• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Alston & Bird Privacy, Cyber & Data Strategy Blog

  • Home
  • Services
  • Events
  • Contacts

Uncategorized

Alston & Bird’s Kim Peretti Appears on Fox News

April 11, 2013 By Privacy, Cyber & Data Strategy Team

Kim Peretti, co-chair of the firm’s security-incident and management-response team and former senior litigator for the Justice Department’s Computer Crime and Intellectual Property Section, appeared on Fox News to discuss prosecuting cyber criminals. To view the video, please click Peretti Appears on Fox News. Written by Security Incident Management & Response Team | Alston & Bird LLP

Filed Under: Uncategorized

Data Privacy in the Transatlantic Trade Agreement? US-EU Ponder the Way Forward

April 10, 2013 By Privacy, Cyber & Data Strategy Team

The United States and the European Union announced in February their intent to launch negotiations this year on a far-reaching trade and investment partnership agreement. Negotiations on the treaty, known as “TTIP”, should commence in June following a Congressional and public consultation period in the United States, and a parallel process in the EU whereby […]

Filed Under: Uncategorized

Alston & Bird’s Kim Peretti quoted in Wall Street Journal Article

April 1, 2013 By Privacy, Cyber & Data Strategy Team

Kim Peretti, co-chair of the firm’s security-incident and management-response team and former senior litigator for the Justice Department’s Computer Crime and Intellectual Property Section, was quoted in the Wall Street Journal article, “Law Firms Tout Advantage of Secrecy in Cyberbreach Investigations.” Ms. Peretti said the practice is among the first at a major law firm that […]

Filed Under: Uncategorized

Cyber Alert: Breach Investigations, Part 1: Right-Sizing the Data Breach Investigation – Law360 Article by Kim Peretti

April 1, 2013 By Privacy, Cyber & Data Strategy Team

In the age of targeted intrusions, sophisticated criminal and nation-state actors are often compromising hundreds of systems within a single company’s environment. However, companies are often only seeing a small portion of the entire incident, as their response to such invasions can be, and often is, too narrowly shaped by state security breach notification requirements, […]

Filed Under: Uncategorized

FTC Updates Advertising Disclosure Guidelines to Address Online and Mobile Environment

March 21, 2013 By Privacy, Cyber & Data Strategy Team

The FTC recently released an update to its 2000 report, “Dot Com Disclosures” offering further guidance on effective disclosures for advertising in digital media. The FTC instructed advertisers to adopt the perspective of a reasonable consumer, and should assume consumers do not read the entire website or screen, just as they don’t read every word […]

Filed Under: Uncategorized

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 23
  • Page 24
  • Page 25
  • Page 26
  • Page 27
  • Interim pages omitted …
  • Page 46
  • Go to Next Page »

Primary Sidebar

This blog is a service of Alston & Bird’s Privacy, Cyber & Data Strategy team and focuses on key data privacy and data security issues.


Receive email notifications when new posts are added.

Receive email notifications when new posts are added.


RANSOMWARE FUSION CENTER
Click here to request access

THE DIGITAL DOWNLOAD
Click here to see the editions

PRIVACY & CYBER EVENTS
Click here to see upcoming and past events

PRIVACY & CYBER MAILINGS
Click here to sign up

@ALSTONPRIVACY
Click here to follow us on Twitter

Secondary Sidebar

Categories

Recent Posts

  • European Vulnerability Database Published by the European Union Agency for Cybersecurity
  • DOJ Settles Another False Claims Act Case for Alleged Failures in Implementing NIST SP 800-171 and Basic Cybersecurity Controls
  • UK Publishes Software Security Code
  • Texas AG Secures $1.375 Billion from Google: Key Takeaways for Companies Collecting Consumer Data
  • CISA Issues Enhanced Guidance to Mitigate Cyber Threats to Operational Technology Systems
Copyright © 2025 · Alston & Bird · All Rights Reserved. Privacy.
This website uses cookies to improve functionality and performance. By continuing to browse this site, you are consenting to the use of cookies on this website. OkCookie policy