Blog Archives

Life After Death (of Safe Harbor) – EU Data Protection in the Wake of Schrems

One month after the landmark decision in Schrems vs. Data Protection Commissioner (C-365/14), the European Commission (Commission) has issued guidelines, in the form of a Communication, regarding the transfer of personal data from the EU to the U.S.  As we

Posted in Data Security, Privacy, Regulations, Standards

The End of Safe Harbor – What Does it Mean?

This past Tuesday, in the groundbreaking decision of Schrems vs. Data Protection Commissioner (C-362/14), the Court of Justice of the European Union (CJEU) invalidated the Safe Harbor provision of the EU Commission, 2000/560C/EC.  The Safe Harbor program was the easiest

Posted in Data Security, Legislation, Regulations, Standards

U.S. Appeals Court Upholds the FTC’s Authority to Police Cybersecurity Practices

In a highly anticipated and precedential opinion issued earlier this week, the Third Circuit Court of Appeals upheld the FTC’s authority to regulate corporate cybersecurity. The decision in Federal Trade Commission v Wyndham Worldwide Corp et al., addressed whether the FTC has

Posted in Cyberattack, Data Breach, Litigation, Regulations, Standards

EMV Credit Cards Are Coming, But Consumers Must Stay Vigilant

Major credit card companies, including Visa, MasterCard, Discover, and American Express, have announced plans to switch to EMV cards in the United States over the course of 2015. Nearly eighty other countries around the world have already made the switch

Posted in Data Security, Standards

A New Kind of Architecture: The President’s New Agenda on Cybersecurity

“[I]f we don’t put in place the kind of architecture that can prevent these attacks from taking place, this is not just going to be affecting movies, this is going to be affecting our entire economy in ways that are

Posted in Legislation, Standards

Voluntary But Valuable: Using NIST’s New Cybersecurity Framework

On February 12, 2014, the National Institute of Standards and Technology (NIST) released the Framework for Improving Critical Infrastructure Cybersecurity Version 1.0, or more simply, the Cybersecurity Framework. The Framework is the culmination of a year-long process set in motion

Posted in Standards
About Cyber Law Monitor
In the new digital world, individuals and businesses are almost entirely dependent on computer technology and electronic communications to function on a daily basis. Although the power of modern technology is a source of opportunity and inspiration—it also poses huge challenges, from protecting privacy and securing proprietary data to adhering to fast-changing statutory and regulatory requirements. The Cyber Law Monitor blog covers privacy, data security, technology, and cyber space. It tracks major legal and policy developments and provides analysis of current events.
Subscribe For Updates

cyberlawmonitor

Cozen O’Connor Blogs