Close

Articles Posted in Cybersecurity and Privacy

Updated:

Big Data, Big Trouble? Privacy and Legal Concerns with Big Data

Google has figured out that I shop for a lot of children’s clothing online, as my two children grow like weeds. Every time I launch a search, my banner ads link to brands that I have bought previously or similar brands that other consumers may have purchased. That is Big…

Updated:

Too Much of A Good Thing? Mind the Privacy Implications of iOS 7’s New MDM Capabilities in Your BYOD Workforce

In addition to the consumer hoopla over iOS 7, companies managing BYOD programs also have reason to rejoice. As reported on CIO.com, iOS 7 brings about a new level of control for companies through expanded app-level MDM Capabilities. MDM, or Mobile Device Management, is the technology that companies use to…

Updated:

New watchdog study shows that approximately half of all web privacy policies are non-compliant and risk enforcement action

It has been said for some time that data is the new oil, but many global organizations continue to struggle to comply with regulatory requirements when it comes to the exploitation of this valuable resource. A recent worldwide audit of over 2,000 websites, coordinated by the Global Privacy Enforcement Network…

Updated:

Help Clients Insure Against Cyberattacks

This article was originally published in the July 22, 2013 issue of Texas Lawyer. The constant threat of cyberattacks presents many and varying challenges for businesses. Insurance provides one way to deal with them. Because the market for insurance covering these risks and the law interpreting these policies both continue…

Updated:

Mobile Privacy Practices: Recent California developments indicate what’s to come

Jim Gatto and James Chang recently published “Mobile Privacy Practices: Recent California developments indicate what’s to come” in the June issue of Computer Law Review International. The use of mobile applications has seen huge growth in the past few years. As the use of apps become increasingly commonplace, social concerns…

Updated:

Personal Data Transfers from the European Economic Area: Time to Consider Binding Corporate Rules 2.0

Steve Farmer recently published an article in World Data Protection Report titled “Personal Data Transfers from the European Economic Area: Time to Consider Binding Corporate Rules 2.0.” What exactly is the ‘”best” solution for an international business needing to handle and transfer personal data across borders? This has become an…

Updated:

Privacy Resolutions for Mobile App Providers in the New Year

The end of 2012 saw a flurry of activity in the area of privacy enforcement. In July, Kamala Harris, the Attorney General of California, announced the formation of California’s own state agency, Attorney General Kamala D. Harris Announces Privacy Enforcement and Protection Unit to investigate and enforce the state’s robust…

Updated:

UK Information Commissioner’s Office issues Guidance on the Deletion of Personal Data under the Data Protection Act 1998

On 16 August 2012, the ICO published guidance on deleting personal data under the Data Protection Act 1998 (DPA). The guidance describes how organisations can ensure compliance with the DPA when they delete or archive personal data, and explains what the ICO means by deletion and archiving and introduces the…

Updated:

Protecting Your Data When Your Subcontractor Hires a Subcontractor

When customers sign a contract with a service provider that will be holding the customer’s confidential data (for example, the customer’s business records, human resources data, personally identifiable information, protected health information, payroll data), in addition to laying out the service provider’s responsibility for protecting the data, customers focus on…

Contact Us