data security, e-commerce, InfoLawGroup, information technology, InformationLawGroup, intellectual property, privacy, welcome

Welcome! The InformationLawGroup is Here

By InfoLawGroup LLP on October 05, 2009

We are thrilled to announce the official launch of the InformationLawGroup! The InformationLawGroup is a group of attorneys that love the law and technology. We concentrate on legal issues concerning privacy, data security, information technology, e-commerce and intellectual property. We are a full service firm addressing a broad spectrum of matters, including transactions, compliance, breach notice and incident response and litigation. We come together today after many years in large law firm and in-house roles. We are seasoned attorneys, including former "BigLaw" lawyers, smaller practitioners with clearly defined expertise and reputation in the field, and former in-house lawyers with specific information law experience and talent. These factors result in greatly increased efficiency and better results at a significantly lower price for the firm's clients. So who are we? Read more after the jump.

business associate, covered entity, delay, exceptions, financial, reputational, or other harm, HIPAA, HITECH HIPAA breach notification covered entity business associate significan..., law enforcement, or other harm exceptions law enforcement delay risk assessment, reputational, risk assessment, significant risk

The New Health Care Breach Notification Landscape -- HHS Rules

By InfoLawGroup LLP on October 05, 2009

On February 17, 2009, Congress signed into law the Health Information Technology for Economic and Clinical Health or "HITECH" Act ("HITECH" or the "Act") as part of the American Recovery and Reinvestment Act. The HITECH Act requires entities covered by the Health Insurance Portability and Accountability Act ("HIPAA") to provide notification to affected individuals and to the Secretary of Health and Human Services ("HHS") following the discovery of a breach of unsecured protected health information. HITECH also requires business associates of HIPAA-covered entities to notify the covered entity in the event of the breach. The Act required HHS to issue interim final regulations with respect to the new breach notification requirements. On August 24, 2009, the HHS interim final regulations were published in the Federal Register.

256-bit key, AES, assymetric cryptography, data at rest, DES, file encryption, FIPS 197, FIPS 200, hardward-based encryption, mobile encryption, NIST, NIST 800-53, OMB, OMB M-07-16, PKI, RSA Security, software disk encryption

Code or Clear? Encryption Requirements (Part 4)

By W. Scott Blackmer on October 04, 2009

In other posts, I talked about the trend toward more prescriptive encryption requirements in laws and regulations governing certain categories of personal data and other protected information. Here's an overview of the standards and related products available for safe (and legally defensible) handling of protected data.

information security law, information security law legislation, Legislation, Massachusetts, Massachusetts personally identifiable information service provider, personally identifiable information, service provider

Massachusetts' Revised Personal Information Security Regulation (201 CMR 17.00)

By InfoLawGroup LLP on October 03, 2009

Massachusetts' Office of Consumer Affairs & Business Regulation (OCABR) recently released a revised version of its "Standards for the Protection of Personal Information of Residents of the Commonwealth" (the "Regulation"). This August 2009 version modifies the February 2009 version of the Regulation. The press release for the new revision is here, and the FAQs released by OCABR appear updated to address some of the changes in the regulations.For ease of reference, ISC has taken the time to create a REDLINED VERSION showing the revisions in the new Regulation. The redlines indicate changes between the February 2009 version and the August 2009 version of the Regulation. Also included below is a summary of some of the more significant changes.

appropriate, EU, EU Data Protection Directive, international, reasonable, security measures

Code or Clear? Encryption Requirements (Part 3)

By W. Scott Blackmer on October 01, 2009

In other posts, I addressed the trend in the United States to require encryption for certain categories of personal data that are sought by ID thieves and fraudsters - especially Social Security Numbers, driver's license numbers, and bank account or payment card details - as well as for medical information, which individuals tend to consider especially sensitive. These concerns are not, of course, limited to the United States. Comprehensive data protection laws in Europe, Canada, Japan, Australia, New Zealand and elsewhere include general obligations to maintain "reasonable" or "appropriate" or "proportional" security measures, usually without further elaboration. Some nations have gone further, however, to specify security measures.

appropriate, civil litigation, compliance, FTC, legal requirements, negligence, portable devices, public networks, reasonable, security measures, unfair practices, wireless

Code or Clear? Encryption Requirements under Information Privacy and Security Laws (Part 1)

By W. Scott Blackmer on October 01, 2009

"Exactly what data do we have to encrypt, and how?" That's a common question posed by IT and legal departments, HR and customer service managers, CIOs and information security professionals. In the past, they made their own choices about encryption, balancing the risks of compromised data against the costs of encryption. Those costs are measured not merely by expense but also by increased processing load, user-unfriendliness, and the remote but real possibility of lost or corrupted decryption keys resulting in inaccessible data. After weighing the costs and benefits, most enterprises decided against encryption for all but the most sensitive applications and data categories.

Binding Corporate Rules, breach notification, EU Data Protection Directive, Gramm-Leach-Bliley, HIPAA, model contracts, privacy, Safe Harbor

Legal Implications of Cloud Computing -- Part Two (Privacy and the Cloud)

By InfoLawGroup LLP on September 30, 2009

Last month we posted some basics on cloud computing designed to provide some context and identify the legal issues. What is the cloud? Why is everyone in the tech community talking about it? Why do we as lawyers even care? Dave provided a few things for our readers to think about -- privacy, security, e-discovery. Now let's dig a little deeper. I am going to start with privacy and cross-border data transfers. Is there privacy in the cloud? What are the privacy laws to keep in mind? What are an organization's compliance obligations? As with so many issues in the privacy space, the answer begins with one key principle -- location, location, location.

Breach, contracting, e-Discovery, Electronic evidence, EU Directive, IaaS, outsourcing, PaaS, privacy, SaaS, Security, service provider

Legal Implications of Cloud Computing -- Part One (the Basics and Framing the Issues)

By InfoLawGroup LLP on August 16, 2009

I had the pleasure of hearing an excellent presentation by Tanya Forsheit on the legal issues arising out of cloud computing during the ABA Information Security Committee's recent meeting (at the end of July) in Chicago. The presentation resulted in a spirited debate between several attorneys in the crowd. The conversation spilled over into happy hour and became even more interesting. The end result: my previous misunderstanding of cloud computing as "just outsourcing" was corrected, and now I have a better appreciation of what "the cloud" is and the legal issues cloud computing raises.