Blogs

Showing Blog Posts: 11–20 of 69 tagged Law

  • Social Media Privacy Legislation Update

    by Stephen Wu on May 30, 2012

    Back in March, I wrote about new legislation at the state level that would prohibit employers from asking job applicants for their social media user names and passwords. Legislatures in eleven states have introduced social media privacy bills, and in one state, Maryland, one of the bills has become law. The idea behind these laws is that when employers demand that a job applicant disclose his or…

  • New Legislation Would Bar Employers From Asking for Social Media Passwords

    by Stephen Wu on March 24, 2012

    We have all seen stories about how social media accounts are treasure troves of information. In past years, legal experts have discussed the issue of whether employers should view social media information of prospective employees. Some employers are tempted by the amount of information available on these services to vet employees and obtain a much more candid view of what makes job applicants…

  • Senate Bill Promises to Bolster Critical Infrastructure Protection

    by Stephen Wu on February 20, 2012

    Yes, yes, we’ve heard a lot about critical infrastructure protection, its importance to the nation’s security, and preventing a “Digital Pearl Harbor.” We need more information sharing between the public sector and the private sector, the analysts say. We also need more information sharing among private companies, hopefully without creating various kinds of liability—all for the sake of…

  • Federal Breach Notification Legislative Update

    by Stephen Wu on February 11, 2012

    Over the years, Congress and the Senate have considered legislation of various kinds and scope that would have contained data security provisions, including breach notification requirements for businesses holding certain kinds of sensitive personal information. This year is no exception. There are numerous security-related bills. S.1408 is an example of a bill focused on breach notification. …

  • A “Zero Day” Security Breach Lawsuit

    by Stephen Wu on January 13, 2012

    Last May, I wrote a post about a class action lawsuit against Sony in the wake of its April 2011 security breach. I noted the timing of the suit. Lawyers filed the suit only nine or ten days after the breach. Recently, I read about a security breach lawsuit involving a break-in at Sutter Health. Someone broke into administrative offices and stole a computer containing sensitive medical records…

  • The Legal Profession – Still Catching Up with the New Reality

    by Stephen Wu on December 8, 2011

    eDiscovery rules, the law of spoliation, and evidence law now address electronically stored information (ESI). Courts and some commentators are now talking about the effect of the Internet, social networking, and cloud computing on eDiscovery and evidence law. Thus, the law is starting to catch up with the new reality of computers and the Internet. But is the legal profession catching up with this…

  • Computer Forensics Goes Beyond eDiscovery

    by Stephen Wu on November 5, 2011

    One of the things I enjoyed, as the 2010-2011 Chair of the American Bar Association Section of Science & Technology Law, was to talk to lawyers all over the country about how the practice of law is changing. Technology and scientific advances are changing the way lawyers practice law. eDiscovery is a prime example. When lawyers practicing in the field of civil litigation faced the phenomenon of…

  • California Beefs Up Its Breach Notification Law

    by Stephen Wu on September 28, 2011

    Although we have an old cliché that says, “third time is the charm,” in the case of changing California’s breach notification law, State Senator Joe Simitian required four attempts to see the passage of his bill amending the law. On August 31, 2011, Governor Jerry Brown signed Senate Bill No. 24, a bill to enhance California’s breach notification law, S.B. 1386 from 2003. Former Governor Arnold…

  • Another Reason to Have a Security Policy – Your Customer Demands It

    by Stephen Wu on August 25, 2011

    I am always interested to see the dialogue on the listserv of the Information Security Committee (ISC) of the American Bar Association Section of Science & Technology Law. As a former Co-Chair of the ISC and Immediate Past Chair of the Section, I like to see people sharing ideas, tips, and useful documents, such as forms and checklists, that help people do their jobs. One of the recent posts on the…

  • Apple’s iCloud Will Change How We Do eDiscovery

    by Stephen Wu on July 4, 2011

    In June 2011, Apple unveiled its new iCloud service, with the company promoting the next step in moving away from PC-based computing towards a cloud-centric model of computing. Apple’s iCloud service syncs data among devices, supports automatic data backup, and support third party applications which, over time, will presumably permit a wide range of data uses and sharing. Apple’s new service…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 23 Jul 2014 17:42:38 -0400.
© 2014 EMC Corporation. All rights reserved.