On Friday, May 9 the Department of Justice (DOJ) released a white paper stating that under its interpretation of the Stored Communications Act (SCA), 18 U.S.C. § 2701 et seq., communications companies are permitted to disclose “non-content information to the government” as long as that information is in its “aggregate form.” The lynchpin of the DOJ’s […]
Cybersecurity
FFIEC to Host Cybersecurity Webinar
On May 7, the Federal Financial Institutions Examination Council (FFIEC) will host a free webinar on cybersecurity for financial institutions, entitled Executive Leadership of Cybersecurity: What Today’s CEO Needs to Know About the Threats They Don’t See. The webinar will provide guidance to senior managers on responding effectively to “current cyber threats.” Topics include “building a […]
SEC to Examine 50 Firms in Effort to Assess Cybersecurity Preparedness of the Securities Industry
On April 15, 2014 the U.S. Securities and Exchange Commission’s (“SEC”) Office of Compliance Inspections and Examination (“OCIE”) announced that it would assess the cybersecurity preparedness of the industry as a whole by examining the practices of 50 registered broker-dealers and investment advisers. OCIE will send tailored requests for information to each selected firm; the […]
FTC Invites Public Comments on Mobile Security
On April 17, 2014, the Federal Trade Commission (“FTC”) issued a press release, announcing that the FTC is seeking public comments to explore mobile security issues. The press release refers to the mobile security forum held last year to examine the state of mobile security (the “Forum”). In the press release, the FTC invites comments from […]
Jim Harvey to Speak at National Association of Corporate Directors Program on Mitigating Cybersecurity Risks
Jim Harvey, co-chair of the firm’s Privacy & Data Security practice and the Security Incident Management and Response Team, will be a featured speaker during an April 16 program sponsored by the National Association of Corporate Directors (NACD) titled, “Mitigating Cyber Security Threats: How the Attackers, Their Objectives, Their Methods Keep Changing.” Cyber security threats and […]