Antitrust Law Source

Tag Archives: data security

Still need a data breach response plan? The FTC offers a guide to help.

If you have not yet developed a data breach response plan, the FTC has stepped in to help. The FTC has prepared a guide, a short video and a corresponding segment on its business blog to help businesses prepare for data breach events. The guide and video provide key considerations, including having your computer forensic … Continue Reading

Insights into the data analytics community

Jay is once again accompanied by Phil Rist, executive vice president of Prosper Business Development, to discuss how the data analytics community is growing, what’s needed to get into the business and how once separate industries are coming together to provide better customer experiences.… Continue Reading

FTC has ruled….and companies better beware!

In a move the surprised no one, the Federal Trade Commission (FTC) reversed the decision of its own Administrative Law Judge (ALJ) and held that LabMD’s “data security practices constitute an unfair act or practice within the meaning of Section 5 of the FTC Act.” There are two noteworthy aspects to the opinion. First, if … Continue Reading

Part two: Privacy matters

Continuing with part two of this three-part series about privacy and data security, Ana Crawford gives an update on which federal agencies and states are dipping their toes in the data protection arena.… Continue Reading

Part one: Privacy matters

In this three-part series, Jay speaks with attorneys across Porter Wright’s departments and practices about privacy and data security. Today’s podcast begins with Christina Hultsch who talks about the options available for European Union companies to transfer data.… Continue Reading

Consumer data breaches

What happens if your personally identifiable information is stolen, but no harm has come to you…yet? Do the eyes of the court feel that simply the fear of harm warrants relief? Jay and Ryan Graham discuss the differing decisions to date and how things may evolve in the future.… Continue Reading

Big data and what can be done with it: Part three

In our last installment of the big data podcast series (listen to part one and part two), Jay and Phil discuss how companies deal with data breaches. They talk about how consumer trust is vital and how customers may prepare in advance for these breaches. Finally, Phil shares three tips when it comes to using … Continue Reading

Big data and what can be done with it: Part two

Continuing their conversation regarding big data, Phil and Jay discuss what companies should be doing with big data, how to figure out whether they are using it correctly and if there is a better way of doing it. How do companies place value on their data to make financial decisions?… Continue Reading

Big data and what can be done with it: Part one

In part one of this three-part series, Jay talks with Phil Rist, executive vice president of Prosper Business Development, about how his company collects big data and utilizes it to detect trends that aid his clients in developing their strategic plans. Phil discusses how his company not only takes data available from the federal government, … Continue Reading

Health care data breaches – inevitable, but you can minimize the damage

Data breaches in health care can be the most devastating, both to the consumers whose personally identifiable information was exposed, but also to the institutions that possessed this sensitive data. In this podcast Jay and Christina Hultsch review the various issues surrounding such data breaches, including when to review data security policies, how to prepare … Continue Reading

FTC chief administrative law judge: No harm, no foul

In a long awaited decision, the FTC’s chief administrative law judge (ALJ) ruled against FTC staff and held that LabMD did not violate Section 5 of the FTC Act by not reasonably securing customer data. The basis for the decision was that staff could not prove that customers would suffer “substantial injury” from LabMD’s data … Continue Reading

Third Circuit’s Wyndham decision – Part two

So what did the Third Circuit hold in FTC vs. Wyndham and what does the decision really mean? Jay and Ryan continue their discussion of the Third Circuit’s decision and give you some key takeaways on what this means for companies that collect personally identifiable information.… Continue Reading

Third Circuit’s Wyndham decision – Part one

In part one of this two part series, Jay is joined by Ryan Graham, a colleague at Porter Wright and former FBI analyst, to discuss the Third Circuit’s decision in FTC vs. Wyndham. Ryan and Jay discuss generally the various agencies who have authority over data security and the challenges facing companies who have experienced … Continue Reading

Managing post-data breach litigation just got harder

Data breaches are messy stuff, no doubt about that. They consume a huge amount of corporate resources, damage a company’s goodwill and can cost a lot of money. No real news there. And while the technological challenges in preventing, and responding to, data breaches are ever-changing – fueling the booming cybersecurity industry – the corporate … Continue Reading

FTC strikes back against virtual Peeping Tom

Have you ever felt as if someone was watching you through your computer? In FTC strikes back against virtual Peeping Tom, members of Porter Wright’s Technology practice Jay Levine and Donna Ruscitti, cover the flat out creepy scenario involving Aaron’s, one of the country’s largest rent-to-own (RTO) stores, which was charged its franchisees were spying … Continue Reading
LexBlog