Attorney General, Breach, Connecticut, data, data breach

Two Northeast States Update Breach Notification Statutes - CT & VT

By InfoLawGroup LLP on June 20, 2012

In the last month both Vermont and Connecticut updated their existing breach notification statutes, highlighting the need to closely monitor state legislatures, particularly end of session happenings. Each modification highlights the growing trend of states requiring notification to the state's attorney general, under often new compressed timeframes.

California, class action, injury-in-fact, motion to dismiss, Shine the Light, State case law

First Reported Shine the Light Suit Dismissed for Failure to State Cognizable Injury

By InfoLawGroup LLP on June 19, 2012

Last week, a plaintiff's putative class action alleging a violation of California's Shine the Light law, Cal. Civ. Code § 1798.83, was dismissed without prejudice. See Boorstein v. Men's Journal LLC, No. 12-cv-00771-DSF-E, 2012 WL 2152815 (C.D. Cal. June 14, 2012). The suit, one of several other similar pending suits, is the first reported decision applying the Shine the Light Law.

Chambers, gottshall, IAPP, KnowledgeNet, Media & Entertainment, Rubin, Segalis

Congratulations Justine Gottshall, Jamie Rubin, and Boris Segalis

By InfoLawGroup LLP on June 15, 2012

InfoLawGroup is very pleased to congratulate our partners Justine Gottshall and Jamie Rubin on their inclusion in the Chambers USA's top ranking of Media & Entertainment: Transactional practices in Illinois. As noted in Chambers, Ms. Gottshall and Mr. Rubin represent major studios and retail companies involved in advertising, as well as publishers and other media companies. We are also thrilled to announce that our partner Boris Segalis has been selected to serve as one of the co-chairs of IAPP KnowledgeNet for New York City.

anti-virus, assessment, audit, bring your own device, bring your own device coit device encrypt incident response mobile privacy se..., byod, coit, device, encrypt, forensics, incident response, liability, Mobile, mobile privacy, privacy, Security, security breach, security program, subpoena

The Legal Implications of BYOD (Part II) - Preparing Personal Device Use Policies

By InfoLawGroup LLP on June 11, 2012

In our last "bring your own device" post we explored some of the key security, privacy and incident response issues related to BYOD. These issues are often important drivers in a company's decision to pursue a BYOD strategy and set the scope of personal device use within their organization. If the risks and costs associated with BYOD outstrip the benefits, a BYOD strategy may be abandoned altogether. One of the primary tools (if not the most important tool) for addressing such risks are BYOD-related policies. Sometimes these policies are embedded within an organization's existing security and privacy policy framework. More frequently, however, companies are creating separate personal device use policies that stand alone or work with/cross-reference existing company security, privacy and incident response polices. This post lays out the key considerations company lawyers and compliance personnel should take into account when creating personal device use policies and outlines some of the important provisions that are often found in such policies.

affirmative express consent, Do Not Track, Gateway, material change, retroactive, twitter

Twitter's New Tailored Suggestion Service Raises Questions

By InfoLawGroup LLP on June 05, 2012

The buzz words in privacy over the last few months (really longer than that) have been "Do Not Track." Twitter is just the latest company to adopt the DNT browser option, indicating in a blast email to all Twitter users that the setting is now available for implementation if a user so chooses. Interestingly, however, a much less publicized setting was also presented in that same email blast: Twitter's new "tailored suggestion feature." Applications and widgets created by Twitter will begin to collect data about Twitter users from third party websites that feature those products. This is an entirely new feature from Twitter, and is being implemented as a default option for both new and existing Twitter users.

California, class action, credit cards, loyalty program, personal identification information, personal information, rewards program, Song-Beverly

Class Certification Ruling Suggests that a Plaintiff's Membership in a Retailer's Pre-Existing Rewards Program May Not Excuse a Retailer's Request for Personal Information at the Register

By InfoLawGroup LLP on May 17, 2012

The U.S. District Court for the Southern District of California recently granted class certification in a Song-Beverly Credit Card Act case, refusing to exclude from the class individuals who joined the retailer's rewards program months after the alleged Song-Beverly violation. See Yeoman v. IKEA U.S. West, Inc., No. 11CV701, 2012 WL 1598051 (S.D. Cal. May 4, 2012). The Court's discussion suggests that a retailer may also face Song-Beverly liability even if it requests personal information at the register that it already holds by virtue of the customer's membership in its rewards program.

expiration, FACTA, FCRA, franchisee, franchisor, receipt, vicarious liability

Vicarious Liability May Be Used to State a FACTA Claim

By InfoLawGroup LLP on May 01, 2012

Vicarious liability may be used to state a claim under the FACTA provision prohibiting a retailer from printing a credit card expiration date on a receipt. See Keith v. Back Yard Burgers of Nebraska, Inc., No. 8:11-CV-135 (D. Neb. Apr. 13, 2012). According to the court, only one other unreported decision had addressed a franchisor's vicarious liability under FACTA.

CAN-SPAM, DMCA, Nihar Shah, social media, Terms of Service

Social Media Networks Seek to Control Use of Their Products Through TOS Enforcement

By InfoLawGroup LLP on April 27, 2012

This is significant because in the past, platforms have utilized federal laws such as CAN-SPAM, which prohibits sending misleading electronic communications, to punish the most egregious spammers. If Twitter prevails in this lawsuit, it puts all users on notice that there is monetary liability for breaching a platform's TOS, which significantly expands the ability of a social media company to reign in prohibited activity by users.

authentication, comerica, commercially reasonable security, contracting, experimetal, FFIEC, layered security, multifactor authentication, patco, phishing, reasonable, Red Flags Rule, Security, security breach, security breach litigation, token, UCC 4A-202

The Duty to Authenticate Identity: the Online Banking Breach Lawsuits

By InfoLawGroup LLP on April 17, 2012

We have entered an era where our commercial transactions are increasingly being conducted online without any face-to-face interaction, and without the traditional safeguards used to confirm that a party is who they purport to be. The attenuated nature of many online relationships has created an opportunity for criminal elements to steal or spoof online identities and use them for monetary gain. As such, the ability of one party to authenticate the identity of the other party in an online transaction is of key importance.To counteract this threat, the business community has begun to develop new authentication procedures to enhance the reliability of online identities (so that transacting parties have a higher degree of confidence that the party on the other end of an electronic transaction is who they say they are). At the same time, the law is beginning to recognize a duty to authenticate. This blogpost post looks at two online banking breach cases to examine what courts are saying about authentication and commercially reasonable security.

affiliate marketing, deceptive practices, endorsements, FTC, FTC Act, marketing

Acai of Relief? Marketers' Recent Settlement of FTC Charges Serves as a Reminder for Online Advertisers and Affiliate Marketers.

By InfoLawGroup LLP on April 04, 2012

Two online marketers of acai berry products recently settled the FTC's charges that the marketers engaged in deceptive practices by operating "fake news" sites directly and through affiliates to promote acai berry products. Although these cases are extreme examples of deceptive practices, they should serve as an important reminder for companies engaging in affiliate marketing that the FTC actively enforces in this area using the FTC Act, and that companies marketing through affiliates and affiliate marketers must understand and address the FTC's Guides Concerning the Use of Endorsements and Testimonials in Advertising, which were updated in 2009 ("Guides"). As discussed further below, this can pose a challenge for companies of all types advertising through affiliate marketing programs