LEGAL INSIGHTS

The digital economy is revolutionizing every aspect of our lives, and success in today’s economy requires that businesses become disruptors and innovators. At Patrick Law Group, we believe that a critical component of competitiveness in the digital economy is the pursuit of sharing and collaboration of relevant information.

We recognize the increasing complexity our Clients face in identifying relevant content and insightful business perspectives on changes and developments important to their practice areas and business interests. We invest in creating and sharing Client-centric content, and provide our Clients with current insights and knowledge that affect critical business decisions and the development of cogent business strategies.

RSS

IoT Device Companies: COPPA Lessons Learned from VTech’s FTC Settlement

IoT Device Companies: COPPA Lessons Learned from VTech’s FTC Settlement

By Jennifer Thompson | In “IoT Device Companies:  Add COPPA to Your “To Do” Lists,” I summarized the Federal Trade Commission (FTC)’s June, 2017 guidance that IoT companies selling devices used by children will be subject to the Children’s Online Privacy Protection Act (COPPA) and may face increased scrutiny from the FTC with respect to their data collection practices.  That warning became a harsh reality for VTech Electronics Limited (VTech), which recently entered into a settlement with the FTC to, among other things, pay $650,000 for alleged violations of COPPA and the FTC Act.

read more
Beware of the Man-in-the-Middle: Lessons from the FTC’s Lenovo Settlement

Beware of the Man-in-the-Middle: Lessons from the FTC’s Lenovo Settlement

By Linda Henry | The Federal Trade Commission’s recent approval of a final settlement with Lenovo (United States) Inc., one of the world’s largest computer manufacturers, offers a reminder that when it comes to consumers’ sensitive personal information, transparency is key, and failure to assess and address security risks created by third-party software vendors may be deemed an unfair act or practice under Section 5 of the FTC Act.

read more
Part III of III | FTC Provides Guidance on Reasonable Data Security Practices

Part III of III | FTC Provides Guidance on Reasonable Data Security Practices

By Linda Henry | Over the past 15 years, the Federal Trade Commission (FTC) has brought more than 60 cases against companies for unfair or deceptive data security practices that put consumers’ personal data at unreasonable risk.  Although the FTC has stated that the touchstone of its approach to data security is reasonableness, the FTC has faced considerable criticism from the business community for lack of clarity as to as to what it considers reasonable data security.

read more
Apple’s X-Cellent Response to Sen. Franken’s Queries Regarding Facial Recognition Technologies

Apple’s X-Cellent Response to Sen. Franken’s Queries Regarding Facial Recognition Technologies

By Dawn Ingley | Recently, I wrote an article outlining the growing body of state legislation designed to address and mitigate emerging privacy concerns over facial recognition technologies.  It now appears that the issue will be examined at the federal level.  In September, Senator Al Franken of Minnesota, concerned that certain Apple technologies would be used to benefit other sectors of its business, as a “big data” profit center or to satisfy law enforcement agency requests, issued a series of pointed questions to Apple regarding its iPhone X’s FaceID.  That letter included the following questions…

read more
Pros and Cons of Hiring a Security Rating Agency

Pros and Cons of Hiring a Security Rating Agency

By Jennifer Thompson | One can hardly check out any news outlet today without reading or hearing about a security breach.  Experts frequently advocate performing internal assessments to identify security weaknesses.  Commentators tout the importance of assessing the security of the entities with which you do business.  Investors, partners and markets shy away from companies that are not proactive enough with respect to security. Given the multitude of variables involved and security measures available, how can a company convey the effectiveness of its own security program in a meaningful manner? Further, given how fact and business-specific that security is, how can one company compare its own security measures to those taken by another company?  Many companies turn to independent ratings agencies for an objective evaluation and systematized rating.

read more