Senate Al Franken asked Uber for clarification about an apparent “troubling disregard for customers’ privacy, including the need to protect their sensitive geolocation data.”
Earlier this week, U.S. District Court Judge Esther Salas directed the Federal Trade Commission (“FTC”) and Wyndham Hotels and Resorts to seek mediation to resolve their landmark dispute over whether the FTC has the authority to regulate companies’ data-security practices.
Researchers at Carnegie Mellon University have designed a website that doles out grades to Android apps based on their privacy practices.
Our guest this week is Ambassador Daniel Sepulveda, the man charged with managing the US relationship with the International Telecommunications Union.
The UK Information Commissioner’s Office (ICO) has launched an informal survey of current practices relating to the use of data-enabled medical devices and apps.
Big data is now big business. In recent years, due to the exponential growth of databases (spurred at least in part by social media and cloud storage) and of the capability of technology to undertake data analytics on a massive scale, organisations have started to appreciate the potential hidden value that could be derived from their data.
After being hit with a data breach, the last thing a company might want is the scrutiny of the union representing its employees affected by the incident.
Pharmacists and Health Professionals Beware: Indiana Court of Appeals Upholds $1.44 Million Jury Verdict Resulting from HIPAA Violation
As previously reported, an Indiana jury awarded $1.44 million to a Walgreens customer based on allegations that the customer’s pharmacist accessed, reviewed and shared the customer’s prescription history with others who then used the information to intimidate and harass the customer.
Union Files NLRB Complaint Regarding the USPS’ Handing of Security Breach Involving Employee Personal Information
A company faced with a security breach has a lengthy “to do” list, things to accomplish with respect to its incident response plan. It must, among other things, determine the root cause of the vulnerability or breach, investigate and eliminate the vulnerability or breach, determine the full nature and extent of the breach, determine who to notify and finalize the notifications.
“Trust but verify” is an old Russian proverb that former president Ronald Reagan used in arms negotiations with his Soviet counterpart Mikhail Gorbachev.