Blog Archives

Phishing and Spoofing Scams — A Few Tips to Protect Yourself and Your Business

The phone rings.  The caller ID says it’s your attorney’s office.  When you answer, you are told you owe your attorney additional money and are directed to call a toll-free number.  When you call the number, you are told how

Tagged with: , , , , , , , ,
Posted in Cyber crimes, Cyberattack, Data Security, Privacy

Wyndham Settles with FTC

Last month, Wyndham Worldwide Corp. settled its lengthy civil case with the Federal Trade Commission.  The suit began in 2012, when the FTC sued Wyndham and three of its subsidiaries, alleging three data breaches between 2008 and 2010 were a

Posted in FTC, Litigation, Regulations, Standards

Life After Death (of Safe Harbor) – EU Data Protection in the Wake of Schrems

One month after the landmark decision in Schrems vs. Data Protection Commissioner (C-365/14), the European Commission (Commission) has issued guidelines, in the form of a Communication, regarding the transfer of personal data from the EU to the U.S.  As we

Posted in Data Security, Privacy, Regulations, Standards

Pennsylvania Federal Court Finds Standing in Data Breach Class Action

The debate over standing in data breach litigation is gaining more attention lately. While many courts have hesitated to find standing prior to lost personally identifiable information (PII) actually being misused, the U.S. District Court for the Eastern District of Pennsylvania recently

Posted in Data Breach, Litigation

The End of Safe Harbor – What Does it Mean?

This past Tuesday, in the groundbreaking decision of Schrems vs. Data Protection Commissioner (C-362/14), the Court of Justice of the European Union (CJEU) invalidated the Safe Harbor provision of the EU Commission, 2000/560C/EC.  The Safe Harbor program was the easiest

Posted in Data Security, Legislation, Regulations, Standards
About Cyber Law Monitor
In the new digital world, individuals and businesses are almost entirely dependent on computer technology and electronic communications to function on a daily basis. Although the power of modern technology is a source of opportunity and inspiration—it also poses huge challenges, from protecting privacy and securing proprietary data to adhering to fast-changing statutory and regulatory requirements. The Cyber Law Monitor blog covers privacy, data security, technology, and cyber space. It tracks major legal and policy developments and provides analysis of current events.
Receive Email Updates

Email:

Cozen O’Connor Blogs