The Payment Card Industry Security Standards Council (PCI-SSC) today released recommendations for meeting the PCI Data Security Standard (PCI-DSS) when sharing cardholder data with third party service providers. PCI-DSS requires a merchant or other entity in entrusted with cardholder data to ensure that cardholder data continues to be protected when it is provided to a […]
Data Protection
David Keating Quoted by The Associated Press
David Keating, partner in the firm’s Technology and Privacy Group and co-leader of the firm’s Privacy & Data Security practice, was quoted in an article by The Associated Press titled “Europe’s Move to Rein in Google Would Stall in U.S.” The article discusses a recent European Court of Justice ruling that some read to establish a “right to be […]
American Apparel Settles FTC Charge on Falsely Claiming Compliance with Safe Harbor Privacy Framework
On May 9, 2014, the Federal Trade Commission (the “FTC”) announced that American Apparel, Inc. (“American Apparel”) agreed to settle FTC charges that American Apparel falsely claimed it was compliant with the U.S.-European Union Safe Harbor (the “US-EU Safe Harbor Framework”). The FTC’s complaint alleged that American Apparel, a clothing manufacturer and retailer with more than 200 […]
Mobile Apps in the Spotlight during Upcoming GPEN International Privacy Sweep
On May 6, the Office of the Privacy Commissioner of Canada (the “Commissioner”) announced mobile apps as the Global Privacy Enforcement Network’s (“GPEN’s”) focus area during the upcoming International Privacy Sweep (the “Sweep”). The Sweep will be held from May 12 to 18, 2014, involving 27 privacy enforcement authorities from around the world. The news […]
FFIEC to Host Cybersecurity Webinar
On May 7, the Federal Financial Institutions Examination Council (FFIEC) will host a free webinar on cybersecurity for financial institutions, entitled Executive Leadership of Cybersecurity: What Today’s CEO Needs to Know About the Threats They Don’t See. The webinar will provide guidance to senior managers on responding effectively to “current cyber threats.” Topics include “building a […]