Privacy and Cybersecurity Blog

Add to RSS

The Privacy and Cybersecurity Blog offers updates, insight and advice on data, cybersecurity and privacy law.

2017
11 January 2018

Looking Back at Our 2017 Privacy and Cybersecur...

We ended 2017 by making predictions about what 2018 will bring to the privacy and cybersecurity world.  We’ll start 2018 by looking at how we fared in our 2017 predictions.  Spoiler alert, we nailed it. Expansion of Breach Notification Requirements We’ll give ourselves half credit for this one. While some states took action, Michigan did not […]

 
2018 in Cybersecurity
14 December 2017

Cybersecurity Trends to Watch for in 2018

As 2017 comes to a close, the Miller Johnson Privacy & Cybersecurity team takes a moment to reflect on the past year to help predict cybersecurity trends in 2018. In 2017, our clients experienced an unprecedented number of cyber-incidents and data breaches. Our small to medium-sized business clients were impacted most. These attacks coincided with […]

Cyber Insurance
30 November 2017

Privacy and Cybersecurity 101: Buying Cybersec...

With Uber joining Equifax, JP Morgan, Target and others as the latest victim of a high-profile data breach, all companies should be evaluating how they can protect themselves from data breaches and the fallout.  Over the past month, we have covered how to encrypt your laptop and covered how to send secure emails.  Even if […]

Email Encryption
16 November 2017

Privacy and Cybersecurity 101: How to Send Secu...

Regular email, without some form of added security such as encryption, is not secure.  By that we mean when you use Outlook or Gmail to send an email to another person, unless you have deliberately added a layer of security (e.g., encryption and/or password protection), that email is not secure. Email was not designed with […]

Encryption
09 November 2017

Privacy and Cybersecurity 101: How to Encrypt ...

Last week we told you about the $2.5 million laptop.  What if we told you that fine could have been avoided with one, simple step?  That’s right there would have been no data breach and no $2.5 million fine if the stolen laptop had been encrypted. In this post, we’ll discuss encryption basics, including how […]

Typing at a laptop
02 November 2017

$2.5 Million is an Expensive Laptop!

In April 2017, the U.S. Department of Health and Human Services (“HHS”) announced yet another HIPAA settlement agreement with a health care provider relating to a stolen mobile device containing Protected Health Information (“PHI”).  As part of this settlement agreement, CardioNet agreed to pay $2.5 million and implement a corrective action plan resulting from the […]

Laptop Phone Coffee
19 October 2017

Data Breach? First Call Your Lawyer.

If your company experiences a data breach, the first person you should contact is your lawyer.  While this advice is certainly self-serving to the authors, it is nevertheless the most prudent course of action. In the first few moments after a data breach, everything you say or do is discoverable in subsequent litigation or other […]

USA and EU flags
05 October 2017

FTC Cracks Down on False Claims of Compliance w...

The Federal Trade Commission (“FTC”) recently announced (https://www.ftc.gov/news-events/press-releases/2017/09/three-companies-agree-settle-ftc-charges-they-falsely-claimed) that it had settled charges against three different companies for misleading consumers about their participation in the EU-US Privacy Shield (“Privacy Shield”) framework.  These are the FTC’s first enforcement actions brought under the Privacy Shield. The FTC alleged the three companies falsely claimed they were certified to […]

Questions Answers
21 September 2017

The 3 Most Common Equifax Breach Questions (wit...

Ever since the news broke regarding the Equifax breach affecting over 140 million people in the U.S., we have received daily phone calls from clients, friends, and family asking what they can do to protect themselves.  Should I sign up for the credit monitoring?  Am I am going to waive my right to join a […]