DEVELOPMENTS & COMMENTARY

Avoiding Critical Security Risk Analysis Mistakes

Originally published in HealthCareInfoSecurity.com

Avoiding Critical Security Risk Analysis Mistakes: Adam Greene Offers Insights on HIPAA Risk Assessments

Healthcare organizations and their business associates must be careful to avoid making mistakes with their HIPAA security risk analysis in case they ever undergo a compliance review or breach investigation by federal

FCC Creates Reassigned Phone Number Database With Safe-Harbor Against TCPA Liability for Users

The Federal Communications Commission (FCC) has issued a Second Report and Order in its Advanced Methods to Target and Eliminate Robocalls proceeding to create a comprehensive database of phone numbers subject to reassignment because they have been disconnected from their prior subscribers. This initiative will come as welcome news to

He’s Making a List. Will Regulators Check His Privacy Practices Twice?

Santa’s practice of monitoring behavior of children across the globe has been publically disclosed for decades, but the recent implementation of the EU General Data Protection Regulation (GDPR) and enactment of the California Consumer Privacy Act (CCPA) raise new questions about the lawfulness of Santa’s activities and rights of children

FTC Hearings Exploring Algorithms, Artificial Intelligence, and Predictive Analytics Focus on Notions of Fairness, Transparency and Ethical Uses

The FTC continued its series of public hearings on Competition and Consumer Protection in the 21st Century with two days of hearings on November 13-14 focused on “Algorithms, Artificial Intelligence, and Predictive Analytics.” During two days of discussions and testimony panelists generally agreed that new regulations in this

Where Is the HIPAA Right to Defend One’s Self?

When a patient publicly disparages a health care provider, HIPAA leaves the health care provider in a seemingly impossible situation. If the health care provider does not respond and dispute the allegation, then its reputation – a precious commodity to an organization that relies on patients to trust it with

RESOURCES & UPDATES

On Demand Webinar ǀ Annual Review – Cybersecurity: Fundamentals of Privacy Law in 2018

On Demand Webinar ǀ Annual Review – Cybersecurity: Fundamentals of Privacy Law in 2018

This CLE will give general practitioners, litigators, corporate counsel, and transactional attorneys a fundamental understanding about how privacy connects and works with other practice areas, as well as the basics of the security of personal information

Modern Hacking Investigations in Light of Blockchain and AI Technology

Learn about modern hacking investigations in light of Blockchain and AI technology and more at the RSA Conference, March 4-8, 2019 in San Francisco.

Data security is only part of the challenge. Recently, complex cyber crimes have resulted in public indictments and convictions for state-sponsored and criminal hackers. Increasingly, those

integrated key in electronic computer circuit board.December Privacy Oracle: Analysis of FTC Data Security Hearings, Senate Privacy Hearings, and Other Policies

The future of Federal Trade Commission enforcement in the data privacy and security space was the topic of much discussion in Washington this past month. The FTC held hearings to explore key issues regarding how to incentivize good data security, while the U.S. Senate held oversight hearings focused on the

The End of Loyalty Programs: Assessing California’s New Privacy Laws and Beyond

Join the National Restaurant Association and Davis Wright Tremaine’s Helen Foster for a webinar on January 16, 2019.

In June, the California state legislature passed the nation’s toughest data privacy law to date. The California Consumer Privacy Act (CCPA) will have deep implications for the restaurant industry when it

Modern Hacking Investigations in Light of Blockchain and AI Technology

Join Chris Ott at the RSA Conference, March 4-8, 2019 in San Francisco, as he presents “Modern hacking investigations in light of Blockchain and AI technology.”

Data security is only part of the challenge. Recently, complex cyber crimes have resulted in public indictments and convictions for state-sponsored and criminal

LexBlog