Plaintiffs’ counsel have developed a new weapon in their arsenal for privacy litigation involving tracking pixels: Arizona’s “Telephone, Utility and Communication Service Records Law,” A.R.S. § 44-1376 et seq.
Continue Reading ›The Arizona Court of Appeals affirmed a jury verdict that imposed 100% liability on an escrow agent for a wire transfer it sent to a cybercriminal/imposter and attributed no fault to the imposter or the party whose systems were compromised by the imposter. Cybersecurity practitioners and Arizona litigators should take note of the decision and its potential implications.
In Mago v. Arizona Escrow & Financial Corp., the plaintiff (“Mago”) had contracted to purchase a Subway franchise from the prior owners (the “Sellers”). The escrow agent for the deal was Arizona Escrow (the ...
Continue Reading ›The National Credit Union Administration (NCUA) approved a final rule that will require any Federally-Insured Credit Union (FICU)—including federally chartered corporate credit unions and federally insured state-chartered corporate credit unions—to report certain cyber incidents to the NCUA as soon as possible, and no later than 72 hours, after it “reasonably believes” it has experienced a reportable incident. The rule, which adds a new subsection (c) to 12 CFR Part 748.1, goes into effect September 1, 2023.
In issuing its new rule, the NCUA attempted to closely ...
Continue Reading ›The investigation is focused on retail, travel, and food service apps that either do not honor consumer opt-out requests or do not provide the appropriate mechanisms for consumers to stop the sale of their data.
Continue Reading ›The best time to respond to a ransomware attack was yesterday, but the second-best time to start responding is today. Study after study over the past year has confirmed that having a plan in place in the event of a data breach and ransomware attack can save you and your company millions. Every employer has a fire evacuation plan and drills they run, and this is no different.
Continue Reading ›A widely reported flaw in popular software known as Log4j poses a severe cybersecurity threat to organizations around the globe, with hundreds of millions of devices at risk.
Continue Reading ›FireEye, Inc., a leading U.S. cybersecurity firm, recently disclosed that it had been hacked by a nation-state actor. The company has since revealed that the hack was likely perpetrated, in part, through an ongoing compromise of “Orion” IT monitoring and management software offered by SolarWinds Worldwide, LLC.
Continue Reading ›According to recent reports, cloud hosting and IT services provider Netgain, which bills itself as “the industry standard for secure and scalable IT-as-a-Service (ITaaS) for accounting and healthcare,” has been forced to take some of its data centers offline after suffering a recent (and potentially ongoing) ransomware attack.
Continue Reading ›Since January, the COVID-19 pandemic has altered the global economy, leading to even greater cybersecurity threats as more and more people are connecting remotely. Indeed, the FBI has reported a 300% increase in the number of daily complaints submitted to its Internet Crime Complaint Center (IC3) during the pandemic.
Continue Reading ›Cybercriminals are exploiting the vulnerability of the healthcare community affected by COVID-19, an increase in teleworking and the need by medical professionals to stay current on coronavirus information.
Continue Reading ›The California Consumer Privacy Act (“CCPA”) came into effect on January 1, 2020, significantly altering the data privacy landscape for businesses across the nation. As a result, many businesses have been waiting to finalize their compliance procedures to ensure consistency with those regulations, which are still subject to revision.
Continue Reading ›Unfortunately, cyber criminals see the chaos caused by the COVID-19 pandemic as an opportunity to send phishing emails which seem like they are delivered from the email domains associated with the Centers for Disease Control, the World Health Organization, the National Institutes of Health, state/local agencies, service providers and even company HR departments.
Continue Reading ›Ransomware—malicious software that locks or alters computer data and demands a ransom payment to unlock or restore the data—is not a new phenomenon. Recently, though, ransomware attacks have become increasingly common and increasingly sophisticated, with hackers not only locking but also stealing the data.
Continue Reading ›Wire transfer fraud is rampant. FINRA member firms and their employees must be diligent in the detection of scams and the prevention of client losses. In addition, adherence to the member firm’s wire transfer policies and procedures is important for the avoidance of losses and potential regulatory sanctions.
Continue Reading ›Cybersecurity attorneys Doug DePeppe, Hilary Wells, Bill Nelson and Ed Barkel explore why businesses must start paying attention to their 'Cyber Hygiene' on the latest episode of the Business Leaders Podcast.
Continue Reading ›The Colorado Department of Regulatory Agencies recently published a notice regarding proposed changes to the Colorado Securities Act (the “Proposal”). This Proposal seeks to add two new rules to the Securities Act (Rule 51-4.8 and 51-4.14), each of which impose various cybersecurity requirements on broker-dealers and investment advisers, respectively. A redline showing the proposed amendments can be […]
Continue Reading ›The Internet of Things (or “IoT”) is a hot topic in privacy circles, given its rapid expansion among everyday consumer products. Broadly referring to Internet-connected-devices, the IoT encompasses a variety of consumer goods, such as kitchen appliances (smart ovens and refrigerators), home security, window blinds, light bulbs, and lawn care equipment. Many personal devices are […]
Continue Reading ›The Federal Trade Commission (FTC) is the government agency primarily responsible for imposing penalties on companies that fail to protect consumer data. It does so under Section 5 of the Federal Trade Commission Act, which prohibits “unfair and deceptive acts or practices in or affecting commerce.” This case began in 2008, when someone found a […]
Continue Reading ›As data breaches increase in profile and frequency, lawmakers are struggling to protect their citizens from cybercrime. Within the past year, at least four states have beefed up their data security statutes to provide greater consumer protection. According to a May 2016 summary by the National Conference of State Legislatures, more than 25 states in 2016 […]
Continue Reading ›According to a recent Federal Trade Commission (“FTC”) blog post, consumers should think twice before connecting their cell phones to a rental car. The FTC warns that the vehicle could record all kinds of data, including your personal contacts, location, web browsing, and even your text messages. This blog post written by an FTC staff attorney […]
Continue Reading ›About This Blog
Lewis Roca is immersed in your industry and invested in your success. We share insights and trends that can affect your business.
Search
Topics
Archives
- September 2024
- August 2024
- May 2024
- March 2024
- February 2024
- September 2023
- April 2023
- March 2023
- February 2023
- December 2022
- November 2022
- October 2022
- September 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- February 2021
- January 2021
- December 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- November 2018
- April 2018
- February 2018
- January 2018
- December 2017
- November 2017
- September 2017
- August 2017
- June 2017
- May 2017
- April 2017
- March 2017
- November 2016
- October 2016
- September 2016
- August 2016
- April 2016
- January 2016
Authors
- Alfredo T. Alonso
- Amy E. Altshuler
- Edwin A. Barkel
- Trevor G. Bartel
- Nick Bauman
- G. Warren Bleeker
- Brooks Brennan
- Ogonna M. Brown
- Chad S. Caby
- John Carson
- Rob Charles
- Joshua T. Chu
- Howard E. Cole
- Katherine Costella
- Thomas J. Daly
- Pat Derdenger
- Thomas J. Dougherty
- Susan M. Freeman
- Yalda Godusi Arellano
- John C. Gray, CIPP/US
- Art Hasan
- Frances J. Haynes
- Dietrich C. Hoefner
- Jennifer K. Hostetler
- David A. Jackson
- Andrew Jacobsohn
- Kyle W. Kellar
- Kris J. Kostolansky
- Gregory S. Lampert
- Shaun P. Lee
- Glenn J. Light
- Laura A. Lo Bianco
- Karen Jurichko Lowell
- James M. Lyons
- H. William Mahaffey
- Constantine Marantidis
- A.J. Martinez
- Patrick Emerson McCormick, CIPP/US
- Michael J. McCue
- Lindsay L. McKae
- Linda M. Mitchell
- Gary J. Nelson
- Rachel A. Nicholas
- Laura Pasqualone
- Michael D. Plachy
- David A. Plumley
- Kurt S. Prange
- Katie M. (Derrig) Rios
- Robert F. Roos
- Karl F. Rutledge
- Daniel A. Salgado
- Mary Ellen Simonson
- Susan Strebel Sperber
- Jan A. Steinhour
- Ryan M. Swank
- Dustin R. Szakalski
- Chris A. Underwood
- Jennifer A. Van Kirk
- Hilary D. Wells
- Drew Wilson, CIPP/US
- Karen L. Witt
- Meng Zhong
Recent Posts
- The Importance of Retaining a Grandfathered Gaming Location in Nevada
- Welcome our 2024 Michael D. Nosler Scholarship Intern
- Going Viral: Navigating Promotional Sweepstakes Legality in the Social Media Era
- Arizona Voters Modify Creditors' Remedies with Passage of Proposition 209
- Nevada Gaming Control Board Issues Gaming Technology Approval Guidelines
- Amendments to Nevada Gaming Regulation 5
- Nevada Gaming Control Board Workshop on Public Regulation
- New Wave of Arizona Privacy Litigation Regarding Tracking Pixels
- Legal Issues, Problems, and Unanswered Questions Regarding a State’s Ability and Potential Departure from the Depository Institution Deregulation and Monetary Control Act of 1980 (“DIDMCA”)
- New Trademark Scam