Blog Archives

Will the New General Data Protection Regulations (“GDPR”) Be a Block in the Chain?

Yes, I know that I ooze wit, but seriously, on the 25 May 2018, the new GDPR will come into force, which replaces the current data protection regulations (irrespective of Brexit). The principle at the heart of the GDPR is

Tagged with: , , , ,
Posted in Data Security, Privacy, Regulations

Coca-Cola Dodges Privacy Class Action

Coca-Cola won big last month when it secured summary judgment in a privacy class action brought by a former bottling plant employee concerning compromised personal information. Hon. Joseph Leeson of the Eastern District of Pennsylvania found that Coca-Cola was not

Tagged with: , , , , , ,
Posted in Data Breach, Data Security, Litigation, Privacy

Protect Against Cyber Attacks: A New Guide to Help Small Businesses

No business is too small to be the victim of a cyberattack. In fact, as larger companies invest more resources in cybersecurity, attackers are beginning to target smaller, less secure businesses. It is important for every small business to understand

Tagged with: , , , , , , , , , ,
Posted in Cyberattack, Data Breach, Data Security, Privacy, Standards

Commercial Trucking Goes Green for Safer Streets

A new federal mandate requires most commercial truck drivers to “go green” by trading in their old paper logs for electronic logging devices (ELDs) by December 18, 2017. Thought to affect roughly 3.5 million truck drivers, the new mandate is

Tagged with:
Posted in Privacy, Regulations

OCR Announces New HIPAA Guidance on Ransomware

In response to the increasing prevalence of ransomware cyber-attacks by hackers on electronic health information systems in hospitals and medical practices, the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) announced on Monday July 11, 2016

Tagged with: , , , , , , , , , , ,
Posted in HIPAA, Privacy

Courts: We Hear No Suit Based on Cyber Crime Before its Time

Two recent decisions out of the U.S. District Court for the District of Maryland illustrate the difficulty that cyber breach victims can have in establishing standing to sue. In both cases, the court dismissed the cyber breach suits for lack

Tagged with: , , , , , , ,
Posted in Cyber crimes, Cyberattack, Data Breach, Litigation, Privacy

Recent SCOTUS Decision on Standing Will Significantly Impact Data Breach Cases

Whether a plaintiff has standing to sue is a wellspring of dispute in the context of data breach cases, and in Spokeo, Inc. v. Robins, the U.S. Supreme Court recently made clear that the battle must be fought on two

Tagged with: , , ,
Posted in Data Breach, Litigation, Privacy

When “Shhh” turns to “Oh $%*#!” – No Pseudonyms for Ashley Madison Plaintiffs

Nothing good has come from the Ashley Madison hacking incident, except hopefully some well-deserved apologies to loved ones. Now the E.D. Mo. Court hearing the In Re Ashley Madison Customer Security Breach Litigation, MDL No. 2669, has shaken its finger

Tagged with: , , ,
Posted in Data Breach, Data Security, Litigation, Privacy

Phishing and Spoofing Scams — A Few Tips to Protect Yourself and Your Business

The phone rings.  The caller ID says it’s your attorney’s office.  When you answer, you are told you owe your attorney additional money and are directed to call a toll-free number.  When you call the number, you are told how

Tagged with: , , , , , , , ,
Posted in Cyber crimes, Cyberattack, Data Security, Privacy

Cyber-Security Alert: D.C. Area Hospital Chain MedStar Targeted By Hackers

MedStar, a Washington, D.C.-area hospital chain, became the latest healthcare industry victim of a cyber-attack when hackers breached its systems with a crippling virus. MedStar operates 10 hospitals in the D.C./Baltimore region, employs 30,000 staff, has 6,000 affiliated physicians, and

Tagged with: , , , , , , , ,
Posted in Cyber crimes, Cyberattack, Data Breach, Data Security, HIPAA, Privacy
About Cyber Law Monitor
In the new digital world, individuals and businesses are almost entirely dependent on computer technology and electronic communications to function on a daily basis. Although the power of modern technology is a source of opportunity and inspiration—it also poses huge challenges, from protecting privacy and securing proprietary data to adhering to fast-changing statutory and regulatory requirements. The Cyber Law Monitor blog covers privacy, data security, technology, and cyber space. It tracks major legal and policy developments and provides analysis of current events.
Receive Email Updates

Email:

Cozen O’Connor Blogs