • Check the boxes to help ensure compliance with HIPAA security and privacy rules!

    December 16, 2019

    As the year draws to a close, it’s an especially good time to review your businesses’ cybersecurity policies and procedures as they relate to electronic protected health information under HIPAA regulations.
  • California Consumer Privacy Act Update: Amendments and Proposed Regulations

    California Consumer Privacy Act Effective January 1: UPDATE

    December 3, 2019

    Public hearings were scheduled for the first week in December to receive comments on proposed regulations to the California Consumer Privacy Act, which goes into effect on January 1, 2020. Written comments will be accepted by the California Attorney General until 5:00 p.m. on December 6, 2019. The final regulations are expected to be released in early 2020 and will be enforced beginning in July 2020.

  • Ready or Not, the Data Privacy Revolution Is Here

    In-House Defense Quarterly

    Summer 2019

  • No Damages Required to Sue Under Illinois Biometric Information Privacy Act

    Illinois Biometric Information Privacy Act

    February 20, 2019

    The Illinois Supreme Court gave the state’s Biometric Information Privacy Act more “punch” in a recent opinion holding that an individual does not need to prove harm to recover − a technical violation of the Act is sufficient to constitute standing.

  • HHS Releases New Cybersecurity Guidance for the Health Care Industry

    HHS Releases Cybersecurity Guidance for Health Care

    January 29, 2019

  • Directors and Officers: Be Wary of Growing Cyber Responsibilities

    BLD Financial Lines Newsletter

    December 2018

  • Formal Opinion 483: ABA’s New Breach Notification Obligations for Lawyers and Law Firms

    New Breach Notification Obligations for Lawyers and Law Firms

    October 30, 2018

    The idea behind the American Bar Association’s Formal Opinion 483 is to make sure that lawyers, despite their attempts to limit and prevent cyber threats, are still prepared to deal with a data breach when one occurs so clients can stay informed regarding their representation. The opinion closes by stressing that lawyers are still obligated to consult the relevant regulatory and statutory schemes in addition to the model rules to fully ensure they are properly keeping their clients informed in the event of a breach. 

  • Global Privacy Law Update

    July – August 2018

  • Strict Notification & Disclosure Requirements for Government Contractors

    Notification & Disclosure Requirements for Government Contractors

    August 30, 2018

    Businesses that seek to obtain and preserve contracts with the U.S. government, or to deal in certain enumerated defense articles and services, are subject to strict privacy regulations. These include the Defense Federal Acquisition Regulation Supplements, which impose stringent minimum security requirements and reporting obligations, and the International Traffic in Arms Regulations, which contain approval, registration and records maintenance requirements.

  • U.S. Companies Still Grappling with GDPR

    Implications of GDPR for U.S. Companies

    August 21, 2018

    The extra-territorial reach of the EU’s new General Data Protection Regulation means that non-EU companies that collect, store, transfer or otherwise process personal data of EU residents may be required to obtain express consent to use an individual’s personal data, in addition to maintaining internal records of the company’s personal data processing activities. Moreover, companies may have a mere 72 hours to notify EU regulatory authorities of a data breach involving the personal data of EU residents.

  • Uptick in Australian Data Breach Notifications

    Australian Data Breach Notifications Increase

    July 30, 2018

    Under Australia’s Notifiable Data Breach Scheme, organizations, not limited to Australian companies, will be forced to promptly respond to and investigate actual or suspected data breaches concerning personal information. Failure to do so may result in the commencement of a regulatory action and/or the imposition of civil penalties. Companies with potential exposure are encouraged to become familiar with the new legal requirements.

  • Canada’s New Data Breach Notification Law

    Canada’s Personal Information Protection and Electronic Documents Act

    July 23, 2018

    On November 1, 2018, the long-awaited amendments to Canada’s Personal Information Protection and Electronic Documents Act will go into effect. These amendments and related regulations impose new mandatory notification obligations on companies in the event of a breach involving the personal information of Canadians.

  • New Sweeping California Privacy Law

    New Sweeping California Privacy Law

    July 11, 2018

    While the California Consumer Privacy Act does not take effect until 2020, it is likely to spur other states – and perhaps the federal government – to enact broader legislative protections for the collection and use of individuals’ personal information. Meanwhile, all entities that do business in California and collect personal information of Californians should take prompt action to review and revise related assets and materials.

  • California Cannabis Data Security Vulnerabilities

    California Cannabis Data Security Vulnerabilities

    July 9, 2018

    To comply with California’s Cannabis Track and Trace METRC system, business operators must maintain a large amount of valuable data throughout the cannabis life cycle and down the supply chain, increasing the risk of liability in the event of a cybersecurity incident. Cannabis companies would be wise to consider implementing additional best practices to decrease their exposure to data security threats.

     

  • Colorado Considers Expansion of Its Privacy and Data Breach Regulations

    Colorado Privacy and Data Breach Regulations

    March 22, 2018

    If Colorado enacts proposed new legislation, it would be among a handful of states with the shortest notification timeline in the country for data breach events. While the 30-day deadline provides consumers the opportunity to quickly respond to the improper release of sensitive information, it clearly shortens the period within which companies are required to react.

  • The Secret Lives of Apps

    Professional Times

    March 6, 2018

  • Beware: Texts and Wearable Data Must Be Preserved, Too

    The Legal Intelligencer

    February 5, 2018

  • (Another) Federal Data Breach Notification Law Introduced in Congress

    Senate Dems Introduce Legislation after Widespread Data Breaches

    December 18, 2017

    The proposed Data Security and Breach Notification Act would apply to companies that acquire, maintain or use consumers’ personal information. If passed into law, this bill would replace the patchwork of 48 separate state breach notification laws and standardize breach reporting requirements, which currently vary from state to state.

  • What New Cyber Protocol Rules in New York Mean for Directors and Officers

    NY Department of Financial Services Cybersecurity Regulation

    December 6, 2017

    Under 23 NYCRR Part 500, effective in March 2017, New York provided clear notice that it intends to hold directors and officers more responsible for ensuring that their companies are undertaking more active assessment of their own security policies and procedures. Even for those directors and officers whose companies are not subject to this Regulation, the responsibilities outlined in the enacted rules set forth a general standard of care that they, too, would be well advised to consider and follow. 

  • NAIC Adopts Insurance Data Security Model Law

    NAIC Insurance Data Security Model Law

    November 29, 2017

    Although the Model Law adopted by the National Association of Insurance Commissioners is more rigorous than most existing state laws, it may pave the way for more uniform, and therefore more predictable, state-by-state data security and regulatory breach notification laws and standards applicable to insurers and other regulated insurance entities.

  • Equifax and SEC Breaches Show You Can’t Hide from Hackers

    The Equifax and SEC Breach Impact

    September 28, 2017

    The speed of events and the fast-breaking news on the recent Equifax data breach discovered on July 29, 2017, has gone from bad to worse. An investigation revealed that the incident impacted 143 million consumers’ personally identifiable information, including names, social security numbers, dates of birth and driver’s license numbers.

  • Delaware Passes Amendment to Data Breach Notification Law

    Delaware Amends Data Breach Notification Law

    September 1, 2017

    Delaware has passed an amendment to its data breach notification law that expands the definition of "personal information,” adds a 60-day notification deadline, and requires private organizations to maintain reasonable security policies and procedures.

  • Developments in New York and Colorado Cybersecurity Regulations

    New York and Colorado Cybersecurity Regulations

    August 18, 2017

    The New York Department of Financial Services has released Frequently Asked Questions to assist in compliance with its Cybersecurity Regulation, while the Colorado Division of Securities has adopted new cybersecurity rules applicable to broker-dealers.

  • Governors of 38 States Join a Cybersecurity Compact

    Governors of 38 States Join a Cybersecurity Compact

    August 15, 2017

    The commitment of 38 state governors to the cybersecurity goals announced by the National Governors Association demonstrates that states will continue to be a driving force in the evolution of U.S. data privacy and security laws and best practices, especially where the federal government has refrained from outlining a clear strategy at the state level.

  • The Triple Threat of the Internet of Things

    Law360 | Expert Analysis

    June 15, 2017

  • New York & Colorado Propose “New” Cybersecurity Regulations for Broker-Dealers

    New York & Colorado Cybersecurity Regulations

    May 24, 2017

    While there are distinct differences regarding reporting obligations to notify state regulators of “breach events” and the like, the new cybersecurity regulations promulgated by New York and Colorado essentially codify what broker-dealers, investment advisers and fund managers are or should be doing as required by their respective regulatory or self-regulatory bodies.

  • Weapons in the Cyber Defense Arsenal

    Global Cyberattack Readiness

    May 22, 2017

    The world recently experienced an unprecedented global cyberattack that targeted the public and private sectors, encrypting and locking electronic files. So far, it is estimated that hundreds of thousands of entities worldwide were victims of WannaCry ransomware; and just as WannaCry is subsiding, a new attack, Adylkuzz, is taking its place, crippling computers by diverting their processing power. Now the world needs to begin building a Cyber Defense Arsenal.

  • Recent Updates to State Data Breach Notification Laws in New Mexico, Tennessee, Virginia

    Data Breach Notification Laws: NM, TN, VA

    May 1, 2017

    Early in 2017 there were three notable developments in state notification laws: New Mexico enacted a new data breach notification law; Tennessee further amended its existing law to reinstate the encryption exemption; and Virginia amended its existing laws to address the continuing trend involving the compromise of personal information that could lead to tax fraud.

  • New York Cyber Regulations Likely to Result in Increased Claims

    NY Cyber Regulations for Financial Institutions

    April 12, 2017

    It is generally thought that regulations such as those promulgated by the New York State Department of Financial Services to ensure that data is properly managed and secured by financial institutions may be the first of many steps taken by states. Financial institutions and insurers should continue to keep abreast of such regulations to avoid the possibility of a violation and litigation. 

  • Failure to Timely Notify Results in Enforcement Action and Significant Settlement

    First HIPAA Settlement for Untimely Breach Notice

    January 12, 2017

    The U.S. Department of Health and Human Services, Office for Civil Rights has announced the first settlement of a HIPAA enforcement action based on the untimely reporting of a breach of unsecured protected health information. 

  • Federal Banking Regulators Propose Cyber Risk Management Standards

    Risk Management Standards for Banking Industry

    October 31, 2016

    An Advance Notice of Proposed Rulemaking jointly issued by federal banking regulators details a planned regulatory scheme intended to help ensure resiliency in the face of a cyber-attack or adverse IT event and to provide a practical framework for mitigating the potential consequences of an IT systems failure.

  • New York Proposes Required Cybersecurity Programs for Financial Institutions

    NY Cybersecurity Regulations for Financial Institutions

    September 19, 2016

    New York’s Governor Andrew M. Cuomo announced a proposed regulation that requires banks, insurance companies and other financial services institutions regulated by the State Department of Financial Services to establish and maintain a cybersecurity program to protect consumers and New York State’s financial services industry.

  • Privacy Implications of the Federal Aviation Administration’s New Drone Rule

    Privacy Implications of FAA’s New Drone Rule

    September 16, 2016

    On August 29, 2016, the Federal Aviation Administration’s long-awaited commercial drone rule went into effect and is likely to spur significant innovation in commercial drone operation. While the new rule’s operational limitations work to confine drone use to small areas and limit the ability to misuse drones, they fail to fully protect individuals and their right to privacy.

  • Cyber Best Practices for Attorneys

    CyberPro

    Spring 2016

  • Fourth Circuit Expands Cyber Coverage under Commercial General Liability Policies

    Coverage under CGL Policies for Cyber Events

    April 14, 2016

    While cyber policies were created to fill the insurance gap for data breach incidents, there are naturally limitations to such coverage. Therefore, the Fourth Circuit’s recent expansion of CGL coverage has the potential to cause overlap in coverage and unintended confusion when companies are insured under both CGL and cyber policies.

  • Open Communication and Collaboration Make Campus Networks Vulnerable to Cyberattack

    Cyberattacks on Institutions of Higher Education

    April 6, 2016

    Today, approximately one third of all security breaches are directed at higher education. From personal and financial information to student health records to campus police departments that maintain records of interactions with students, such information is inherently sensitive and can, at the very least, lead to reputational damage if exposed. In addition, balancing the academic purpose of an institution with the need to protect certain information is a challenge that gets at the fundamental function of a university.

  • Creating a Records Management Policy and Enforcing It

    Westchester County Business Journal

    March 17, 2016

  • The Internet of Things: The Inevitable Collision with Product Liability

    The Licensing Journal

    October 2015

  • UPDATE: Is Safe Harbor Still Safe? The European Court of Justice Answers with a Resounding “No”

    UPDATE: Is Safe Harbor Still Safe?

    October 27, 2015

    A recent decision by the European Union Court of Justice will likely have tremendous consequences for the cross-border trade in data between U.S. companies and EU citizens. No longer will U.S. companies be able to rely on Safe Harbor program participation and self-certification as a layer of protection when handling the data of EU citizens.

  • California Law Enforcement and Industry Gain Procedural Certainty with Historic Cal-ECPA Bill

    California Adopts Historic Cal-ECPA Bill

    October 20, 2015

    California has adopted the California Electronic Communications Privacy Act, which provides a degree of parity between digital and physical records in the protection against unlawful searches and brings California back to the forefront of digital privacy legislation.

  • California Amends Data Breach Notification Statute by Requiring Specific Notification Content and Expanding the Definition of Personal Information

    California Amends Data Breach Notification Statute

    October 16, 2015

    Amendments to California’s Data Breach Notification Statute will take effect on January 1, 2016. Important changes to the existing law include new requirements for security breach notification through the use of prescribed headings in the notification letter and certain amended definitions. This amendment applies to all persons and businesses that conduct business in California and to all California governmental agencies.

  • SEC Steps Up Cybersecurity Enforcement

    SEC Steps Up Cybersecurity Enforcement

    October 6, 2015

    In what appears to be an all-out assault on lax cybersecurity, the SEC has issued a new Alert in connection with its cybersecurity examination of Wall Street firms, entered a Cease and Desist Order against a firm for failing to adopt written policies or procedures to protect customer information, and issued an Investor Alert that highlights actions individuals should take if their personal information is compromised.

  • Is Safe Harbor Still Safe? U.S. Companies Face Challenges Ahead on the EU Privacy Horizon

    Is Safe Harbor Still Safe?

    September 28, 2015

    If adopted by the High Court of Ireland, a decision issued by Advocate General Yves Bot of the Court of Justice of the European Union would eliminate the safe harbor from EU privacy law afforded to U.S. companies under Decision 2000/520. Eliminating safe harbor could leave U.S. companies in a state of uncertainty and require them to take a long hard look at the EU’s onerous compliance requirements.

  • Third Circuit Holds FTC Has Authority to Regulate Cybersecurity under Unfairness Prong of 15 U.S.C. § 45(a)

    3rd Circuit: FTC to Regulate Cybersecurity Practices

    September 1, 2015

    A recent Third Circuit ruling has put the burden on companies to not only consider the many laws, rules and regulations that impact data privacy and security but also attempt to anticipate regulators’ “state of mind” when creating and implementing cybersecurity programs.

  • Rocky Road Ahead for Ashley Madison after Widespread Damage Arising from Disclosure of Personal Information

    Ashley Madison: Planning for the Inevitable Breach

    August 28, 2015

    With extensive reporting on social media website Ashley Madison’s compromise of the names, addresses, credit card information and phone numbers of its 37 million members, the cheat facilitator has been cheated in what will likely amount to a very costly breach.

  • Legal Holds in Response to Data Breaches

    DRI: In-House Defense Quarterly

    Summer 2015

  • Nevada, Washington and North Dakota Expand Data Breach Definition and Notice Requirements

    Three More States Expand Data Privacy Laws

    July 29, 2015

    As more states diverge in their approach to data privacy regulations, companies that store and transmit personal information find themselves responsible for an expanding field of what constitutes personal information and a shrinking list of acceptable responses.

  • Seventh Circuit Holds That Risk of Future Fraudulent Charge on Credit Card Sufficient to Withstand Motion to Dismiss

    When Breach Exposes Only Credit Card Payment Data

    July 22, 2015

    On July 20, 2015, the Seventh Circuit issued an opinion holding that risk of future fraudulent charges on a credit card and greater susceptibility to identity theft is sufficient to establish standing, reversing a decision by the Northern District of Illinois.

  • Twitter Terrorism: Criminals Choose the Hack Attack

    Use of Social Media Can Leave Businesses Vulnerable

    July 6, 2015

    Businesses in 2015 have become enthralled by virtually unlimited access to customers and business partners via online platforms. Unfortunately, many have focused on the potential profits arising from such undertakings without sufficient consideration for the problems that too frequently arise.

  • Cybercrime on the Rise: Targeting Banking Institutions and Insurance Companies

    Update: State and National Cybersecurity Regulation

    May 26, 2015

    Financial and insurance institutions must make cybersecurity a top priority. While not every company has the resources to pour into cybersecurity, every company should take these risks seriously. As states continue to become more active in this space, companies should proactively seek to be at the forefront of cyber security developments.

  • Montana and Wyoming Expand Data Breach Notice Requirements

    Montana and Wyoming Expand Data Breach Notice Requirements

    April 28, 2015

    Generally, a company’s duty to notify of a data breach is triggered when personally identifiable information is exposed or lost. It is the definition and scope of that information that leaves responsible parties scratching their heads and looking for answers.

  • NYDFS to Collect Data on Cyber Security, but Could Hackers Use This Database as a Road Map to Launch Targeted Attacks?

    NYDFS to Broaden Scope of Technology Examination Framework

    March 31, 2015

    As part of its increased focus on cyber security, the New York State Department of Financial Services announced that it is broadening the scope of questions and topics in its current information technology examination framework. The Department requires insurers to provide a response to 16 questions about their overall cyber security posture by April 27, 2015.

  • Good News for Companies: Pennsylvania District Court Rules That Plaintiffs Lack Standing without Actual or Imminent Misuse of Data

    Hack Away, but No Foul without Misuse of Info

    March 26, 2015

    Despite their best efforts, companies cannot prevent an industrious hacker from finding a way to access their data, but such incidents may not give rise to a cause of action. When a data breach occurs, an individual does not suffer harm, and thus does not have standing to sue, unless the individual alleges actual misuse of the information or that such misuse is imminent.

  • Court's Interpretation of Merchant Services Agreement Limits Retailer's Liability to Card Brands for Data Breach

    Third Parties Pay Excess Assessments in Security Breach

    March 12, 2015

    A recent decision by Missouri’s Eastern District Court puts businesses entering into contracts for payment processing services on notice to have such agreements reviewed by a data privacy and security attorney. The decision will likely cause processors and banks to focus more carefully on the limitation-of-liability provision related to credit card breaches.

  • Illinois Schools Face Tough Decisions in Combating Cyber-bullying

    Illinois Schools Face Tough Decisions in Combating Cyber-bullying

    March 9, 2015

    School officials are custodians of students, and states have adopted rules and regulations that give school officials even more power to protect students from bullying. States have added specific cyber-bullying language to their anti-bullying laws, codifying the notion that school officials have the discretion to act to protect students from bullying based on incidents outside of school. But are students’ passwords on social media websites fair game?

  • Boom or Bust? Cyber Security and Data Breach Loss in Latin America

    Cyber Security and Data Breach Loss in Latin America

    February 25, 2015

    Most Latin American countries have done little in the way of enacting laws to dissuade cybercrime either through governing and reporting requirements for those in possession of sensitive data or through more severe penalties for corresponding loss. Without the motivation to more closely monitor and protect sensitive data, business loss and the incentive for criminals to attack will continue to grow.

  • North Korea’s Attack Raises Critical Coverage Issues and TRIA Implications

    Cyber Alert: FBI’s Determination May Negate Coverage for Sony’s Losses

    December 23, 2014

    While cyber espionage, crimeware, and other types of cyber attacks and theft are nothing new, even for Sony, the FBI’s determination that North Korea was behind the recent devastating attack raises critical alarms. The attack did not merely harm Sony Pictures Entertainment’s (SPE's) intellectual property and data; it was intended to and did cause physical harm to its network and operations. North Korea literally planted and detonated a bomb within SPE’s systems. The implications for businesses, brokers and insurers are significant and raise additional concerns about Congress’s failure to extend the Terrorism Risk Insurance Act of 2002.

  • Data Security, Cyber Liability and First-party Costs for Mid Cap and Small Companies Are Reaching Catastrophic Levels

    Cyber Alert: Insurance Perspective on 2015 Cyber Warnings

    December 15, 2014

    The critical trend of data security breaches and cyber liabilities significantly harming mid cap and small businesses will continue to increase through 2015. Small companies need to recognize that they have as much, if not more, risk of suffering losses and attacks with greater frequency and severity than their bigger competitors. In fact, smaller companies are at greater risk because they do not have the same depth of resources as their larger competitors. Brokers and insurers can assist these companies in preparing for, protecting against and surviving an eventual and potentially catastrophic cyber crisis event.

  • California Amends Law to Expand Businesses’ Obligations in the Wake of a Data Breach

    Amendment to California’s Privacy and Breach Law

    December 9, 2014


    On January 1, 2015, an amendment to California’s privacy and breach law goes into effect that may have a significant impact on the way entities respond to data breaches. In advance of the law’s effective date, in addition to evaluating their information security protocols and policies, entities that possess the personal information of California residents should review their insurance policies, first to make sure they have cyber insurance that provides data breach coverage, and second to determine if their policies will cover the potentially significant cost associated with notification and identity protection or mitigation services.

  • FCC Proposes $10 Million Forfeiture for Privacy Violations

    FCC Proposes $10 Million Forfeiture for Privacy Violations

    October 30, 2014

    With the proposed imposition of a $10 million forfeiture penalty, the FCC becomes the latest governmental agency to actively levy penalties against entities that fail to adequately secure consumer data and fail to adhere to their own privacy policies. It is clear that the FCC is interested in becoming more active in the protection of consumer privacy.  

  • Ninth Circuit Court of Appeals Demands More from Website Operators Before Terms of Use Will Bind Users

    Ninth Circuit Demands More from Website Operators Before Terms of Use Will Bind Users

    October 17, 2014

    The Ninth Circuit Court of Appeals recently issued an opinion concerning online agreements. “Clickwrap” agreements require users to click an “I agree” box, and “browsewrap” agreements allow users to proceed without giving assent. Enforceability of the latter types of agreements depend on whether a user has actual or constructive notice.

  • Cyber Voluntary Payment Defense Thwarted by Bank Fraud Regulation

    Coverage Issues Raised By Cyber Crisis Events

    October 9, 2014

    As companies, brokers and insurers continue to develop a better understanding of the risks and exposures involved with data breaches, standard insurance portfolios must be reviewed and developed to provide proper protection in the face of state laws and other outside influences.

  • A Guide to Cyber Coverage

    Insurance Coverage, Vol. 24, No. 4 | ABA Section of Litigation

    July-August 2014

  • California Appellate Court Limits Liability under California’s Medical Confidentiality Act for Disclosure of Medical Information

    Limit on Liability in Disclosure of Medical Information

    Septmber 22, 2014

    The California Third Appellate District  recently overturned a lower court’s denial of a motion to dismiss a class action lawsuit seeking $4 billion in damages under California’s Medical Confidentiality Act due to the alleged disclosure of medical records. The Appellate Court specifically held that the mere theft of medical records without any allegations that an unauthorized person viewed these records is insufficient to state a claim.

  • Have You Upgraded Your XP Yet?

    Have You Upgraded Your XP Yet?

    July 15, 2014

    In April, Microsoft ended support for Windows XP Professional for embedded systems. As the saying goes, “a chain is only as strong as the weakest link” and even a single Windows XP computer could provide a potential intruder with a “window” into your network environment.

  • SEC Polices Cybersecurity on Wall Street

    SEC Polices Cybersecurity on Wall Street

    June 4, 2014

    The SEC’s new disclosure guidance was intended to bring greater awareness and transparency to actual or potential cybersecurity risk that might be considered material to investors. However, the SEC has acknowledged that this guidance alone might not be sufficient to address investor concerns.

  • Google and the Great Divide: U.S. Privacy Rights versus EU Privacy Rights

    Court of Justice: U.S. versus EU Privacy Rights

    June 2, 2014

    On May 13, 2014, the Court of Justice of the European Union found that an individual has the right to demand that Google remove links about him that he claimed were old and irrelevant. But which approach is best – the right to be forgotten or the right to know? The “right to be forgotten” as currently described by the Court of Justice could create a clash between freedom of speech, which is supported in the United States, and the EU’s broader concept of privacy.

  • Florida Federal Judge Approves Settlement Agreement Providing Payments to All Victims of Data Breach, Even Those Who Suffered No Monetary Loss

    Court Approves Settlement to All Victims of Data Breach

    May 28, 2014

    Florida Federal Judge Approves Settlement Agreement Providing Payments to All Victims of Data Breach, Even Those Who Suffered No Monetary Loss Businesses should remember that strong security programs continue to be the best defense against both data breaches and potential data breach class action lawsuits. It is imperative that businesses of all sizes implement a comprehensive data protection plan that safeguards personal information and includes continual training and education.

  • HHS Issues Privacy Rule Guidance for Law Enforcement Agencies

    “HIPAA Privacy Rule: A Guide for Law Enforcement” Released

    October 1, 2013

    The new guidance is intended as a resource for law enforcement, covered entities, business associates and others who encounter situations where medical records or other PHI is involved. Covered parties should be aware that an in-depth analysis of state law is necessary to fully understand the related privacy obligations. 

  • Business Associate Definition Expanded and HHS Empowered to Impose New Civil Fines

    Compliance with Omnibus Rule Required by September 23, 2013

    September 23, 2013

    The Omnibus Rule broadens the scope of who is a “business associate,” extending coverage of the HIPAA Rules to entities not previously covered and imposing direct liability on business associates. Businesses with any connection to protected health information need to determine if they are considered a business associate under the new definition, and, if so, that they take steps to comply with their HIPAA obligations. 

  • OCR and ONC Release Model Notices of Privacy Practices

    OCR and ONC Release Model Notices of Privacy Practices

    September 23, 2013

    The Office for Civil Rights and the Office of the National Coordinator for Health Information Technology have released NPP models that reflect the regulatory changes of the Omnibus Rule. 

  • Appellate Court in New Jersey Imposes a Limited Duty of Care on Texters in Connection with Personal Injury Matters

    Duty of Care to Refrain from Texting Driver on the Road

    September 5, 2013

    A recent decision by the Superior Court of New Jersey, Appellate Division, held that an individual texter who knows or has a reason to know that the recipient of the text is driving and will read the text while driving owes a duty of care to users of the public roads to refrain from sending the driver a text at that time.

  • Omnibus HIPAA/HITECH Rules Require Changes to Notice of Privacy Practices Prior to September 23, 2013

    Must Comply with HIPAA/HITECH Rules by Sept. 23, 2013

    September 3, 2013

    Long-awaited omnibus regulations making significant modifications to the HIPAA Privacy, Security, Enforcement and Breach Notification Rules became effective on March 26, 2013. All covered entities are required to (1) be in compliance with how they protect health information and (2) amend their privacy policies, practices, and notices prior to September 23, 2013.

  • U.S. Department of Health and Human Services Imposes $1.2 Million Penalty For Protected Health Information Breach Involving Leased Copiers

    HIPAA Breach Involving Leased Copiers leads to Fines for NYC Health Plan

    August 22, 2013

    Under a settlement with the U.S. Department of Health and Human Services (“HHS”), Affinity Health Plan, Inc. (“Affinity”), a not-for profit managed care plan serving the greater New York City area, will pay more than $1.2 million in penalties for its violations of the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy and Security Rules relating to its failure to properly safeguard PHI stored on its photocopier hard drives.

  • Dialog between Regulators and Insurers Is Imperative in Response to Requests for Information Concerning Cybersecurity

    “308 Letters” Spur Vital Dialogue on Cybersecurity

    June 3, 2013

    Insurers responding to requests for information concerning cybersecurity from the New York Department of Financial Services may benefit from reviewing materials developed in 2002 in response to Regulation 173. In addition, insurers must implement a comprehensive written information security program and adjust it as changes in technology and other specified circumstances warrant.

  • Utah Enacts the Internet Employment Privacy Act: The Good, the Bad and the Ugly

    Workplace Rights and the Expansion of Social Media

    May 13, 2013

    Utah’s enactment of HB 100 simultaneously contracts and expands employers’ rights to access their employees’ social media presence and, importantly, represents a growing trend among state legislatures taking an affirmative position on the assessment of the rights of both employers and employees/job applicants in the expanding world of social media.

  • Data Breach and Privacy Update

    Spring 2013

  • D&Os in Cyberspace: SEC Endorses Social Media for Corporate Communications with Investors

    Corporate Communications with Investors @ Facebook?

    April 9, 2013

    Companies that plan to use social media to communicate material corporate information to investors should make sure they have effective policies, controls and safeguards in place to mitigate potential risk for violations of securities or other laws.

  • Supreme Court's New Ruling May Bolster Defense of Data Breach and Privacy Cases

    U.S. Supreme Court Upholds Strict Article III Standing in Privacy Case

    March 25, 2013

    The U.S. Supreme Court’s reaffirmation of heightened standards for future harm may significantly aid corporations in obtaining dismissals for data security and cyber beach lawsuits where plaintiffs frequently cannot show that their personal information will subject them to identity theft or be used in a manner to cause them some other concrete financial harm.

  • Insurance Agency Risk Management: A Comprehensive Guide to Avoiding E&O Claims

    Security & Privacy Technology

    December 17, 2012

  • Avoiding Cyber Loss in Sandy’s Wake

    Cyber Loss in Sandy’s Wake

    November 13, 2012

    Based on our experience, cyber losses typically spike following floods, including breaches of sensitive information caused by lost or stolen electronic devices or paper records, corrupted data and interruptions of technology services. While some of these losses are unavoidable, Wilson Elser can help your company protect itself.

  • Steering Clear of Cyber Trouble

    CLM - Litigation Management

    Fall 2012

  • Taking up the Network Security and Privacy Gauntlet in 2012

    New Jersey Law Journal

    February 6, 2012

  • Commencement of Red Flags enforcement by FTC postponed to November 1, 2009

    August 2009

    On July 29, 2009, the Federal Trade Commission ("FTC") announced that the implementation of the "Red Flags" rule, requiring most businesses to adopt a written data security and breach policy, has been postponed by three months, to November 1, 2009.  The FTC has cited the need to assist and educate small businesses with low risk of security breaches regarding the required conduct under the rule.  Businesses now have additional time to prepare for the impact of the rule by bringing their companies or practices into compliance with the rule's requirements.

  • Red Flags Rule Enforcement by FTC Begins August 1, 2009

    June 2009

    The Red Flags Rule is designed to protect personal identifiable information from data thieves.  While many people believe that data protection regulation applies only to hospitals and banks, data thieves are attacking other businesses, so regulation has expanded.