Text Size   Decrease Font SizeIncrease Font Size
static_slide_interior

The PT Law Blog

Regulatory Humility

PDF Print
Privacy, Data Protection and Security
Monday, 01 February 2016 16:00

By: Arthur M. Freyre 

Reg

The widespread use of encryption technology was one of the major topics trending in technological discussions for 2015. Encryption technology allows a user to protect confidential conversations or information on designated computers by disguising the information into code. This technology safeguards protected data from external parties by making it very difficult for a person to access information, if they do not have an encryption key.

Without an encryption key, those that attempt to access these files without authorization, or hackers, see illegible characters and gibberish on their computer screen. An encryption key utilizes a program that allows the user not only to conceal their information, but also allows authorized access to view protected files. Companies are beginning to use encryption technology as a standard defense against hackers because of this advantage.

Read more... [Regulatory Humility]
 

A Valuable Lesson From the OPM Breach

PDF Print
Privacy, Data Protection and Security
Thursday, 03 December 2015 20:56

By: Arthur M. Freyre

National Journal recently posted an article titled, “OPM Just Now Figured Out How Much Data It Owns”. The article states that the months after its system was breached, the Office of Personnel Management was able to conduct an inventory of the information that the agency had in its network. Although, it is easy to say that this is an example of a bad management, the fact is that many companies do not know what information they have stored in their computers, or even the content of the stored information.

Read more... [A Valuable Lesson From the OPM Breach]
 

Data Security and Presidential Campaigns

PDF Print
Privacy, Data Protection and Security
Thursday, 12 November 2015 16:55

By Arthur M. Freyre

The 2016 presidential campaign will be kicking into high gear in the upcoming months. As the primaries begin in earnest in Iowa and New Hampshire, you can expect emails and phone call solicitations asking not only for your time, but also your money. But have you ever wondered how safe is the information you are providing a campaign online?

Read more... [Data Security and Presidential Campaigns]
 

Can Cuba Afford to Pay?

PDF Print
International Claims
Tuesday, 27 October 2015 19:02

By Mauricio Tamargo

There are Certain Cuba policy advocates and lobbyists in Washington, DC that are in a hurry to normalize trade relations with Cuba. One of the things that we keep hearing repeatedly from these people is that American certified claimants need to settle for pennies on the dollar because Cuba does not have the money to pay. 

Well, that is just not true and those who keep repeating that misinformation are undercutting our State Department’s negotiating team who are trying to get the best deal they can for the American claimants. Here are a few facts which give us a good indication of Cuba’s ability to pay the $8 billion debt represented by the 5,913 certified claims.

Read more... [Can Cuba Afford to Pay?]
 

Cyber Security Month

PDF Print
Privacy, Data Protection and Security
Monday, 05 October 2015 13:09

By: Arthur M. Freyre

The White House issued a proclamation setting aside October as Cyber Security month. How businesses and governments protect personal information affects all of us. As we depend on technology such as smart phones and laptops, the data that you transmit will become vulnerable to hackers, if you are not proactive.

Read more... [Cyber Security Month]
 

Congressman Jeff Duncan Urges US Delegation to UN to Uphold US Sovereign Law

PDF Print E-mail
International Claims
Wednesday, 23 September 2015 18:30

By: Cara E. Di Silvio

Western Hemisphere Subcommittee Chairman Congressman Jeff Duncan (R-SC) urged Ambassaador Samantha Power, the U.S. Ambassador to the United Nations, to defend U.S. sovereignty and interests at the United Nations with respect to an upcoming vote on Cuba:

"the U.S. delegation to the United Nations may abdicate its sovereign responsibility to uphold and defend U.S. interests as enshrined in U.S. law by abstaining, instead of voting against, on a resolution demanding the end of U.S.-Cuba embargo as outlined in the Cuban Liberty and Democratic Solidarity Act of 1996 (Libertad/Helms-Burton)."

Read more... [Congressman Jeff Duncan Urges US Delegation to UN to Uphold US Sovereign Law]
 

Data Security and Breach Notification Act of 2015

PDF Print
Privacy, Data Protection and Security
Wednesday, 18 March 2015 16:19

By: Arthur M. Freyre

This past week Congresswoman Marsha Blackburn (R-Tenn.) and Congressman Peter Welch (D-Vt.) released a draft version of the Data Security and Breach Notification Act aimed at protecting consumers in regards to personal information collection. The bill will be subject to a congressional hearing before the House Committee on Energy and Commerce. Please note that since the legislation is still in its preliminary form, changes to this bill can be expected until it has been formalized and sent to the committee for a vote. The official document and current review status can be found on the Congressional Website.

Similar to our previous post on the White House’s bill, Personal Data Notification and Protection Act, this article will provide an overview of the act by addressing the following topics:

Read more... [Data Security and Breach Notification Act of 2015]
 

CLIENT ALERT — United States Government Publishes A List of Goods and Services that May Be Imported to the United States from Cuban “Cuentapropistas”

PDF Print
Trade Security
Friday, 13 February 2015 11:51

CLIENT ALERT — United States Government Publishes A List of Goods and Services that May Be Imported to the United States from Cuban “Cuentapropistas”

Special Compliance Challenges in Store for Persons Subject to U.S. Law

By Jason I. Poblete

(Washington, DC) On Friday, February 13 the State Department released additional new regulations designed to create “new opportunities for Cuba’s nascent private sector” by allowing the import to the United States of products and services from Cubans not working directly for the government or a government agency. The import list addition to the Cuban Assets Control Regulations (“CACR”), 31 C.F.R. § 515 come less than a month after the Treasury and Commerce Departments issued new regulations on January 16 that made it easier for Americans to travel and spend money in Cuba. 

Read more... [CLIENT ALERT — United States Government Publishes A List of Goods and Services that May Be Imported to the United States from Cuban “Cuentapropistas”]
 

White House Releases Proposed Data Notification Bill

PDF Print
Privacy, Data Protection and Security
Monday, 19 January 2015 18:10

By Arthur Freyre

Data privacy and cyber security were topics that President Obama touched upon this New Year.  The President promised to propose three bills before Congress dealing with these topics this past Monday at the Federal Trade Commission. The White House released the first of its three proposed bills later that week. 

The Personal Data Notification and Protection Act addresses the issue of data notification in the event of a data breach. This post will give you a brief overview of the White House’s proposed legislation.  This overview will address the following topics: (1) Who is covered? (2) How is data defined? (3) What is the protocol? (4) Who has jurisdiction? And (5) How does this affect state notification laws?  We will also address any possible issues that Congress may address as a result of this proposal. Please keep in mind that the legislation is in its early stages and this is not the final word on data breaches from Washington.

Read more... [White House Releases Proposed Data Notification Bill]
 

Privacy, Data Protection & Security

PDF Print
Privacy, Data Protection and Security
Tuesday, 25 November 2014 11:17

By: Arthur M. Freyre

The breach of security and privacy systems in organizations and companies in the last several years, has created a heightened awareness of how important it is for companies and other organizations to protect client and customer data as well as personal information. 

While there is no one size-fits-all approach, a suitable approach to deal with this issue includes frequent data security audits by knowledgeable data security professionals who approach this matter in an inter-disciplinary manner. Failing to protect customer data or a data breach can result in not only damage to your business reputation, but also legal liability, regulatory sanctions, customer distrust, and reduced revenue.

Read more... [Privacy, Data Protection & Security]
 
<< Start < 1 3 5 6 7 8 9 10 > End >>

Page 3 of 13

Social Media

Twitter2Facebook2LinkedIn2 YouTube Icon 

Newsletter Sign-Up

Fill out my online form.

ViewOureNewsletter

Recent News

Confiscated Property in Cuba is Being Sold in Miami

Nearly 60 years ago, American’s living in Cuba were forced to flee the island as Fidel Castro took power and began expropriating ... [More]

UPDATE 22- Zakka Family Appreciates Efforts By President Trump & U.S. Congress

Statement on the Trump Administration's Efforts to Secure Release of Hostages in Iran Zakka Family Appreciates Efforts By Pres... [More]

©2016 PobleteTamargo LLP
Disclaimer
Attorney Website by The Modern Firm