The Federal Communications Commission (FCC) announced on April 8 that it had adopted a consent decree between its Enforcement Bureau and AT&T Services, Inc. (AT&T), including a civil penalty of $25 million and a requirement to adopt a comprehensive compliance plan, among other actions. The consent decree alleges that AT&T “failed to protect the confidentiality” […]
Data Security
Kim Peretti and Dominique Shelton Speaking at Georgetown’s 2015 Cybersecurity Law Institute
Kim Peretti and Dominique Shelton will be featured speakers at the 3rd Annual Cybersecurity Law Institute, hosted by Georgetown Law Continuing Legal Education, and co-sponsored by the American Bar Association Cybersecurity Legal Task Force, Bloomberg BNA, and the Center for Internet Security. The Institute, designed by a national advisory board of professionals, will be held on […]
White House Releases Consumer Privacy Bill of Rights
On February 27, 2015, the Obama Administration released a discussion draft of the Consumer Privacy Bill of Rights Act of 2015 (the “Privacy Act”), holding true to President Barack Obama’s commitment in 2012 to introduce legislation to put the Privacy Act’s principles into law. The Privacy Act is intended to “establish baseline protections for individual […]
Peter Swire Honored with IAPP Privacy Leadership Award
Peter Swire, Georgia Institute of Technology Scheller College of Business professor and senior counsel in Alston & Bird’s Privacy & Data Security Group, was honored with the 2015 Privacy Leadership Award from The International Association of Privacy Professionals (IAPP). Swire is recognized for his commitment to the privacy field in tackling emerging privacy and security […]
White House Announces Creation of New Center to Analyze and Share Cyber Threat Intelligence
On Tuesday, February 10, Lisa Monaco, the Assistant to the President for Homeland Security and Counterterrorism, announced the creation of the Cyber Threat Intelligence Integration Center (CTIIC). The CTIIC will be responsible for analyzing and integrating cyber threat intelligence currently collected by other government agencies and “producing coordinated cyber threat assessments” based on that intelligence. […]