On March 18, the Federal Communications Commission (“FCC”) approved the Final Report on cybersecurity risk management and best practices issued by Working Group 4 (“WG4”) of its Communications, Security, Reliability, and Interoperability Council (“CSRIC”). The CSRIC, currently in its fourth assembly, is an advisory committee tasked with providing recommendations to the FCC to achieve “among […]
Board Governance & Cyber Risk Management
FTC Finalizes Order With TRUSTe On Privacy Seal Program
The Federal Trade Commission (FTC) has issued its final decision and order arising from its previously-disclosed settlement with TRUSTe stemming from the FTC’s complaint alleging that TRUSTe failed to conduct promised annual recertification of companies participating in its privacy seal program more than 1,000 times between 2006 and 2013. The complaint also alleged that TRUSTe […]
White House Releases Consumer Privacy Bill of Rights
On February 27, 2015, the Obama Administration released a discussion draft of the Consumer Privacy Bill of Rights Act of 2015 (the “Privacy Act”), holding true to President Barack Obama’s commitment in 2012 to introduce legislation to put the Privacy Act’s principles into law. The Privacy Act is intended to “establish baseline protections for individual […]
Peter Swire Honored with IAPP Privacy Leadership Award
Peter Swire, Georgia Institute of Technology Scheller College of Business professor and senior counsel in Alston & Bird’s Privacy & Data Security Group, was honored with the 2015 Privacy Leadership Award from The International Association of Privacy Professionals (IAPP). Swire is recognized for his commitment to the privacy field in tackling emerging privacy and security […]
Webinar: Advising the C-Suite and Boards of Directors on Cybersecurity
On February 11, 2015, Alston & Bird hosted a webinar entitled “Advising the C-Suite and Boards of Directors on Cybersecurity.” Panelists included Alston & Bird attorneys Jessica Corley, Scott Ortwein and Kim Peretti, with Jim Harvey as the moderator. The cybersecurity legal landscape is rapidly unfolding due to the mass number of companies whose systems, […]