Posts

gdpr processing personal data

When is it “Necessary” to Process Personal Data Under GDPR?

Last week I wrote about the EU’s new General Data Protection Regulation (GDPR) consumer-friendly approach to personal data collection and storage. This regulation, which went into effect earlier this year, requires that companies only collect, store, or process personal data when there is consent or when it is necessary. CompaniesLast week I wrote about the EU’s new General Data Protection Regulation (GDPR) consumer-friendly approach to personal data collection and storage. This regulation, which went into effect earlier this year, requires that companies only collect, store, or process personal data when there is consent or when it is necessary. Companies

data security update

7 Reasons to Read FTC’s 2017 Privacy & Data Security Update

The Federal Trade Commission (“FTC”) recently released its 2017 Annual Privacy and Data Security Update (click here; for the direct link to the Update, click here and then click on the PDF link provided). We see seven compelling reasons to read the 2017 FTC Update and to take data breachesThe Federal Trade Commission (“FTC”) recently released its 2017 Annual Privacy and Data Security Update (click here; for the direct link to the Update, click here and then click on the PDF link provided). We see seven compelling reasons to read the 2017 FTC Update and to take data breaches

Discover Data Security Breaches

Employees Most Likely to Discover Data Security Breaches

One thing that all data security breaches have in common is that someone must first uncover the breach and then reveal the breach to the appropriate parties (i.e., employers, law enforcement, other appropriate state and federal agencies, etc.). In the case of a business that is attacked and breached, anOne thing that all data security breaches have in common is that someone must first uncover the breach and then reveal the breach to the appropriate parties (i.e., employers, law enforcement, other appropriate state and federal agencies, etc.). In the case of a business that is attacked and breached, an

general data protection regulation

The EU Data Protection Law Affects Companies Worldwide

Earlier this month, I published the following article on Practical Ecommerce about the European Union’s GDPR and how it could effect e-commerce stores. You should read this article. You should take it seriously. I’ll admit it — we lawyers are risk averse. We tend to prepare clients for the terrors in theEarlier this month, I published the following article on Practical Ecommerce about the European Union’s GDPR and how it could effect e-commerce stores. You should read this article. You should take it seriously. I’ll admit it — we lawyers are risk averse. We tend to prepare clients for the terrors in the

Data Breach

8 Reasons You Need a Data Breach Attorney

With growth in digital data has come a growth in data breaches. The need for greater protection means you need a data breach attorney. Data breaches aren’t restricted to hackers gaining access to your electronic data. It can also apply to people gaining access to printed materials. Negligence may beWith growth in digital data has come a growth in data breaches. The need for greater protection means you need a data breach attorney. Data breaches aren’t restricted to hackers gaining access to your electronic data. It can also apply to people gaining access to printed materials. Negligence may be

military data breach

OPM and U.S. Military Data Breaches

In the hacking world, a few of the most favored data breach targets include governmental agencies and militaries. Whether it is the challenge of hacking these presumably highly secure entities, or the thrill and notoriety associated with a successful hack, governments and militaries are constantly subjected to cyber threats. InIn the hacking world, a few of the most favored data breach targets include governmental agencies and militaries. Whether it is the challenge of hacking these presumably highly secure entities, or the thrill and notoriety associated with a successful hack, governments and militaries are constantly subjected to cyber threats. In