FISMA
Federal Information Security Management Act
By InfoLawGroup LLP on October 05, 2009
FERPA
Family Educational Rights and Privacy Act
By InfoLawGroup LLP on October 05, 2009
Federal Rules of Evidence
Federal Rules of Evidence
By InfoLawGroup LLP on October 05, 2009
Federal Rules of Civil Procedure
Federal Rules of Civil Procedure
By InfoLawGroup LLP on October 05, 2009
FCRA
Fair Credit Reporting Act
By InfoLawGroup LLP on October 05, 2009
Electronic Communications Privacy Act
By InfoLawGroup LLP on October 05, 2009
Economic Espionage Act
Economic Espionage Act
By InfoLawGroup LLP on October 05, 2009
E-Sign
Electronic Signatures in Global and National Commerce Act
By InfoLawGroup LLP on October 05, 2009
DPPA
Drivers Privacy Protection Act
By InfoLawGroup LLP on October 05, 2009
Do-Not-Call
Do-Not-Call Regulations
By InfoLawGroup LLP on October 05, 2009
copyright, DMCA
Digital Millenium Copyright Act
By InfoLawGroup LLP on October 05, 2009
Copyright Act
Copyright Act
By InfoLawGroup LLP on October 05, 2009
COPPA
Children's Online Privacy Protection Act
By InfoLawGroup LLP on October 05, 2009
CFAA
Computer Fraud and Abuse Act
By InfoLawGroup LLP on October 05, 2009
CDA
Communications Decency Act
By InfoLawGroup LLP on October 05, 2009
CAN-SPAM
CAN-SPAM
By InfoLawGroup LLP on October 05, 2009
Anticybersquatting Consumer Protection Act (ACPA)
ACPA
By InfoLawGroup LLP on October 05, 2009
data security, e-commerce, InfoLawGroup, information technology, InformationLawGroup, intellectual property, privacy, welcome
Welcome! The InformationLawGroup is Here
By InfoLawGroup LLP on October 05, 2009
We are thrilled to announce the official launch of the InformationLawGroup! The InformationLawGroup is a group of attorneys that love the law and technology. We concentrate on legal issues concerning privacy, data security, information technology, e-commerce and intellectual property. We are a full service firm addressing a broad spectrum of matters, including transactions, compliance, breach notice and incident response and litigation. We come together today after many years in large law firm and in-house roles. We are seasoned attorneys, including former "BigLaw" lawyers, smaller practitioners with clearly defined expertise and reputation in the field, and former in-house lawyers with specific information law experience and talent. These factors result in greatly increased efficiency and better results at a significantly lower price for the firm's clients. So who are we? Read more after the jump.
business associate, covered entity, delay, exceptions, financial, reputational, or other harm, HIPAA, HITECH HIPAA breach notification covered entity business associate significan..., law enforcement, or other harm exceptions law enforcement delay risk assessment, reputational, risk assessment, significant risk
The New Health Care Breach Notification Landscape -- HHS Rules
By InfoLawGroup LLP on October 05, 2009
On February 17, 2009, Congress signed into law the Health Information Technology for Economic and Clinical Health or "HITECH" Act ("HITECH" or the "Act") as part of the American Recovery and Reinvestment Act. The HITECH Act requires entities covered by the Health Insurance Portability and Accountability Act ("HIPAA") to provide notification to affected individuals and to the Secretary of Health and Human Services ("HHS") following the discovery of a breach of unsecured protected health information. HITECH also requires business associates of HIPAA-covered entities to notify the covered entity in the event of the breach. The Act required HHS to issue interim final regulations with respect to the new breach notification requirements. On August 24, 2009, the HHS interim final regulations were published in the Federal Register.
256-bit key, AES, assymetric cryptography, data at rest, DES, file encryption, FIPS 197, FIPS 200, hardward-based encryption, mobile encryption, NIST, NIST 800-53, OMB, OMB M-07-16, PKI, RSA Security, software disk encryption
Code or Clear? Encryption Requirements (Part 4)
By W. Scott Blackmer on October 04, 2009
In other posts, I talked about the trend toward more prescriptive encryption requirements in laws and regulations governing certain categories of personal data and other protected information. Here's an overview of the standards and related products available for safe (and legally defensible) handling of protected data.