One year after the Data Retention and Investigatory Powers Act 2014 (“DRIPA”) received royal assent on 17 July 2014, the English High Court issued a landmark judgment in David & Ors v Secretary of State for the Home Department [2015] EWHC 2092 (Admin) declaring DRIPA to be unlawful.
https://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.png00Jeremy Petersonhttps://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.pngJeremy Peterson2015-08-05 11:49:232015-08-05 11:49:23Surveillance Versus Privacy Rights: UK Court Rules Data Retention Legislation Unlawful
In an effort to address growing concerns about security vulnerabilities in both the public and private sectors, the National Institute of Standards and Technology (NIST) has released a flurry of new and updated information security recommendations. The latest recommendations address protections for sensitive data held by federal contractors, encryption standards, and security for federal Smart ID cards.
https://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.png00Jeremy Petersonhttps://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.pngJeremy Peterson2015-07-31 19:16:172015-07-31 19:16:17NIST Releases New and Updated Information Security Guidance
On July 1, 2015, China’s top legislature adopted a new National Security Law (中华人民共和国国家安全法), highlighting cyber security and paving the way for a coordinated crisis management system. The law aims to provide a general legislative framework to cover a wide range of areas, ranging from finance, politics, the military and cyber security to culture, ideology and religion.
https://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.png00Jeremy Petersonhttps://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.pngJeremy Peterson2015-07-29 11:36:362015-07-29 11:36:36New Chinese National Security Law Brings Further Focus to Global Cybersecurity
An already active TCPA class action bar is sure to become even more active after a significant Declaratory Ruling and Order from the FCC that, among other points, broadened what technologies may be considered autodialers, gave further strength to class actions based on reassigned cell numbers, and muddied the waters for constructing compliance mechanisms to support consumer revocation of consent.
On July 10, 2015, the Federal Communications Commission issued a declaratory ruling to resolve various concerns raised by 21 petitions regarding the Commission’s implementation of the Telephone Consumer Protection Act, which carries a $500 penalty for each call or text in violation.
We are rapidly approaching the effective date for the so-called Russian “data localization law,” a development that prompted considerable backlash from the global business community and could have significant consequences for entities operating in the Russian market. In July 2014, Russia adopted Federal Law No. 242-FZ, which in effect requires that information a company holds pertaining to Russians must be stored on servers physically located within Russia. These obligations apply to individuals in their capacity as employees as well as consumers; thereby impacting even companies that do not maintain brick-and-mortar operations in Russia.
https://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.png00Jeremy Petersonhttps://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.pngJeremy Peterson2015-07-21 15:09:592015-07-21 15:09:59The Impending Russian Data Localization Law
At the press conference for the launch of its Annual Report on 2 July, the UK Information Commissioner Christopher Graham highlighted the changing legislative landscape for the ICO’s regulatory powers against privacy breaches and put forward its proposals for the upcoming year.
The White House is soliciting public comments on its Proposed Privacy and Trust Principles (the Proposed Principles) for the Precision Medicine Initiative (PMI). PMI is a federal initiative to support research, technology and policies that enable the development of individualized treatments, and is backed by a $215 million investment under President Obama’s 2016 Budget.
The Federal Trade Commission released “Start with Security: A Guide for Business” on June 30, 2015. The guide contains ten best practices for addressing issues of data security based on lessons learned from the FTC’s 53 data-security actions to date. Specifically, it identifies “vulnerabilities” that could affect businesses of all sizes and provides some “practical guidance on how to reduce the risks [those vulnerabilities] pose.”
https://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.png00Jeremy Petersonhttps://datamatters.sidley.com/wp-content/uploads/sites/2/2022/09/sidleyLogo-e1643922598198.pngJeremy Peterson2015-07-13 16:28:432015-07-13 16:28:43Federal Trade Commission Releases Guide for Businesses on Data Security
Surveillance Versus Privacy Rights: UK Court Rules Data Retention Legislation Unlawful
One year after the Data Retention and Investigatory Powers Act 2014 (“DRIPA”) received royal assent on 17 July 2014, the English High Court issued a landmark judgment in David & Ors v Secretary of State for the Home Department [2015] EWHC 2092 (Admin) declaring DRIPA to be unlawful.
(more…)
William RM Long
London
wlong@sidley.com
Geraldine Scali
gscali@sidley.com
NIST Releases New and Updated Information Security Guidance
In an effort to address growing concerns about security vulnerabilities in both the public and private sectors, the National Institute of Standards and Technology (NIST) has released a flurry of new and updated information security recommendations. The latest recommendations address protections for sensitive data held by federal contractors, encryption standards, and security for federal Smart ID cards.
(more…)
Colleen Theresa Brown
Washington, D.C.
cbrown@sidley.com
Edward R. McNicholas
emcnicholas@sidley.com
New Chinese National Security Law Brings Further Focus to Global Cybersecurity
On July 1, 2015, China’s top legislature adopted a new National Security Law (中华人民共和国国家安全法), highlighting cyber security and paving the way for a coordinated crisis management system. The law aims to provide a general legislative framework to cover a wide range of areas, ranging from finance, politics, the military and cyber security to culture, ideology and religion.
(more…)
Yuet Ming Tham
Singapore, Hong Kong
ytham@sidley.com
Gerald Lam
glam@sidley.com
Tim Liang
tliang@sidley.com
FCC Issues Far-Reaching TCPA Declaratory Ruling
An already active TCPA class action bar is sure to become even more active after a significant Declaratory Ruling and Order from the FCC that, among other points, broadened what technologies may be considered autodialers, gave further strength to class actions based on reassigned cell numbers, and muddied the waters for constructing compliance mechanisms to support consumer revocation of consent.
On July 10, 2015, the Federal Communications Commission issued a declaratory ruling to resolve various concerns raised by 21 petitions regarding the Commission’s implementation of the Telephone Consumer Protection Act, which carries a $500 penalty for each call or text in violation.
(more…)
Colleen Theresa Brown
Washington, D.C.
cbrown@sidley.com
Edward R. McNicholas
emcnicholas@sidley.com
Christopher Eiswerth
ceiswerth@sidley.com
Mark B. Blocker
Chicago
mblocker@sidley.com
The Impending Russian Data Localization Law
We are rapidly approaching the effective date for the so-called Russian “data localization law,” a development that prompted considerable backlash from the global business community and could have significant consequences for entities operating in the Russian market. In July 2014, Russia adopted Federal Law No. 242-FZ, which in effect requires that information a company holds pertaining to Russians must be stored on servers physically located within Russia. These obligations apply to individuals in their capacity as employees as well as consumers; thereby impacting even companies that do not maintain brick-and-mortar operations in Russia.
(more…)
Vivek K. Mohan
vmohan@sidley.com
ICO Bares Enforcement Teeth for Privacy Breaches
At the press conference for the launch of its Annual Report on 2 July, the UK Information Commissioner Christopher Graham highlighted the changing legislative landscape for the ICO’s regulatory powers against privacy breaches and put forward its proposals for the upcoming year.
(more…)
Geraldine Scali
gscali@sidley.com
Precision Medicine Initiative: Proposed Privacy & Trust Principles
The White House is soliciting public comments on its Proposed Privacy and Trust Principles (the Proposed Principles) for the Precision Medicine Initiative (PMI). PMI is a federal initiative to support research, technology and policies that enable the development of individualized treatments, and is backed by a $215 million investment under President Obama’s 2016 Budget.
(more…)
Meenakshi Datta
Chicago
mdatta@sidley.com
Cameron F. Kerry
ckerry@sidley.com
Anna Spencer
aspencer@sidley.com
Rina Mady
Chicago
rmady@sidley.com
Federal Trade Commission Releases Guide for Businesses on Data Security
The Federal Trade Commission released “Start with Security: A Guide for Business” on June 30, 2015. The guide contains ten best practices for addressing issues of data security based on lessons learned from the FTC’s 53 data-security actions to date. Specifically, it identifies “vulnerabilities” that could affect businesses of all sizes and provides some “practical guidance on how to reduce the risks [those vulnerabilities] pose.”
(more…)
Christopher Eiswerth
ceiswerth@sidley.com
Upcoming Events
Privacy and Cybersecurity Roundtable
Resources
Meet the Team
Kwaku A. Akowuah
kakowuah@sidley.com
Sheila A.G. Armbrust
sarmbrust@sidley.com
Francesca Blythe
fblythe@sidley.com
Colleen Theresa Brown
ctbrown@sidley.com
John M. Casanova
jcasanova@sidley.com
Thomas D. Cunningham
tcunningham@sidley.com
Tomoki Ishiara
tishiara@sidley.com
Amy P. Lally
alally@sidley.com
David C. Lashway
dlashway@sidley.com
Linh Lieu
linh.lieu@sidley.com
William RM Long
wlong@sidley.com
Joan M. Loughnane
jloughnane@sidley.com
Geeta Malhotra
gmalhotra@sidley.com
Alan Charles Raul
araul@sidley.com
Sean Royall
sroyall@sidley.com
Jennifer B. Seale
jseale@sidley.com
Yuet Ming Tham
ytham@sidley.com
John K. Van De Weert
jvandeweert@sidley.com
Jonathan M. Wilan
jwilan@sidley.com
John W. Woods Jr.
jwoods@sidley.com