#AdvertisingLaw, #behavioraltargeting, #Intellectualproperty, #InternetTV, #Marketing, #RightOfPublicity, #streaming, ADA, advertising, FCC, Mobile, privacy
BYOB: Be Your Own Broadcaster (and Studio) –What to watch out for in content creation and distribution
By Heather Nolan on March 06, 2017
AGE, APP, app developers, CARU, children's privacy, COPPA, FTC, Mobile, privacy
Math Question As Age-Gate and Invite-A-Friend Under Fire
By Jamie Rubin on April 26, 2016
app developers, app store, Apps, COPPA, data security, FTC, information security, mobile apps, privacy
Recent International Study Reports Delinquencies in App Privacy Disclosures
By InfoLawGroup LLP on September 15, 2014
Breach, information security
Massachusetts Continues Aggressive Information Security Enforcement Agenda
By Mark Paulding on July 25, 2014
Breach, breach response, data breach, data protection, InfoLawGroup, information security, new york breach, privacy, Segalis
Record Number of Data Breaches for New Yorkers in 2013
By InfoLawGroup LLP on July 17, 2014
advertising, Apps, blurring, CARU, Children's Advertising Review Unit, COPPA, Mobile
CARU IS WATCHING YOUR…APPS
By Jamie Rubin on March 18, 2014
cybersecurity, cybersecurity framework, data protection, data security, hacking, InfoLawGroup, information security, information security program, Paulding, Red Flags Rule, Segalis, smart grid, white house order
Cybersecurity Effort Moves Forward – NIST Issues Final Critical Infrastructure Cybersecurity Framework
By InfoLawGroup LLP on February 18, 2014
Breach, information security, risk management
Information Security Strategy: A Lesson from the Target Breach
By Mark Paulding on February 18, 2014
FTC, FTC Act, Mobile
FTC Report Issues Recommendation on Mobile Payments
By InfoLawGroup LLP on March 14, 2013
cybersecurity, data protection, InfoLawGroup, information security, InformationLawGroup, privacy, Segalis, utility
White House Cyber Security Order Likely to Have Long-Term Impact on Critical Infrastructure Owners and Operators
By InfoLawGroup LLP on February 13, 2013
California, CalOPPA, Guidelines, Mobile, Privacy Policy
California AG Releases Mobile App Guidelines; Industry Responds
By InfoLawGroup LLP on January 17, 2013
Apps, Attorney General, CalOPPA, Kamala Harris, Mobile, Privacy Policy
California Attorney General Sues Delta Air Lines for Failing to Have a Mobile App Privacy Policy
By InfoLawGroup LLP on December 10, 2012
cyber insurance, data breach, data privacy, information security, risk management, SMB
How Cyber Risk Insurance Can Help SMB's Stay in Business After a Breach
By InfoLawGroup LLP on October 03, 2012
Act, Amazon, Apple, California, communications, Communications Act, FCC, FTC, Google, Hewlett-Packard, Microsoft, Mobile, privacy, RIM
FCC Seeks Public Comment on Mobile Carrier Privacy Policies Following Data Collection Controversy
By InfoLawGroup LLP on June 29, 2012
In re-launching the inquiry into carriers' data privacy and security practices, the FCC argues that not informing customers about the software or its data practices may have violated the carriers' responsibility pursuant to Section 222 of the Communications Act of 1934 to protect customer data "that is made available to a carrier solely by virtue of the carrier-customer relationship." The law allows such data to be used only in "limited circumstances," a term which is not defined in Section 222. It appears that one of the goals of the renewed inquiry is for the FCC to define the scope of the "limited circumstances."
anti-virus, assessment, audit, bring your own device, bring your own device coit device encrypt incident response mobile privacy se..., byod, coit, device, encrypt, forensics, incident response, liability, Mobile, mobile privacy, privacy, Security, security breach, security program, subpoena
The Legal Implications of BYOD (Part II) - Preparing Personal Device Use Policies
By InfoLawGroup LLP on June 11, 2012
In our last "bring your own device" post we explored some of the key security, privacy and incident response issues related to BYOD. These issues are often important drivers in a company's decision to pursue a BYOD strategy and set the scope of personal device use within their organization. If the risks and costs associated with BYOD outstrip the benefits, a BYOD strategy may be abandoned altogether. One of the primary tools (if not the most important tool) for addressing such risks are BYOD-related policies. Sometimes these policies are embedded within an organization's existing security and privacy policy framework. More frequently, however, companies are creating separate personal device use policies that stand alone or work with/cross-reference existing company security, privacy and incident response polices. This post lays out the key considerations company lawyers and compliance personnel should take into account when creating personal device use policies and outlines some of the important provisions that are often found in such policies.
anti-virus, bring your own device, byod, coit, device, encrypt, Fourth Amendment, incident response, management, Mobile, mobile privacy, privacy, Security, security breach, security privacy mobile privacy Mobile coit bring your own device incident re..., security program
The Security, Privacy and Legal Implications of BYOD (Bring Your Own Device)
By InfoLawGroup LLP on March 28, 2012
Employees are increasingly using (and demanding to use) their personal devices to store and process their employer's data, and connect to their networks. This "Bring Your Own Device" trend is in full swing, whether companies like it or not. Some organizations believe that BYOD will allow them to avoid significant hardware, software and IT support costs. Even if cost-savings is not the goal, most companies believe that processing of company data on employee personal devices is inevitable and unavoidable.Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk. This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including "reasonable" BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations.
Amazon, Apple, Apps, California, CalOPPA, Google, Harris, HP, Microsoft, Mobile, mobile privacy, privacy bill of rights, Privacy Policy, RIM, Shine the Light, White House
Privacy in Principle (As California Goes, So Goes the Nation? Part Four)
By InfoLawGroup LLP on February 27, 2012
What happened in the privacy world last week? On Thursday, just before the release of the White House Paper, California Attorney General Kamala Harris announced an agreement with the leading operators of mobile application platforms to privacy principles designed to bring the mobile app industry in line with a California law requiring mobile apps that collect personal information to have a privacy policy. It might be argued that the White House is now enunciating principles and best practices, and encouraging legislation of principles, that have long been embodied not only as best practice but as actual legislation under California law.
Guidelines, InfoLawGroup, MMA, Mobile, policy, privacy, Privacy Policy
MMA Proposes Mobile Application Privacy Policy Framework
By Justine Young Gottshall on October 20, 2011
Blumethal, Breach, data security, InfoLawGroup, information law group, information security, Personal Data Protection and Breach Accountability Act, privacy, privacy legislation, Segalis
We Discuss Benefits of Federal Information Security Legislation on Fox
By InfoLawGroup LLP on September 14, 2011
Earlier this week we blogged about Senator Blumenthal's (D-CT) proposed Personal Data Protection and Breach Accountability Act of 2011. Today, InfoLawGroup partner Boris Segalis spoke on Fox Live about the advantages of federal information security legislation.
COPPA, FTC, Mobile, mobile privacy
Mobile Application Settles FTC Charges of COPPA Violations
By Justine Young Gottshall on August 16, 2011