Blog Archives

House Subcommittee Examines the Role of Cyber Insurance

On March 22, the House Homeland Security Committee’s Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies held a hearing on The Role of Cyber Insurance in Risk Management. The witnesses were Matthew McCabe, a Senior Advisory Specialist for cyber insurance

Tagged with: , , , ,
Posted in Data Security, Insurance

iWon’t: Apple’s Face-Off with the DOJ

In what is quickly becoming one of the closest-watched cases in the country, Apple is now at loggerheads with the Department of Justice and FBI over its refusal to unlock the iPhone of one of the San Bernardino shooters. The

Tagged with: , , , ,
Posted in Data Security, Litigation, Privacy

Michaels Crafts Successful Motion to Dismiss in Data Breach Case

Plaintiffs continue to battle for standing in data breach cases, and another federal court recently added to a growing body of decisions helpful to companies who find themselves on the receiving end of a lawsuit after falling victim to hackers. 

Tagged with: , , , , ,
Posted in Data Breach, Data Security, Litigation, Privacy

Chris Correa Isn’t Billy Beane and This Isn’t Moneyball

The lights going on and off within the head of former St. Louis Cardinals scouting director Chris Correa were once probably flickering more actively than the lights inside of The Staples Center just before the Los Angeles Lakers take to

Tagged with: , , , , ,
Posted in Cyber crimes, Cyberattack, Data Breach, Data Security, Privacy, Standards

FTC Loses in LabMD Data Security Case: ALJ Sets High Bar for Consumer Harm

On November 13, 2015, an administrative law judge (“ALJ”) ruled against the Federal Trade Commission (“FTC”) in its high-profile data security case against LabMD. The ALJ ruled that the FTC had failed to show that LabMD’s conduct had caused harm

Tagged with: , , , , , , , , , , , ,
Posted in Data Breach, Data Security, FTC, HIPAA, Litigation

The Elephant in the Room – Catastrophic Property Damage from a Cyber Attack

Much of what we discuss in this blog relates to the loss of information and the legal and regulatory framework that exists to address individual privacy concerns following a data breach.  However, as our colleague Dick Bennett points out in

Posted in Cyberattack, Data Breach, Data Security

Life After Death (of Safe Harbor) – EU Data Protection in the Wake of Schrems

One month after the landmark decision in Schrems vs. Data Protection Commissioner (C-365/14), the European Commission (Commission) has issued guidelines, in the form of a Communication, regarding the transfer of personal data from the EU to the U.S.  As we

Posted in Data Security, Privacy, Regulations, Standards

The End of Safe Harbor – What Does it Mean?

This past Tuesday, in the groundbreaking decision of Schrems vs. Data Protection Commissioner (C-362/14), the Court of Justice of the European Union (CJEU) invalidated the Safe Harbor provision of the EU Commission, 2000/560C/EC.  The Safe Harbor program was the easiest

Posted in Data Security, Legislation, Regulations, Standards

Insider Trading Hack was Cinematic in Scope

The U.S. Department of Justice announced indictments in Brooklyn and New Jersey last month of 32 people for fraudulently obtaining inside information and then using that knowledge to make millions in the market, in the “largest scheme of its kind

Posted in Cyberattack, Data Breach, Data Security

Ashley Madison Reveals Even More: Hacking May Be An Inside Job

In recent years, hacking has infiltrated the retail industry. Hacking has infiltrated the healthcare industry. Hacking has infiltrated the sports industry. And now, hacking has now infiltrated the most personal (some would say immoral) activities we engage in on the Internet.  Last week,

Posted in Cyberattack, Data Breach, Data Security, Privacy
About Cyber Law Monitor
In the new digital world, individuals and businesses are almost entirely dependent on computer technology and electronic communications to function on a daily basis. Although the power of modern technology is a source of opportunity and inspiration—it also poses huge challenges, from protecting privacy and securing proprietary data to adhering to fast-changing statutory and regulatory requirements. The Cyber Law Monitor blog covers privacy, data security, technology, and cyber space. It tracks major legal and policy developments and provides analysis of current events.
Receive Email Updates

Email:

Cozen O’Connor Blogs