Blog Archives

Will the New General Data Protection Regulations (“GDPR”) Be a Block in the Chain?

Yes, I know that I ooze wit, but seriously, on the 25 May 2018, the new GDPR will come into force, which replaces the current data protection regulations (irrespective of Brexit). The principle at the heart of the GDPR is

Tagged with: , , , ,
Posted in Data Security, Privacy, Regulations

Coca-Cola Dodges Privacy Class Action

Coca-Cola won big last month when it secured summary judgment in a privacy class action brought by a former bottling plant employee concerning compromised personal information. Hon. Joseph Leeson of the Eastern District of Pennsylvania found that Coca-Cola was not

Tagged with: , , , , , ,
Posted in Data Breach, Data Security, Litigation, Privacy

Protect Against Cyber Attacks: A New Guide to Help Small Businesses

No business is too small to be the victim of a cyberattack. In fact, as larger companies invest more resources in cybersecurity, attackers are beginning to target smaller, less secure businesses. It is important for every small business to understand

Tagged with: , , , , , , , , , ,
Posted in Cyberattack, Data Breach, Data Security, Privacy, Standards

Commercial Trucking Goes Green for Safer Streets

A new federal mandate requires most commercial truck drivers to “go green” by trading in their old paper logs for electronic logging devices (ELDs) by December 18, 2017. Thought to affect roughly 3.5 million truck drivers, the new mandate is

Tagged with:
Posted in Privacy, Regulations

“Full Employment for CISOs in New York”: New York Proposes the Nation’s First Cybersecurity Regulation

If you’re a CISO living in New York get ready for the phone calls!!! On September 13, 2016, Governor Andrew M. Cuomo proposed the nation’s first cybersecurity regulation. Starting on September 28, 2016 there is a limited 45 day window

Tagged with: , , , , , , , , ,
Posted in Data Security, Legislation, Regulations

OCR Announces New HIPAA Guidance on Ransomware

In response to the increasing prevalence of ransomware cyber-attacks by hackers on electronic health information systems in hospitals and medical practices, the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) announced on Monday July 11, 2016

Tagged with: , , , , , , , , , , ,
Posted in HIPAA, Privacy

When “Shhh” turns to “Oh $%*#!” – No Pseudonyms for Ashley Madison Plaintiffs

Nothing good has come from the Ashley Madison hacking incident, except hopefully some well-deserved apologies to loved ones. Now the E.D. Mo. Court hearing the In Re Ashley Madison Customer Security Breach Litigation, MDL No. 2669, has shaken its finger

Tagged with: , , ,
Posted in Data Breach, Data Security, Litigation, Privacy

Cyber-Security Alert: D.C. Area Hospital Chain MedStar Targeted By Hackers

MedStar, a Washington, D.C.-area hospital chain, became the latest healthcare industry victim of a cyber-attack when hackers breached its systems with a crippling virus. MedStar operates 10 hospitals in the D.C./Baltimore region, employs 30,000 staff, has 6,000 affiliated physicians, and

Tagged with: , , , , , , , ,
Posted in Cyber crimes, Cyberattack, Data Breach, Data Security, HIPAA, Privacy

Feds Push for Better Cybersecurity

President Obama has long discussed the importance of improving governmental cybersecurity, but the issue gained significant traction last year after two massive breaches at the Office of Personnel Management (OPM). In February 2016, the President issued an Executive Order to

Tagged with: , , ,
Posted in Legislation, Privacy, Regulations

iWon’t: Apple’s Face-Off with the DOJ

In what is quickly becoming one of the closest-watched cases in the country, Apple is now at loggerheads with the Department of Justice and FBI over its refusal to unlock the iPhone of one of the San Bernardino shooters. The

Tagged with: , , , ,
Posted in Data Security, Litigation, Privacy
About Cyber Law Monitor
In the new digital world, individuals and businesses are almost entirely dependent on computer technology and electronic communications to function on a daily basis. Although the power of modern technology is a source of opportunity and inspiration—it also poses huge challenges, from protecting privacy and securing proprietary data to adhering to fast-changing statutory and regulatory requirements. The Cyber Law Monitor blog covers privacy, data security, technology, and cyber space. It tracks major legal and policy developments and provides analysis of current events.
Receive Email Updates

Email:

Cozen O’Connor Blogs