David Keating, partner in the firm’s Technology and Privacy Group and co-leader of the firm’s Privacy & Data Security practice, was quoted in an article by The Associated Press titled “Europe’s Move to Rein in Google Would Stall in U.S.” The article discusses a recent European Court of Justice ruling that some read to establish a “right to be […]
Uncategorized
Kim Peretti Quoted in Law360 Article “Post-Target Breach Laws Ratchet Up Pressure On Companies”
Kim Peretti, co-chair of the firm’s Security Incident Management & Response Team, was quoted in the Law360 article “Post-Target Breach Laws Ratchet Up Pressure On Companies.” The article discussed how Florida, Minnesota and several other states have moved to amend their data breach notification laws to tighten reporting timelines in response to the Target data […]
California Expands the Confidentiality of Medical Information Act to Personal Health Records and Mobile Applications
With the increasing use of mobile applications and the storage of medical information online, there is a growing concern for preventing the unauthorized use, disclosure and access to such highly confidential information. According to the California Department of Justice’s Privacy Enforcement and Protection Unit, personal health records (PHRs) are defined as “Internet-based applications that allow […]
Alston & Bird’s Jim Harvey is Quoted in the Bloomberg Article, “Banks, Utilities Seen as Targets of Syrian Cyber-Attacks”
On Thursday, August 29, Jim Harvey, partner in the firm’s Intellectual Property Group and co-chair of the Privacy & Security Task Force, was quoted in a Bloomberg article, Banks, Utilities Seen as Targets of Syrian Cyber-Attacks, discussing how businesses and banks are now on high alert as the United States is planning for a possible wave […]
NIST Releases Discussion Draft of Framework for Improving Critical Infrastructure Cybersecurity
On Wednesday, the National Institute for Standards and Technology (NIST) released a draft framework on voluntary cybersecurity standards for critical infrastructure that attempts to further formalize industry best practices, offer language implementation, and define privacy requirements. The documents supporting the framework were released in advance of the Fourth Cybersecurity Framework workshop on Sept.11-13, 2013, in Dallas. […]