Time 1 Minute Read

On July 9, 2015, Hunton & Williams LLP hosted a webinar on the Proposed EU General Data Protection Regulation: Preparing for Change (Part 1). Hunton & Williams partner and head of the Global Privacy and Cybersecurity practice Lisa Sotto moderated the session, which was led by speakers Bridget Treacy, managing partner of the firm’s London office; Wim Nauwelaerts, managing partner of the firm’s Brussels office; and Jörg Hladjk, counsel in the firm’s Brussels office. Together the speakers presented an overview of the proposed EU General Data Protection Regulation, discussed ...

Time 3 Minute Read

On June 16, 2015, the Article 29 Working Party (the “Working Party”) adopted an Opinion on Privacy and Data Protection Issues relating to the Utilization of Drones (“Opinion”). In the Opinion, the Working Party provides guidance on the application of data protection rules in the context of Remotely Piloted Aircraft Systems, commonly known as “drones.”

Time 2 Minute Read

On July 9, 2015, the National Telecommunications and Information Administration (“NTIA”) announced the launch of its first cybersecurity multistakeholder process, in which representatives from across the security and technology industries will meet in September to discuss vulnerability research disclosure.

Time 1 Minute Read

On June 29, 2015, Lisa J. Sotto, partner and head of the Global Privacy and Cybersecurity practice at Hunton & Williams LLP, was profiled in a Crain’s New York Business article entitled Lawyer Goes Into the Breach. The feature highlights the Hunton & Williams privacy team and the tireless work they do for their clients. Here is an excerpt from the article:

“Ms. Sotto came to her corner of the financial world a decade ago, after years working as an environmental lawyer. Spearheading Superfund cases was rewarding, but she was intrigued by the then-nascent field of mopping up messes for ...

Time 2 Minute Read

How do we focus on individuals and ensure meaningful control and the empowerment of individuals in the modern information age? What data privacy tools would drive empowerment in the digital world of today and tomorrow, perhaps more effectively and more nimbly than traditional individual consent? At a time when many countries are legislating or revising their data privacy laws and organizations are searching for best practices to embed in their business models, these questions are more relevant today than ever. In an article published on July 2, 2015, in the International Association of Privacy Professionals’ Privacy Perspective, entitled Empowering Individuals Beyond Consent, Bojana Bellamy and Markus Heyder of the Centre for Information Policy Leadership at Hunton & Williams argue that consent is no longer the best or only way to provide control and protect individuals. There are alternative and additional tools in our toolkit that can deliver effective data privacy and greater individual empowerment.

Time 2 Minute Read

Richard Thomas, former UK Information Commissioner and Global Strategy Advisor to the Centre for Information Policy Leadership, was invited to a unique event in Scotland last week.

Peter Hustinx, who retired as the European Data Protection Supervisor at the end of 2014, was awarded the Honorary Degree of Doctor of Science in Social Science by the University of Edinburgh.

Time 2 Minute Read

On June 30, 2015, the French Data Protection Authority (the “CNIL”) summarized the results of the cookie inspections it conducted at the end of 2014.

Time 1 Minute Read

On June 30, 2015, the Federal Trade Commission announced its new “Start With Security” business education initiative, which will provide businesses with information on data security and how to protect consumer information.

Time 2 Minute Read

Earlier this month, the Payment Card Industry Security Standards Council (“PCI SSC”) published a set of enhanced validation procedures designed to provide greater assurance that certain entities are maintaining compliance with the PCI Data Security Standard (“PCI DSS”) effectively and on a continuing basis. The payment card brands and acquirers will determine which organizations are required to undergo a compliance assessment with respect to these supplemental validation requirements, which are entitled the PCI DSS Designated Entities Supplemental Validation (“DESV”).

Time 1 Minute Read

Hunton & Williams LLP partners Lisa J. Sotto, Scott H. Kimpel and Matthew P. Bosher recently published an article in Westlaw Journal’s Securities Litigation & Regulation entitled SEC Cybersecurity Investigations: A How-to Guide. The article details the U.S. Securities and Exchange Commission’s (“SEC’s”) role in cybersecurity regulation and enforcement, and offers best practice tips for navigating the investigative process. In the article, the authors note that the threat of an SEC enforcement investigation must be considered an integral part of cybersecurity ...

Search

Subscribe Arrow

Recent Posts

Categories

Tags

Archives

Jump to Page