Blog Archives

5 Ways in Which Your Company’s Privacy Policy is Insufficient

Well thought-out internal privacy policies and procedures are an essential part of any company’s information management program.  These internal policies should not be confused with a company’s external privacy notice, which informs the company’s customers as to how it may

Tagged with: , , , , ,
Posted in Policies and Procedures, Privacy

Is it Time to Rethink Notice and Choice as a Fair Information Privacy Practice?

Since the 1970’s, fair information practices (FIPs) or fair information privacy practices (FIPPs) have formed the framework around which organizations structure their policies on data collection, use, disclosure, and retention.  The cornerstone of individual privacy rights under the FIPs is

Tagged with: , , , ,
Posted in Privacy, Standards

California Passes Internet of Things Law

California continues to pave the way for privacy and cybersecurity legislation as Governor Brown recently signed the first Internet of Things (“IoT”) security law in the United States (SB-327). While connected devices offer users convenience and efficiency, California lawmakers recognized

Tagged with: , , , , , ,
Posted in Data Security, Internet of Things

Updated SEC Guidance Highlights Importance of Solid Cybersecurity Policies and Procedures

The Securities and Exchange Commission (“SEC” or “Commission”) has given public companies a heads up on where the Commission is setting its sights in the ever-developing world of cybersecurity. Here’s what you need to know, and what you need to

Tagged with: , , , , , ,
Posted in Data Security, Privacy, Regulations

EU’s New Privacy Law—What You Need to Know

The European Union (EU) Parliament’s new data privacy law, known as the General Data Protection Regulation (GDPR), is set to become enforceable in all EU member states on May 25, 2018, just six months from now. The GDPR replaces the

Tagged with: , , , , , , ,
Posted in Data Security, Privacy, Regulations, Standards

Equifax Hearings Continue on the Hill

Former Equifax chief Richard Smith returned to Capitol Hill for a second day of congressional hearings into his company’s data breach, this time appearing before the Senate Banking, Housing, and Urban Affairs Committee. Committee Chairman Mike Crapo (R-ID) characterized the

Tagged with: , , , , , ,
Posted in Cyber crimes, Cyberattack, Data Breach, Data Security, Litigation, Privacy

Protect Against Cyber Attacks: A New Guide to Help Small Businesses

No business is too small to be the victim of a cyberattack. In fact, as larger companies invest more resources in cybersecurity, attackers are beginning to target smaller, less secure businesses. It is important for every small business to understand

Tagged with: , , , , , , , , , ,
Posted in Cyberattack, Data Breach, Data Security, Privacy, Standards

“Full Employment for CISOs in New York”: New York Proposes the Nation’s First Cybersecurity Regulation

If you’re a CISO living in New York get ready for the phone calls!!! On September 13, 2016, Governor Andrew M. Cuomo proposed the nation’s first cybersecurity regulation. Starting on September 28, 2016 there is a limited 45 day window

Tagged with: , , , , , , , , ,
Posted in Data Security, Legislation, Regulations

OCR Announces New HIPAA Guidance on Ransomware

In response to the increasing prevalence of ransomware cyber-attacks by hackers on electronic health information systems in hospitals and medical practices, the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) announced on Monday July 11, 2016

Tagged with: , , , , , , , , , , ,
Posted in HIPAA, Privacy

Phishing and Spoofing Scams — A Few Tips to Protect Yourself and Your Business

The phone rings.  The caller ID says it’s your attorney’s office.  When you answer, you are told you owe your attorney additional money and are directed to call a toll-free number.  When you call the number, you are told how

Tagged with: , , , , , , , ,
Posted in Cyber crimes, Cyberattack, Data Security, Privacy
About Cyber Law Monitor
In the new digital world, individuals and businesses are almost entirely dependent on computer technology and electronic communications to function on a daily basis. Although the power of modern technology is a source of opportunity and inspiration—it also poses huge challenges, from protecting privacy and securing proprietary data to adhering to fast-changing statutory and regulatory requirements. The Cyber Law Monitor blog covers privacy, data security, technology, and cyber space. It tracks major legal and policy developments and provides analysis of current events.
Receive Email Updates

Email:

Cozen O’Connor Blogs