Today, the U.S. Department of Health & Human Services’s (HHS) Office for Civil Rights (OCR) announced the launch of Phase 2 of its HIPAA Compliance Audit Program. (OCR’s announcement can be accessed at Audit Phase 2 Announcement and further information about Phase 2 can be accessed at Audit Phase 2 Information.) In this phase, OCR will […]
Cybersecurity
FCC Proposes New Privacy Rules for Internet Service Providers
On March 10, 2016, the Federal Communications Commission (“FCC”) proposed new privacy and data security rules for Internet service providers (“ISPs”) that, if passed, would regulate how ISPs collect, use, share, and protect customers’ data. The notice of proposed rulemaking (“NPRM”) that FCC Chairman Tom Wheeler circulated for consideration by the full Commission is previewed […]
FTC Announces Study of PCI-DSS Assessment Companies
On Monday, March 7 the Federal Trade Commission (FTC) issued a press release announcing that it had issued Orders to nine Qualified Security Assessor (QSA) companies, which are certified to assess whether or not entities involved in payment card processing, such as merchants, are compliant with the Payment Card Industry Data Security Standards (PCI DSS). […]
IBM and Alston & Bird Webinar: Cybersecurity Preparedness and Incident Response – On a Global Basis – March 29
IBM and Alston & Bird will host a webinar on Tuesday, March 29. Security incidents are increasingly taking on a global flavor, as multi-national companies continue to expand their data footprint across the globe. At the same time, a number of countries are passing new laws and regulations regarding cybersecurity preparedness and breach notification. The […]
Kim Peretti on Panel at 2016 Georgetown Law Women’s Forum
Kim Peretti was a featured speaker at Georgetown Law’s 2016 Women’s Forum, titled “Opportunities in a Changing World,” held on March 4. This annual program features dynamic speakers on several interactive panels. Ms. Peretti’s panel was titled “Grappling with Legal Issues in Cybersecurity” and discussed the evolving legal specialty of cybersecurity, including: whether it is […]