Tags » privacy

Posts
On January 13, 2017, the Centers for Medicare and Medicaid Services (“CMS”) sent a Memorandum (“Memo”) to State survey agency directors encouraging long-term care providers to “consider cybersecurity when developing or reviewing their emerg (More)
Since the Supreme Court’s decision in Spokeo v. Robins, courts have begun to ratchet back prior decisions on the minimum standard to plead an injury sufficient to establish Article III standing. The recent Eighth Circuit opinion in Braitberg v. Cha (More)
By Eric R. Breslin Cellular telephone billing records are another mundane aspect of modern life. They arrive monthly in the mail or online and hardly anyone I know (at least) spends any great amount of time reviewing them for accuracy or content. (More)
Ransomware attacks are on the rise and expected to reach epidemic proportions. The most publicized attack took place this year at the Hollywood Presbyterian Medical Center when it was forced to declare an "internal emergency" after a ransomware attac (More)
On August 5, 2016, the Centers for Medicare and Medicaid Services (CMS) published a Survey and Certification Memorandum (Notice) urging State health departments to enforce violations by nursing homes in posting patient images on social media. This de (More)
Last week the Future of Privacy Forum (FRF) issued "Best Practices for Consumer Wearables & Wellness Apps & Devices.  The Best Practices are built on the five core principles of privacy protection, which form the foundation for privacy la (More)
Following the July 12, 2016, adoption by the European Commission of the EU-U.S. Privacy Shield (the “Privacy Shield”), companies engaging in trans-Atlantic data sharing can now register for the Privacy Shield. It replaces the prior Safe Harbor Pr (More)
At this point, it may come as no surprise that the US government has some ability to monitor internet traffic. However, the tremendous extent of government surveillance may be somewhat alarming to those who are interested in privacy on the internet. (More)
It seems like we constantly are hearing about Internet hacks and the stealing of personally identifiable information online. At this point, we use the Internet for so many positive aspects of our lives. Given that we inevitably are online, what are s (More)