Senate Introduces The Data Care Act of 2018

On Wednesday, December 12, 2018, Senator Brian Schatz (D-HI), Ranking Member of the Communications, Technology, Innovation, and the Internet Subcommittee, introduced The Data Care Act of 2018. The bill, which is co-sponsored by 14 Senate Democrats, would establish numerous consumer … Continue reading

Posted in Data Protection, FTC, Privacy, Privacy Policy, State Privacy Laws, Uncategorized | Tagged , ,

Share this Article:

Snell & Wilmer Rolls Out Interactive Data Breach Map

Snell & Wilmer’s Breach Response Team regularly guides clients through all phases of data breach and cyber incident response, including leading internal investigations related to data breaches and cyber incidents in coordination with third-party forensic experts; providing comprehensive crisis management … Continue reading

Posted in Data Breach

Share this Article:

South Dakota’s New Breach Notification Law

On March 21, 2018, South Dakota became the 49th state to enact a breach notification law. The South Dakota law will take effect on July 1, 2018.  Here is a summary of several of the new legislation’s key features: Defining … Continue reading

Posted in Data Breach, Government Regulations, Notification, Personal Information, State Privacy Laws

Share this Article:

FTC’s “Stick With Security” #8: Make Sure Your Service Providers Use Reasonable Security Measures

On September 15, 2017, the FTC released its eighth “Stick with Security” principle, which offers advice that individuals and organizations should consider when hiring others to process sensitive data. A few tips for making sure those service providers implement reasonable … Continue reading

Posted in Cyber Security, Data Protection, FTC

Share this Article:

FTC’s “Stick With Security” #7: Apply Sound Security Practices When Developing New Products

On September 8, 2017, the FTC released its seventh “Stick with Security” principle, which offered guidance regarding how companies incorporate security by design to prevent or minimize threats in the following ways: Train Your Engineers in Secure Coding Companies would … Continue reading

Posted in Cyber Security, Data Protection, FTC

Share this Article:

FTC’s “Stick With Security” #6: Protect Remote Access To Your Network

On September 1, 2017, the FTC released its sixth “Stick with Security” principle, which highlighted the steps businesses can take to ensure that “outside entryways” into network systems are secure. Securing remote access to a network involves two aspects: Ensure … Continue reading

Posted in Cyber Security, Data Protection, FTC

Share this Article:

FTC’s “Stick With Security” #5: Segment Your Network And Monitor Who’s Trying To Get In And Out

On August 25, 2017, the FTC released its fifth “Stick with Security” principal, which focused on how companies can protect their virtual “entrances and exits” and make life harder for hackers. The FTC believes that the kind of attention businesses … Continue reading

Posted in Cyber Security, Data Protection, FTC

Share this Article:

FTC’s “Stick With Security” #4: Store Sensitive Information Securely & Protect It During Transmission

On August 18, 2017, the FTC released its fourth “Stick with Security” principle, which explained the importance of keeping confidential data only when needed, and securely storing the data when it must be kept.  To that end, an essential security tool … Continue reading

Posted in Cyber Security, Data Protection, FTC

Share this Article:

FTC’s “Stick With Security” #3: Require Secure Passwords and Authentication

On August 11, 2017, the FTC released its third “Stick with Security” principle, which touched on the necessity of strong authentication practices. Secure passwords and fortified authentication practices make it that much harder for hackers to “bluff” their way into … Continue reading

Posted in Cyber Security, Data Protection, FTC

Share this Article:

FTC’s “Stick With Security” #2: Control Access to Data Sensibly

On August 4, 2017, the FTC released its second “Stick with Security” principle, which addressed the next step a company should take after it has identified confidential data in its possession and determined what information it needs to maintain for … Continue reading

Posted in Cyber Security, Data Protection, FTC

Share this Article: