A November 13, 2015 decision from the Federal Trade Commission’s Chief Administrative Law Judge, D. Michael Chappell, calls into question FTC enforcement in the data privacy space. The case began when the FTC filed a complaint on August 28, 2013 after an employee of LabMD, a cancer detection laboratory, downloaded peer-to-peer (“P2P”) software that exposed patient […]
Cybersecurity
Alston & Bird Partners Speak at NAWL General Counsel Institute
Kim Peretti, partner and co-chair of Alston & Bird’s Cybersecurity Preparedness & Response Team, and Allison Ryan, partner, were speakers in the session “The Role of In-House Counsel in Cybersecurity in Both the Pre- and Post-Breach Worlds” at the 11th Annual General Counsel Institute. The Institute took place November 5-6 in New York and was hosted by the National […]
Kim Peretti to Speak at Today’s General Counsel Institute
Kim Peretti, partner and co-chair of Alston & Bird’s Cybersecurity Preparedness & Response Team, will speak at “The Exchange” Data Privacy and Cybersecurity Forum in Washington, DC from November 4-5. The forum is being presented by Today’s General Counsel Institute. Kim will be presenting on the topic “Breach Response: What Do I Do Now?” The session will […]
Kim Peretti Presents at FCC Cybersecurity Forum
Kim Peretti, partner and co-chair of Alston & Bird’s Cybersecurity Preparedness & Response Team, was a featured speaker at the Cybersecurity Forum for Independent and Executive Branch Regulators, organized by the Federal Communications Commission and the Federal Reserve Board on October 16. The Forum, which was held at FCC headquarters in Washington, D.C., focused on primary issues […]
Alston & Bird to Host Live Program and Webinar on National Security, Espionage, and Data Breaches
On October 29, Alston & Bird’s Cybersecurity Preparedness & Response Team will host a live program and webinar called National Security, Cyber Espionage and “Bulk PII” Breaches in our Washington, DC office. The program will examine the recent phenomenon of allegedly state-sponsored actors executing major cyber-attacks specifically targeting large databases of personal data for espionage […]