DEVELOPMENTS & COMMENTARY

The FCC Privacy Rules: What You Need to Know

Webinar login details will be provided following registration Following the approval of the FCC’s new privacy rules on October 27, ISPs need to address a number of issues, including opt-ins and opt-outs as well as information security programs. To help you prepare, the DWT team has prepared a two-part webinar series. FCC Privacy ...

Hotly Anticipated Broadband Privacy Order Released by FCC

On Nov. 2, 2016, the FCC released its long-awaited broadband privacy Order and rules by a 3-2 vote. The Order comes nearly 18 months after the Commission moved to reclassify broadband internet access service (“BIAS”) as a common carrier telecommunication service under Title II of the Communications Act, and over ...

It’s Official: The FCC Has Adopted New Privacy and Security Rules for ISPs Following a 3-2 Vote Along Partisan Lines

DWT is committed to providing the latest updates on the FCC’s privacy rules. Please see our special blog post series on the FCC’s new privacy rules. Today, the FCC formally adopted on a 3-2 party-line vote an order that enacts a new privacy and security regime for Internet service providers (ISPs). ...

Data protection, internet security flat illustration conceptsFCC Broadband Privacy Part I: The FCC’s Ascension as a Privacy Regulator

Tomorrow, October 27, the Federal Communications Commission (FCC) is scheduled to vote on new privacy rules for internet service providers (ISP) that will have a lasting impact on U.S. privacy regulation. In this special Series, DWT starts with some background on what led us to this point and what we ...

Feb22Just Around the Corner – HIPAA Audits for Business Associates

Financial organizations that are business associates can expect a wave of HIPAA desk audits to evaluate the HIPAA compliance efforts of business associates.  These audits have a limited focus and are conducted by the U.S. Department of Health and Human Services’ Office for Civil Rights (OCR).  For business associates, desk ...

RESOURCES & UPDATES

data breachAre You Prepared For When Things Go Wrong?

If your company’s data suddenly becomes lost or stolen, or is accessed without authorization, can you handle what comes next? Every day, entities of all shapes and sizes experience some form of a security breach. Some are the result of system hacking, theft, or malware, but some are simply the ...

video 1Cyber Security Threats are Evolving. Are You?

Cyber-attacks are constantly growing more challenging and dangerous. It is a top priority for businesses to protect their networks, computers, and information from unauthorized access. Should a data breach occur, cyber criminals, industry competitors, and even foreign governments put your employees and business and customer relationships at risk. What can ...

Feeling Lost in a Storm After Suffering a Data Breach?

The FTC Issues Guidance on How to Batten Down the Hatches   When faced with a data breach, it’s easy for companies to feel like they’re attempting to navigate a storm without a rudder. To provide a guiding light to companies, the Federal Trade Commission (“FTC”) recently issued a guide for businesses, with ...

Privacy Rules Surrounding Student Mental Health

September can bring about lots of changes, especially for college students. The National Alliance on Mental Illness (NAMI) released a guide for departing college students and their families on mental illness, including navigating certain privacy laws. Health privacy and confidentiality laws protect your health records, including mental health records. The laws ...

Cybersecurity Response to Recent Wholesale Payment Systems Breaches

In February 2016, hackers stole $81 million from the Bangladesh central bank by sending fraudulent messages through the Society for Worldwide Interbank Financial Telecommunication (SWIFT) messaging system. Three months later, hackers attempted to steal over $1 million from a commercial bank in Vietnam using a similar method. Since then, almost a ...
LexBlog