Blog Archives

Biden Administration’s Voluntary AI Safety Agreement

The Biden administration announced that it brokered a voluntary agreement with several of the biggest technology and artificial intelligence (AI) companies.  The agreement, available here, has the companies taking a number of actions intended to encourage safe, secure, and trustworthy

Tagged with: , , , ,
Posted in Artificial Intelligence

SEC Proposes New Cybersecurity Disclosure Rules for Public Companies

On March 9, 2022, the SEC proposed new rules (“Proposed Rules”) that would expand cybersecurity disclosures applicable to public companies subject to the reporting requirements of the Securities Exchange Act of 1934 (“Exchange Act”). Existing SEC rules do not explicitly require cybersecurity

Tagged with: , , , , , ,
Posted in Regulations

Federal Agencies Announce a New 36-Hour Cybersecurity Incident Rule Reporting Requirement

On November 18, 2021, the Office of the Comptroller of the Currency (“OCC”),  the Board of Governors of the Federal Reserve System (“Board”), and the Federal Deposit Insurance Corporation (“FDIC”) (collectively, the “Agencies”) issued a new rule (the “Rule”) that

Tagged with: , , , , , , , , , ,
Posted in Data Breach, Policies and Procedures, Regulations, Standards

Getting Tough with Zero Trust – Biden Bolsters Cybersecurity via Executive Order

On May 12, 2021, President Biden issued Executive Order No. 14028, entitled “Improving the Nation’s Cybersecurity”, setting out new and enhanced cybersecurity standards for federal government agencies and the commercial software products utilized by them.  The Biden administration’s order comes

Tagged with: , , , , , , , , ,
Posted in Data Security, Regulations, Standards, Uncategorized

Cybersecurity Best Practices in the Remote-Working Environment

In the wake of the COVID-19 crisis, much of the workforce has shifted to working remotely, with many workers operating out of makeshift “offices” they created in their homes with little or no warning. Along with this remote work comes

Tagged with: , , , , , ,
Posted in Data Security, Policies and Procedures, Privacy, Uncategorized

Is it Time to Rethink Notice and Choice as a Fair Information Privacy Practice?

Since the 1970’s, fair information practices (FIPs) or fair information privacy practices (FIPPs) have formed the framework around which organizations structure their policies on data collection, use, disclosure, and retention.  The cornerstone of individual privacy rights under the FIPs is

Tagged with: , , , ,
Posted in Privacy, Standards

Senate Subcommittee Evaluates Expansion of the FTC’s Data and Privacy Authority

On November 27, 2018, the U.S. Senate Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security held a hearing titled “Oversight of the Federal Trade Commission,” which included testimony from Chairman Joseph Simons and Commissioners Rohit Chopra, Noah Phillips,

Tagged with: , , , , , ,
Posted in FTC, Legislation, Privacy, Regulations

California Passes Internet of Things Law

California continues to pave the way for privacy and cybersecurity legislation as Governor Brown recently signed the first Internet of Things (“IoT”) security law in the United States (SB-327). While connected devices offer users convenience and efficiency, California lawmakers recognized

Tagged with: , , , , , ,
Posted in Data Security, Internet of Things

Anthem Agrees to Record Data Breach Settlement

In the wake of the largest U.S. health care data breach in history, Anthem, Inc., has agreed to pay $16 million to the Office for Civil Rights, which is a record settlement for alleged HIPAA violations. According to the Department

Tagged with: , , , , , ,
Posted in Cyberattack, Data Breach, Data Security, HIPAA, OCR

Technical FACTA Violation Insufficient to Confer Standing

A federal court in Texas cut short a putative class action alleging violation of the truncation requirement under the Fair and Accurate Credit Transactions Act (FACTA), sending a clear message to plaintiffs that minor inconvenience flowing from a procedural violation

Tagged with: , , , , ,
Posted in Litigation, Privacy
About Cyber Law Monitor
In the new digital world, individuals and businesses are almost entirely dependent on computer technology and electronic communications to function on a daily basis. Although the power of modern technology is a source of opportunity and inspiration—it also poses huge challenges, from protecting privacy and securing proprietary data to adhering to fast-changing statutory and regulatory requirements. The Cyber Law Monitor blog covers privacy, data security, technology, and cyber space. It tracks major legal and policy developments and provides analysis of current events.
Subscribe For Updates

cyberlawmonitor

Cozen O’Connor Blogs