The Global Law Forum will host The Cybersecurity Law & Policy In-House Summit in Washington D.C. on January 14 and 15, 2014. The Summit will showcase panel discussions addressing a myriad of issues relevant to corporate counsel including establishing data breach response plans, understanding the cybersecurity insurance market, achieving Board of Directors and company buy-in […]
Kim Peretti and Dominique Shelton Quoted in “Privacy Cases to Watch in 2014”
Kim Peretti and Dominique Shelton, partners in the firm’s Privacy & Data Security Group, were quoted in a Law360 article discussing the privacy cases to watch in 2014. Peretti noted that the top item on most privacy attorneys’ watch list is how judges will respond to arguments by Wyndham Worldwide Corp. and LabMD Inc., two high-profile […]
2013 Ends with a Bang – Northern District of California Court Denies Hulu’s Summary Judgment Motion in Video Tracking Case
Many companies host videos on their websites or via mobile apps. They often use analytic companies/vendors to help them track whether the videos are in fact viewed and other information about site usage. This is precisely the issue at the core of the case titled In re Hulu Privacy Litigation, pending in the Northern District […]
HIPAA, Mental Health and the National Instant Criminal Background Check System Back in the News
Today, the US Department of Health & Human Services (HHS) publishes a proposed rule in the Federal Register by which it seeks to encourage reporting of persons with mental health bars to gun ownership/possession to the National Instant Criminal Background Check System (NICS). It proposes to do so by revising the HIPAA Privacy Rule to […]
Alston & Bird Webinar: The Cybersecurity Framework: Understanding Its Structure, Content and Potential Impact
On Tuesday, January 21, join Alston & Bird in a lively discussion on the NIST Preliminary Cybersecurity Framework. The release of the NIST Preliminary Cybersecurity Framework in October marks one of the final steps in creating the “voluntary” framework envisioned in the Obama administration’s Executive Order on Improving Critical Infrastructure Cybersecurity. While the development of the […]