Jim Harvey, partner and co-chair of the firm’s Privacy & Data Security team and the Security Incident Management and Response Team, will moderate a panel discussion during this April 2 webinar. The featured speakers are Kim Peretti, Partner and co-chair of the firm’s Security Incident Management & Response Team, E.J. Hilbert, Managing Director and Head of […]
Privacy
Alston & Bird Hosting Privacy, Innovation and Big Data Program Organized by the American Constitution Society
On March 25, Alston & Bird partner David Keating to moderate panel discussion organized by the American Constitution Society and Georgia State Bar on Big Data. Featured speakers are Georgia Tech’s Peter Swire, Acxiom’s Jerry Jones, FTC’s Cindy Liebes, and attorney Gerald Weber. David Keating, Partner and co-chair of the firm’s Privacy & Security team, […]
Jim Harvey Speaking at the 2014 IAPP Global Privacy Summit
Jim Harvey, co-chair of the firm’s Privacy & Data Security practice and the Security Incident Management and Response Team, will participate as a presenter at the 2014 IAPP Global Privacy Summit, March 5-7. The IAPP Summit, one of the largest in the world, hosts privacy and security professionals to focus on a range of privacy-related topics. […]
OCR Issues New Guidance on the HIPAA Privacy Rule and Sharing of Mental Health Information
Late last week, the HHS Office for Civil Rights (OCR) published guidance designed to help health care providers understand when, consistent with the HIPAA Privacy Rule, they may share information related to a patient’s mental health with others. As we have previously written, HHS seeks to balance a patient’s privacy rights in mental health records […]
Complimentary Seminar – Payment Card Breaches: How to Prepare, How to Survive – March 5, 2014
Please join Alston & Bird, Dell SecureWorks and AIG for a discussion on how to prepare for and respond to payment card breaches. Recent payment card breaches in the retail industry have highlighted the need to fully prepare for similar types of attacks, both in terms of increasing security controls where appropriate and enhancing incident […]