<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Risk Report &#187; legislation</title>
	<atom:link href="https://privacyriskreport.com/tag/legislation/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacyriskreport.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Feb 2023 16:49:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Tick Tock: A GDPR Primer To Meet The Deadline Next Week</title>
		<link>https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week</link>
		<comments>https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/#comments</comments>
		<pubDate>Fri, 18 May 2018 17:32:15 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[legislation]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=1509</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/' data-emailit-title='Tick Tock: A GDPR Primer To Meet The Deadline Next Week'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Discussions on privacy laws have taken front and center in recent weeks as European Union (EU) member states begin enforcing the General Data Protection Regulation (“GDPR”) on May 25, 2018.  As we have been discussing for a while, there is... <a class="more-link" href="https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/' data-emailit-title='Tick Tock: A GDPR Primer To Meet The Deadline Next Week'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/">Tick Tock: A GDPR Primer To Meet The Deadline Next Week</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/' data-emailit-title='Tick Tock: A GDPR Primer To Meet The Deadline Next Week'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Discussions on privacy laws have taken front and center in recent weeks as European Union (EU) member states begin enforcing the General Data Protection Regulation (“GDPR”) on May 25, 2018.  <a href="https://privacyriskreport.com/ironing-out-the-wrinkles-in-data-legislation-a-case-study/" target="_blank">As we have been discussing for a while</a>, there is confusion as data collectors try to figure out the impact of this legislation.  There is no question that large, multi-national corporations will have to comply and many of these corporations are already in compliance.  However, with this deadline just around the corner, smaller companies that do not actively target EU residents are struggling with how this legislation impacts them.</p>
<p>Until all these laws are harmonized, the safest route for smaller companies may be to comply with GDPR, state, federal, local and industry regulations as much as possible. While the GDPR deadline is looming, it is worthwhile for smaller data collectors to consider the following:</p>
<p><strong>GDPR Overview</strong></p>
<p>The GDPR website states this legislation “replaces the Data Protection Directive 95/46/EC and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy.”  (A guide to the EU GDPR can be found<a href="https://www.eugdpr.org/" target="_blank"> here</a>.)</p>
<p>Importantly, GDPR will apply to all data collectors holding the personal data of EU residents regardless of the location of the data collector.  The definition of personal data is broadened to the extent to include any information “that can be used to directly or indirectly identify the person.”  Therefore, under GDPR, this information can include “anything from a name, a photo, an email address, bank details, posts on social networking websites, medical information, or a computer IP address.”</p>
<p>GDPR also imposes new obligations on how the data is to be handled and stored.  For example, EU residents will have a “right of access” that requires data collectors to provide specific details about how information is processed.  GDPR grants EU residents a right to have their personal data deleted or erased by a data collector upon their request. The penalties for non-compliance may total anywhere from 4% of the annual global turnover of the breaching data collector or €20 Million (whichever is greater).</p>
<p><strong>Should We be Concerned About GDPR Regulations?</strong></p>
<p>We have been getting questions from our clients about how GDPR may impact them.  The knee-jerk reaction from many American companies appears to be to ignore GDPR if their business is not focused on EU residents.  Admittedly, there are many questions concerning how GDPR regulations can be enforced on data collectors outside of the European Union. Of course, betting on the fact that the EU will not be able to broadly enforce these regulations is not the best strategy.</p>
<p>The consensus is that general marketing to customers that may include EU residents will not trigger an obligation under the GDPR.  Rather, it appears at this time, that EU residents will need to be directly targeted for GDPR to apply to data collectors outside the United States.  <a href="https://www.forbes.com/sites/forbestechcouncil/2017/12/04/yes-the-gdpr-will-affect-your-u-s-based-business/2/#297abf1849a9" target="_blank">Commentators have provided the following analysis</a> on this issue:</p>
<p><em>For example, a Dutch user who Googles and finds an English-language webpage written for U.S. consumers or B2B customers would not be covered under the GDPR. However, if the marketing is in the language of that country and there are references to EU users and customers, then the webpage would be considered targeted marketing and the GDPR will apply.</em></p>
<p><em>Accepting currency of that country and having a domain suffix &#8212; say a U.S. website that can be reached with a .nl  from the Netherlands &#8212; would certainly seal the case.</em></p>
<p>Even if GDPR compliance may not be a priority for smaller data collectors, it is still worthwhile at this time for data collectors to consider compliance for the following reasons:</p>
<p><em>&#8211; GDPR compliance is not costly</em>. At this point, compliance may be adding a few new disclosures to their website.</p>
<p><em>&#8211; GDPR compliance has a positive impact for customers that trust you with their data</em>. Even if large, multi-national corporations have the most at stake, working toward GDPR compliance will only make data safer.  Keeping data safe may result in more business and cutting losses related to a cyber incident.</p>
<p><em>&#8211; GDPR compliance puts you ahead of the pack</em>. There is no doubt that the GDPR regulations are the most-strict and punitive we have seen to date.  However, GDPR compliance is only going to help data collectors comply with state, federal and industry standards that they may already be required to follow.  Further, if the GDPR is successful, data collectors can be certain the U.S. will adopt similar standards.</p>
<p><strong>The Initial, Practical Approach To GDPR Compliance</strong></p>
<p>Now that it is clear that GDPR compliance may be a concern even for data collectors that are not necessarily targeting EU residents, a discussion as to the potential for liability can be guided by the following points:</p>
<ol>
<li><strong>Data Inventory. </strong>Data collectors need to first inventory the information and data that is being collected. A website that collects names and emails of visitors may gather EU resident&#8217;s data occasionally, but may not target the European Union for business.  A data collector cannot thoroughly access liability without taking stock of the origin of the collected data.</li>
<li><strong>Consent? </strong>While it is still early in the process of GDPR compliance, it is assumed that most data collectors will find there is a peripheral chance that data belonging to an EU resident will be collected.  This is the proper time to determine whether consent should be obtained from all individuals providing any data or information.  Consent does not have to be an elaborate policy that no one would want to read (we are looking at you Apple).  Rather, consent can be obtained through clear language without legalese.  From a practical standpoint, data collectors may want to use a website such as <a href="https://secureprivacy.ai/" target="_blank">SecurePrivacy.AI,</a> which has recently begun offering a free tool that scans websites for GDPR compliance</li>
<li><strong>Data/Privacy Officer. </strong>Reviewing GDPR compliance also provides an opportunity to consider whether a data/privacy officer should be appointed. This person will be responsible for handling data and information retention issues and would be a point of contact for anyone worried about how their data was gathered, used or retained.</li>
</ol>
<p>The issues concerning GDPR are not new.  Data collectors have been struggling with compliance with federal, state, local and industry data collection requirements for years.  For example, an employer in Chicago, Illinois may hold information for its employees that are residents of Illinois, Wisconsin or Indiana.  This employer may have been trying to harmonize privacy regulations for years at this point.  Consequently, data collectors should use GDPR as another opportunity to access the safeguards they have in place to protect data.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/' data-emailit-title='Tick Tock: A GDPR Primer To Meet The Deadline Next Week'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/">Tick Tock: A GDPR Primer To Meet The Deadline Next Week</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/tick-tock-a-gdpr-primer-to-meet-the-deadline-next-week/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Let’s Get Ready to Rumble: Gloves Come Off in Data Breach Standing Case</title>
		<link>https://privacyriskreport.com/lets-get-ready-to-rumble-gloves-come-off-in-data-breach-standing-case/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=lets-get-ready-to-rumble-gloves-come-off-in-data-breach-standing-case</link>
		<comments>https://privacyriskreport.com/lets-get-ready-to-rumble-gloves-come-off-in-data-breach-standing-case/#comments</comments>
		<pubDate>Tue, 10 Nov 2015 19:28:33 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[damages]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[lawsuit]]></category>
		<category><![CDATA[legislation]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[medical information]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=453</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/lets-get-ready-to-rumble-gloves-come-off-in-data-breach-standing-case/' data-emailit-title='Let’s Get Ready to Rumble: Gloves Come Off in Data Breach Standing Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>While we have seen defendants in data breach cases argue that plaintiffs were not injured and therefore lack standing to bring suit, litigants in a recent data breach case have directly addressed issues some litigants have previously danced around. On August... <a class="more-link" href="https://privacyriskreport.com/lets-get-ready-to-rumble-gloves-come-off-in-data-breach-standing-case/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/lets-get-ready-to-rumble-gloves-come-off-in-data-breach-standing-case/' data-emailit-title='Let’s Get Ready to Rumble: Gloves Come Off in Data Breach Standing Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/lets-get-ready-to-rumble-gloves-come-off-in-data-breach-standing-case/">Let’s Get Ready to Rumble: Gloves Come Off in Data Breach Standing Case</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/lets-get-ready-to-rumble-gloves-come-off-in-data-breach-standing-case/' data-emailit-title='Let’s Get Ready to Rumble: Gloves Come Off in Data Breach Standing Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>While we have seen defendants in data breach cases argue that plaintiffs were not injured and therefore lack standing to bring suit, litigants in a recent data breach case have directly addressed issues some litigants have previously danced around.</p>
<p>On August 6, 2015, Pamela Chambliss and Scott Adamson (Plaintiffs) filed a <a href="https://privacyriskreport.com/wp-content/uploads/2015/11/Chambliss-Complaint.pdf" target="_blank">class action complaint</a> in a Maryland District Court against Carefirst, Inc. (which operates under the tradename Carefirst Blue Cross Blue Shield) related to a data breach at Carefirst in 2014. The Plaintiffs claim they have health insurance through Carefirst and, therefore, were required to furnish private information to Carefirst. The class action complaint seeks damages based on allegations that Carefirst failed to adequately secure its computer hardware that stored the Plaintiffs’ personal information. Carefirst discovered this breach on May 20, 2015. The breach released the names, birthdates, email addresses and “subscriber information” of 1.1 million individuals. The class action complaint indicates Carefirst did not encrypt the stored data and was viewed as a “soft target” by hackers.</p>
<p>The first cause of action was based on allegations that Carefirst was negligent by failing to safely store personal information and “potentially confidential health information” of its members. The class action Plaintiffs further claimed this breach “proximately caused an unauthorized disclosure” of Plaintiffs’ information. The second cause of action was based on allegations that Plaintiffs’ relied on Carefirst’s representations concerning its privacy and security before they purchased health insurance. The third cause of action alleged Carefirst was unjustly enriched when it did not pay for the security and protection promised to the Plaintiffs. Finally, the Plaintiffs alleged Carefirst’s conduct constitutes a violation of the Maryland Personal Information Protection Act.</p>
<p>On September 24, 2015, Carefirst filed its motion to dismiss the class action complaint, asserting Plaintiffs&#8217; action is defective because “Plaintiffs have not alleged that they suffered an injury cognizable under Article III of the Constitution.” That is, Carefirst claims the Plaintiffs lacked standing to bring the action because the Plaintiffs’ data was not alleged to be misused in any manner.  In <a href="https://privacyriskreport.com/wp-content/uploads/2015/11/Chambliss-Memorandum.pdf" target="_blank">its supporting brief</a>, Carefirst points out the difficulty class action plaintiffs are having surviving motions to dismiss:</p>
<blockquote>
<p style="text-align: justify;"><em>Data theft is an unfortunate and increasingly common occurrence in contemporary life, victimizing literally millions of Americans. Fortunately, data loss does not always produce actual harm. Just as companies are learning how to harden their defenses against cyber theft, our Nation’s courts are learning to sort out the claims of truly injured victims from those who launch class actions without having suffered any real harm. This action falls into the latter category. </em></p>
</blockquote>
<p>On November 5, 2015, the Plaintiffs filed their <a href="https://privacyriskreport.com/wp-content/uploads/2015/11/Chambliss-Response.pdf" target="_blank">opposition to Carefirst’s motion to dismiss</a>. The Plaintiffs wasted no time addressing what appeared to be the current trend of plaintiffs having difficulties showing damage from a data breach. The opening paragraphs take aim at Carefirst’s argument as follows:</p>
<blockquote>
<p style="text-align: justify;"><em>Defendants, in their Motion, assert that data theft is a “common occurrence” as if that somehow excuses them from culpability for failing to take the reasonable, necessary steps to protect the plethora of sensitive, highly confidential personal and medical information in their possession and the harms that their insureds suffer as a result of that failure. Brief at 1.1 Defendants cannot get off so easily. In fact, the commonness of such breaches actually makes each subsequent breach all the more egregious. Just as the landlord in a high-crime area can be held liable when he fails to install a secure lock on a tenant’s door and a criminal breaks into a tenant’s apartment and harms her as a result, see e.g. <span style="text-decoration: underline;">Lay v. Dworman</span>, 732 P.2d 455 (Okla. 1987), so, too, can a health insurer, who knows of the risk of cyberattack, be liable when it fails to secure its insureds’ confidential personal information.</em></p>
</blockquote>
<p>Of course, the current dispute in the <em>Carefirst</em> case is based on what is becoming a substantial body of law concerning standing for data breach cases. In just the last year, we have seen the following developments on the standing issue:</p>
<ul>
<li><strong>7th U.S. Circuit Court of Appeals</strong>: On July 20, 2015, the 7th Circuit issued its decision in <a href="https://privacyriskreport.com/seventh-circuit-weighs-in-on-article-iii-standing-for-data-breach-plaintiffs/" target="_blank"><em>Remijas v. Neiman Marcus Group</em>, <em>LLC</em></a>, directly addressing Article III of the U.S. Constitution, the standing for data breach plaintiffs. In reversing the District Court, the 7th Circuit held that “[a]llegations of future harm can establish Article III standing if that harm is ‘certainly impending,’ but ‘allegations of possible future injury are not sufficient.’” In short, the 7th Circuit found the plaintiffs met the requirement under <em>Clapper </em>“that injury either already [has] occurred or [was] ‘certainly impending.’”</li>
<li><strong>District Court for Southern District of Texas</strong>: In <a href="https://privacyriskreport.com/another-court-dismisses-data-breach-class-action-on-12b1-standing-grounds/" target="_blank"><em>Peters v. St. Joseph Serv., Corp</em></a>., the District Court dismissed plaintiff’s claims on a 12(b)(1) Motion after finding that allegations of an increased risk of future harm were not sufficient to confer standing.</li>
<li><strong>District Court for Northern District of Georgia</strong>: Home Depot filed a <a href="https://privacyriskreport.com/home-depot-breach-litigation-goes-down-well-worn-path/" target="_blank">motion to dismiss</a> asserting the Class Action Plaintiffs lacked standing to bring suit for its data breach.</li>
<li><strong>District Court for Minnesota</strong>: In the <em>Target</em> litigation, the District Court <a href="http://www.cyberrisknetwork.com/2014/12/04/banks-breach-suit-target-will-proceed/" target="_blank">held the Financial Institutions’ action survived</a> Target’s Motion to Dismiss.</li>
</ul>
<p>All of these cases trace their origins back to the Supreme Court’s 2013 opinion in <a href="http://www.privacyriskreport.com/wp-content/uploads/2015/02/11-1025.pdf" target="_blank"><em>Clapper v. Amnesty Int’l</em></a> finding that the mere increased risk of future harm does not confer Article III standing.</p>
<p>The briefs in the <em>Carefirst</em> case demonstrate that litigants are starting to directly address the difficult questions related to data breach cases as courts gain a better understanding of these cases. While plaintiffs have hit a number of hurdles in establishing damages, defendants’ argument that everyone is suffering a data breach may lose credibility with courts.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/lets-get-ready-to-rumble-gloves-come-off-in-data-breach-standing-case/' data-emailit-title='Let’s Get Ready to Rumble: Gloves Come Off in Data Breach Standing Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/lets-get-ready-to-rumble-gloves-come-off-in-data-breach-standing-case/">Let’s Get Ready to Rumble: Gloves Come Off in Data Breach Standing Case</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/lets-get-ready-to-rumble-gloves-come-off-in-data-breach-standing-case/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New Study and Recent Criminal Conviction Sheds Light on the &#8220;Malicious Insiders&#8221; Threat</title>
		<link>https://privacyriskreport.com/new-study-and-recent-criminal-conviction-sheds-light-on-the-malicious-insiders-threat/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=new-study-and-recent-criminal-conviction-sheds-light-on-the-malicious-insiders-threat</link>
		<comments>https://privacyriskreport.com/new-study-and-recent-criminal-conviction-sheds-light-on-the-malicious-insiders-threat/#comments</comments>
		<pubDate>Wed, 14 Oct 2015 20:18:31 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[computer abuse and fraud act]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[lawsuit]]></category>
		<category><![CDATA[legislation]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[malicious insider]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[threat]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=406</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/new-study-and-recent-criminal-conviction-sheds-light-on-the-malicious-insiders-threat/' data-emailit-title='New Study and Recent Criminal Conviction Sheds Light on the &#8220;Malicious Insiders&#8221; Threat'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>While large cyber attacks and data breaches may get the headlines, a recent study prepared by the Ponemon Institute and Hewlett-Packard and a recent criminal conviction of a Los Angeles Times reporter that disclosed corporate passwords on a hacker website serve... <a class="more-link" href="https://privacyriskreport.com/new-study-and-recent-criminal-conviction-sheds-light-on-the-malicious-insiders-threat/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/new-study-and-recent-criminal-conviction-sheds-light-on-the-malicious-insiders-threat/' data-emailit-title='New Study and Recent Criminal Conviction Sheds Light on the &#8220;Malicious Insiders&#8221; Threat'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/new-study-and-recent-criminal-conviction-sheds-light-on-the-malicious-insiders-threat/">New Study and Recent Criminal Conviction Sheds Light on the &#8220;Malicious Insiders&#8221; Threat</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/new-study-and-recent-criminal-conviction-sheds-light-on-the-malicious-insiders-threat/' data-emailit-title='New Study and Recent Criminal Conviction Sheds Light on the &#8220;Malicious Insiders&#8221; Threat'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>While large cyber attacks and data breaches may get the headlines, a recent study prepared by the Ponemon Institute and Hewlett-Packard and a recent criminal conviction of a <em>Los Angeles Times</em> reporter that disclosed corporate passwords on a hacker website serve as <a href="https://privacyriskreport.com/insureds-employees-are-often-overlooked-when-insurers-assess-cyber-coverage/" target="_blank">additional reminders</a> that “malicious insiders” still pose the largest security threat to an organization.</p>
<p><strong>Ponemon Institute/Hewlett-Packard Study: Malicious Insiders Can Cause the Most Serious Cyber Incidents</strong></p>
<p>The Ponemon Institute and Hewlett-Packard (HP) published the study, &#8220;<a href="http://www8.hp.com/us/en/software-solutions/ponemon-cyber-security-report/" target="_blank">2015 Cost of Cyber Crime Study: Global</a>,&#8221; which provides insight into the increasing frequency and costs of cyber attacks against governments and businesses around the world. Specifically, the study examines the “economic impact of cyber attacks and observes cost trends over time” and relies on data taken from 252 organizations in seven countries. Most importantly, the study finds that the most costly cyber crimes are caused by &#8220;malicious insiders,&#8221; people from within an organization.</p>
<p>For example, the study found cyber attacks committed by malicious insiders cost the responding organizations, on average, $144,542 to resolve. The costs related to malicious insiders exceeded costs related to denial of service attacks, phishing scams and stolen devices. Further, the study found the time required to resolve issues created by malicious insiders greatly exceeded the time to resolve issues related to other attacks. Specifically, time to resolve issues related to malicious insiders (54 days) exceeded web-based attacks (28 days) and denial of service attacks (19 days). While the threat created by malicious insiders has been understood for some time, this study puts these threats into context when measured against other cybersecurity threats.</p>
<p><strong>Matthew Keys’ Conviction Demonstrates Real World Dangers Associated with Malicious Insiders</strong></p>
<p>The findings in the Ponemon/HP Study related to the malicious insiders threat were further supported when earlier this month a former <em>Los Angeles Times</em> reporter <a href="http://motherboard.vice.com/read/former-reuters-journalist-matthew-keys-found-guilty-of-hacking-faces-25-years" target="_blank">was convicted</a> under the <a href="https://www.fas.org/sgp/crs/misc/97-1025.pdf" target="_blank">Computer Abuse and Fraud Act</a> (CFAA). Matthew Keys was convicted of posting confidential server passwords on a hacker website and urged hackers to “go [expletive] some [expletive] up” on websites maintained by his employer, the Tribune Company. Keys had access to the passwords during his employment. After Keys posted the passwords, a hacker gained access to the <em>Los Angeles Times</em> website and created a fake headline for a story.</p>
<p>While there may be <a href="http://fortune.com/2015/10/12/matthew-keys-hacking/" target="_blank">questions as to whether Keys was properly charged and convicted</a> under the CFAA, another important consideration is the fact that he does not fit the mold of a &#8220;traditional&#8221; hacker. During the criminal trial it became clear that Keys had nothing more than a basic working knowledge of computers and no experience as a “hacktivist.” Costs related to the investigation of the hacks, related vandalism, security issues repairs and lost employee productivity were estimated to be nearly $1 million.</p>
<p><strong>The Greatest Threat Comes from Inside an Organization</strong></p>
<p>The Ponemon/HP Study and Keys’ conviction demonstrate that while large-scale hacks from foreign countries make news, employees continually prove to be the greatest threat to cybersecurity. Monitoring the conduct of employees and former employees continues to be just as important as maintaining cutting-edge technology in order to safeguard data or other valuable information. Further, the difficult question related to the amount of damages Keys actually caused leads into an interesting issue related to cyber insurance.</p>
<p>For example, while Keys’ employer claimed it suffered $1 million in damages, this amount was called into question by Keys because many of the hours logged to fix the damage caused by leaked passwords were attributed to journalists and executives rather than technical staff. This dispute over what costs were justified and attributable to Keys’ conduct illustrates the importance that insurers and insureds have a complete understanding prior to a cyber incident of the costs and damages covered under cyber policies.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/new-study-and-recent-criminal-conviction-sheds-light-on-the-malicious-insiders-threat/' data-emailit-title='New Study and Recent Criminal Conviction Sheds Light on the &#8220;Malicious Insiders&#8221; Threat'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/new-study-and-recent-criminal-conviction-sheds-light-on-the-malicious-insiders-threat/">New Study and Recent Criminal Conviction Sheds Light on the &#8220;Malicious Insiders&#8221; Threat</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/new-study-and-recent-criminal-conviction-sheds-light-on-the-malicious-insiders-threat/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>President Obama Signs Executive Order Addressing Data Security</title>
		<link>https://privacyriskreport.com/president-obama-signs-executive-order-addressing-data-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=president-obama-signs-executive-order-addressing-data-security</link>
		<comments>https://privacyriskreport.com/president-obama-signs-executive-order-addressing-data-security/#comments</comments>
		<pubDate>Mon, 27 Oct 2014 18:42:40 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[FTC]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[legislation]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=157</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/president-obama-signs-executive-order-addressing-data-security/' data-emailit-title='President Obama Signs Executive Order Addressing Data Security'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>On October 17, President Barack Obama signed an Executive Order addressing the growing concerns over data security in the United States. One of the most notable aspects of the Order is its requirement that all federally-issued credit and debit cards include... <a class="more-link" href="https://privacyriskreport.com/president-obama-signs-executive-order-addressing-data-security/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/president-obama-signs-executive-order-addressing-data-security/' data-emailit-title='President Obama Signs Executive Order Addressing Data Security'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/president-obama-signs-executive-order-addressing-data-security/">President Obama Signs Executive Order Addressing Data Security</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/president-obama-signs-executive-order-addressing-data-security/' data-emailit-title='President Obama Signs Executive Order Addressing Data Security'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>On October 17, President Barack Obama signed an <a href="http://www.whitehouse.gov/the-press-office/2014/10/17/executive-order-improving-security-consumer-financial-transactions" target="_blank">Executive Order</a> addressing the growing concerns over data security in the United States. One of the most notable aspects of the Order is its requirement that all federally-issued credit and debit cards include chip-and-PIN technology. The chip-and-PIN technology enhances the security of the more traditional magnetic strip cards by replacing the magnetic strip with a computer chip that uses cryptography to protect data contained within the card. While the Order only applies to those cards issued by the federal government, several private sector companies, including Target, Wal-Mart, and Home Depot, have agreed to implement chip-and PIN technology starting in 2015.</p>
<p>The Order also addresses the need for improved resources for identity theft victims following a data breach. It orders federal agencies with publicly available resources for victims of identity theft to share such information with the FTC, so that the FTC can continue to develop and streamline these resources at its website for identity theft victims, <a href="http://www.identitytheft.gov/" target="_blank">IdentityTheft.gov</a>.</p>
<p>In conjunction with signing the Order, Obama called on Congress to pass data breach legislation, writing in a statement that “[t]he current patchwork of laws governing a company’s obligations in the event of a data breach is unsustainable, and helps no one.” While members of the Senate have proposed several cybersecurity and data breach bills, Congress has yet to enact any of these bills into law.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/president-obama-signs-executive-order-addressing-data-security/' data-emailit-title='President Obama Signs Executive Order Addressing Data Security'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/president-obama-signs-executive-order-addressing-data-security/">President Obama Signs Executive Order Addressing Data Security</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/president-obama-signs-executive-order-addressing-data-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Mark Your Calendars: California’s Amended Data Breach Law Will Take Effect in 2015</title>
		<link>https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015</link>
		<comments>https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/#comments</comments>
		<pubDate>Tue, 14 Oct 2014 16:04:45 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[California]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[legislation]]></category>
		<category><![CDATA[personal information]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=189</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/' data-emailit-title='Mark Your Calendars: California’s Amended Data Breach Law Will Take Effect in 2015'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>On September 30, 2014, California passed Assembly Bill 1710 which will create two major changes related to breaches involving the private data of California residents when it comes into effect on January 1, 2015. First, the amended data breach law will expand... <a class="more-link" href="https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/' data-emailit-title='Mark Your Calendars: California’s Amended Data Breach Law Will Take Effect in 2015'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/">Mark Your Calendars: California’s Amended Data Breach Law Will Take Effect in 2015</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/' data-emailit-title='Mark Your Calendars: California’s Amended Data Breach Law Will Take Effect in 2015'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>On September 30, 2014, California passed <a href="http://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201320140AB1710" target="_blank">Assembly Bill 1710</a> which will create two major changes related to breaches involving the private data of California residents when it comes into effect on January 1, 2015.</p>
<p>First, the amended data breach law will expand the scope of the entities subject to the law. California’s existing data breach law requires entities that <em>own</em> or<em> </em><em>license</em> personal information to implement and maintain security procedures to protect that information. Assembly Bill 1710 expands this requirement to include any entity that <em>maintains</em><em> </em>personal information concerning a California resident. The amendment of the current law may include entities that store information on cloud servers. While the current version of the bill imposes notification requirements on entities that own or license personal information, the amended bill will not require an entity that maintains personal information to notify those individuals involved in a breach.</p>
<p>Second, the amended bill changes the obligations related to notification of a breach. Previously, an entity that owns or licenses private information was required to issue a notification of the breach. Under the amended bill, an entity that owns or licenses private information must “provide appropriate identity theft prevention and mitigation services, if any, to the affected person at no cost for not less than 12 months if the breach exposed or may have exposed specified personal information.”</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/' data-emailit-title='Mark Your Calendars: California’s Amended Data Breach Law Will Take Effect in 2015'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/">Mark Your Calendars: California’s Amended Data Breach Law Will Take Effect in 2015</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/mark-your-calendars-californias-amended-data-breach-law-will-take-effect-in-2015/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Microsoft Takes a Stand in Support of Comprehensive Federal Privacy Legislation</title>
		<link>https://privacyriskreport.com/microsoft-takes-a-stand-in-support-of-comprehensive-federal-privacy-legislation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=microsoft-takes-a-stand-in-support-of-comprehensive-federal-privacy-legislation</link>
		<comments>https://privacyriskreport.com/microsoft-takes-a-stand-in-support-of-comprehensive-federal-privacy-legislation/#comments</comments>
		<pubDate>Tue, 26 Aug 2014 17:06:20 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[legislation]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=211</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/microsoft-takes-a-stand-in-support-of-comprehensive-federal-privacy-legislation/' data-emailit-title='Microsoft Takes a Stand in Support of Comprehensive Federal Privacy Legislation'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>In a letter to the National Telecommunications and Information Administration, Microsoft vocalized its support for swift action on comprehensive privacy legislation in the United States. Microsoft argues that such legislation is necessary to gain the trust of consumers, as well as the... <a class="more-link" href="https://privacyriskreport.com/microsoft-takes-a-stand-in-support-of-comprehensive-federal-privacy-legislation/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/microsoft-takes-a-stand-in-support-of-comprehensive-federal-privacy-legislation/' data-emailit-title='Microsoft Takes a Stand in Support of Comprehensive Federal Privacy Legislation'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/microsoft-takes-a-stand-in-support-of-comprehensive-federal-privacy-legislation/">Microsoft Takes a Stand in Support of Comprehensive Federal Privacy Legislation</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/microsoft-takes-a-stand-in-support-of-comprehensive-federal-privacy-legislation/' data-emailit-title='Microsoft Takes a Stand in Support of Comprehensive Federal Privacy Legislation'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>In a <a href="http://www.ntia.doc.gov/files/ntia/microsoft.pdf" target="_blank">letter</a> to the National Telecommunications and Information Administration, Microsoft vocalized its support for swift action on comprehensive privacy legislation in the United States. Microsoft argues that such legislation is necessary to gain the trust of consumers, as well as the trust of other countries that have already adopted comprehensive privacy laws. Microsoft stands apart from the majority other big-name tech companies like Amazon, Google and Twitter, all of which have voiced concern over any privacy legislation at this time.</p>
<p>As discussed in a previous post, the U.S. Senate is close to debate on at least one cybersecurity bill.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/microsoft-takes-a-stand-in-support-of-comprehensive-federal-privacy-legislation/' data-emailit-title='Microsoft Takes a Stand in Support of Comprehensive Federal Privacy Legislation'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/microsoft-takes-a-stand-in-support-of-comprehensive-federal-privacy-legislation/">Microsoft Takes a Stand in Support of Comprehensive Federal Privacy Legislation</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/microsoft-takes-a-stand-in-support-of-comprehensive-federal-privacy-legislation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Federal Cybersecurity Bill Moves Closer to Becoming Law</title>
		<link>https://privacyriskreport.com/federal-cybersecurity-bill-moves-closer-to-becoming-law/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=federal-cybersecurity-bill-moves-closer-to-becoming-law</link>
		<comments>https://privacyriskreport.com/federal-cybersecurity-bill-moves-closer-to-becoming-law/#comments</comments>
		<pubDate>Wed, 09 Jul 2014 18:03:26 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[legislation]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=227</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/federal-cybersecurity-bill-moves-closer-to-becoming-law/' data-emailit-title='Federal Cybersecurity Bill Moves Closer to Becoming Law'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The U.S. Senate is getting closer to debating a cybersecurity bill, the Cyber Information Sharing Act, which will create a voluntary process aimed at protecting private information. A “discussion draft” of the proposed bill includes provisions that would send threatening data to the Department of... <a class="more-link" href="https://privacyriskreport.com/federal-cybersecurity-bill-moves-closer-to-becoming-law/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/federal-cybersecurity-bill-moves-closer-to-becoming-law/' data-emailit-title='Federal Cybersecurity Bill Moves Closer to Becoming Law'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/federal-cybersecurity-bill-moves-closer-to-becoming-law/">Federal Cybersecurity Bill Moves Closer to Becoming Law</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/federal-cybersecurity-bill-moves-closer-to-becoming-law/' data-emailit-title='Federal Cybersecurity Bill Moves Closer to Becoming Law'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The U.S. Senate is getting closer to debating a cybersecurity bill, the <a href="http://m.washingtonpost.com/blogs/the-switch/wp/2014/07/08/senate-intelligence-panel-advances-cybersecurity-bill/" target="_blank">Cyber Information Sharing Act</a>, which will create a voluntary process aimed at protecting private information. A “discussion draft” of the proposed bill includes provisions that would send threatening data to the Department of Homeland Security which would then share it with other federal agencies.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/federal-cybersecurity-bill-moves-closer-to-becoming-law/' data-emailit-title='Federal Cybersecurity Bill Moves Closer to Becoming Law'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/federal-cybersecurity-bill-moves-closer-to-becoming-law/">Federal Cybersecurity Bill Moves Closer to Becoming Law</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/federal-cybersecurity-bill-moves-closer-to-becoming-law/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
