Blog Archives

Protect Against Cyber Attacks: A New Guide to Help Small Businesses

No business is too small to be the victim of a cyberattack. In fact, as larger companies invest more resources in cybersecurity, attackers are beginning to target smaller, less secure businesses. It is important for every small business to understand

Tagged with: , , , , , , , , , ,
Posted in Cyberattack, Data Breach, Data Security, Privacy, Standards

Commission on Enhancing Cybersecurity Report Calls for Greater Investment

On Friday December 2nd the President’s Commission on Enhancing Cybersecurity (“Commission”) released their long-awaited Report on Securing and Growing the Digital Economy. The nonpartisan Commission was created in April by President Obama with the objective of examining U.S. cybersecurity policy

Tagged with: , ,
Posted in Standards

NIST Releases Comprehensive Cyber Security Guidelines for the Internet of Things

As the Internet of Things continues to grow and expand, the fact that guidance on security measures and protections is a necessity has become increasingly evident. Recently, the National Institute of Standards and Technology (NIST) released a lengthy set of

Tagged with: , ,
Posted in Standards

Chris Correa Isn’t Billy Beane and This Isn’t Moneyball

The lights going on and off within the head of former St. Louis Cardinals scouting director Chris Correa were once probably flickering more actively than the lights inside of The Staples Center just before the Los Angeles Lakers take to

Tagged with: , , , , ,
Posted in Cyber crimes, Cyberattack, Data Breach, Data Security, Privacy, Standards

Wyndham Settles with FTC

Last month, Wyndham Worldwide Corp. settled its lengthy civil case with the Federal Trade Commission.  The suit began in 2012, when the FTC sued Wyndham and three of its subsidiaries, alleging three data breaches between 2008 and 2010 were a

Posted in FTC, Litigation, Regulations, Standards

Life After Death (of Safe Harbor) – EU Data Protection in the Wake of Schrems

One month after the landmark decision in Schrems vs. Data Protection Commissioner (C-365/14), the European Commission (Commission) has issued guidelines, in the form of a Communication, regarding the transfer of personal data from the EU to the U.S.  As we

Posted in Data Security, Privacy, Regulations, Standards

The End of Safe Harbor – What Does it Mean?

This past Tuesday, in the groundbreaking decision of Schrems vs. Data Protection Commissioner (C-362/14), the Court of Justice of the European Union (CJEU) invalidated the Safe Harbor provision of the EU Commission, 2000/560C/EC.  The Safe Harbor program was the easiest

Posted in Data Security, Legislation, Regulations, Standards

U.S. Appeals Court Upholds the FTC’s Authority to Police Cybersecurity Practices

In a highly anticipated and precedential opinion issued earlier this week, the Third Circuit Court of Appeals upheld the FTC’s authority to regulate corporate cybersecurity. The decision in Federal Trade Commission v Wyndham Worldwide Corp et al., addressed whether the FTC has

Posted in Cyberattack, Data Breach, Litigation, Regulations, Standards

EMV Credit Cards Are Coming, But Consumers Must Stay Vigilant

Major credit card companies, including Visa, MasterCard, Discover, and American Express, have announced plans to switch to EMV cards in the United States over the course of 2015. Nearly eighty other countries around the world have already made the switch

Posted in Data Security, Standards

A New Kind of Architecture: The President’s New Agenda on Cybersecurity

“[I]f we don’t put in place the kind of architecture that can prevent these attacks from taking place, this is not just going to be affecting movies, this is going to be affecting our entire economy in ways that are

Posted in Legislation, Standards
About Cyber Law Monitor
In the new digital world, individuals and businesses are almost entirely dependent on computer technology and electronic communications to function on a daily basis. Although the power of modern technology is a source of opportunity and inspiration—it also poses huge challenges, from protecting privacy and securing proprietary data to adhering to fast-changing statutory and regulatory requirements. The Cyber Law Monitor blog covers privacy, data security, technology, and cyber space. It tracks major legal and policy developments and provides analysis of current events.
Receive Email Updates

Email:

Cozen O’Connor Blogs