On March 25, Alston & Bird partner David Keating to moderate panel discussion organized by the American Constitution Society and Georgia State Bar on Big Data. Featured speakers are Georgia Tech’s Peter Swire, Acxiom’s Jerry Jones, FTC’s Cindy Liebes, and attorney Gerald Weber. David Keating, Partner and co-chair of the firm’s Privacy & Security team, […]
Privacy
Jim Harvey Speaking at the 2014 IAPP Global Privacy Summit
Jim Harvey, co-chair of the firm’s Privacy & Data Security practice and the Security Incident Management and Response Team, will participate as a presenter at the 2014 IAPP Global Privacy Summit, March 5-7. The IAPP Summit, one of the largest in the world, hosts privacy and security professionals to focus on a range of privacy-related topics. […]
OCR Issues New Guidance on the HIPAA Privacy Rule and Sharing of Mental Health Information
Late last week, the HHS Office for Civil Rights (OCR) published guidance designed to help health care providers understand when, consistent with the HIPAA Privacy Rule, they may share information related to a patient’s mental health with others. As we have previously written, HHS seeks to balance a patient’s privacy rights in mental health records […]
Complimentary Seminar – Payment Card Breaches: How to Prepare, How to Survive – March 5, 2014
Please join Alston & Bird, Dell SecureWorks and AIG for a discussion on how to prepare for and respond to payment card breaches. Recent payment card breaches in the retail industry have highlighted the need to fully prepare for similar types of attacks, both in terms of increasing security controls where appropriate and enhancing incident […]
NIST releases final Cybersecurity Framework
The National Institute of Standards and Technology (“NIST”) has released the final version of the much-anticipated Framework for Improving Critical Infrastructure Cybersecurity (the “Framework”). The Framework was developed by NIST at the direction of President Obama’s February 12, 2013, Executive Order 13636, “Improving Critical Infrastructure Cybersecurity” (the “Executive Order”). The Framework largely retains the structure […]