- Published Articles
- In the Press
- Press Releases
Sign Up for Alerts
Sign up to receive receive industry-specific emails from our legal team.
Sign Up for Alerts
We provide tailored, industry-specific legal updates to our clients and other friends of the firm.
Areas of Interest
December 2nd, 2014
Six Essential Steps for Data Security
Here's a holiday gift for anyone whose business depends on keeping customer or client data secure: the Frankfurt Kurnit Technology Group's list of six essential steps for data security.
Transfer data securely. When transferring personal data, secure it using encryption and password protection. If you are sending a file via email, do not include the password in the same message. Consider not even sending the password by message at all: make a phone call to deliver the password.
Do not store information longer than necessary. One of the core concepts of privacy and data security is the data lifecycle. You should dispose of customers' personally identifiable information, and particularly payment information, as soon as you no longer need it for a legitimate business purpose. Do not just store information to store it.
Dispose of information as completely as possible. When you dispose of personally identifiable information, you must destroy it as completely as possible. If a "dumpster diver" or hacker can resurrect your data, then you have not properly disposed of it. Use a secure method to wipe your file system clean. Just clicking and dragging data files into a "recycle bin" or the "trash" on your computer screen is not enough.
- Make a breach plan. Creating a privacy and data security team along with a breach plan is a critical step in any comprehensive privacy and data security program. Company executives should know whom to call and what to do in the event of an incident. Your company should have access to legal counsel, a forensic data security company, and thorough internal policies. Making a breach plan after a breach has occurred is too late.
Data breaches and "hacks" occur daily. For more information on data security preparedness or any other technology, data privacy and security law issues, please contact Greg Boyd at (212) 826 5581 or firstname.lastname@example.org, Sean Kane at (212) 705 4845 or email@example.com, Jessica Smith at (212) 705 4876 or firstname.lastname@example.org, or any other member of the Frankfurt Kurnit Technology, Digital Media, & Privacy Group.
Other Technology Law Alerts
No Harm, No Foul: Court Dismisses Biometric Data Privacy Class Action Against NBA 2K Games
Biometric data — from, e.g., retina, face and fingerprint scans — plays a big role in the current wave of new technology services. For example, biometrics provide security features for financial and healthcare products. But companies using or thinking of using biometric data have to comply with myriad privacy and data security laws and regulations, or face potential enforcement action and litigation.
February 16 2017
ZeniMax v. Oculus: Lessons from a $500 Million VR Case Verdict
The Oculus Rift has been one of the most anticipated technology developments in modern video game history. Now — as a result of avoidable mistakes — it is also a teaching case for lawyers advising clients in the interactive entertainment space. Here's a rundown of the case and the traps the developers fell into.
February 9 2017
Are Augmented Reality Games Liable for Depictions of Buildings, Trademarks or Artwork?
In the few weeks since its release, Pokémon™ GO has dominated the interactive entertainment landscape. The augmented reality game has reportedly achieved more than 30 million downloads and lots of buzz. But as its popularity grows, so do questions about its legal implications - including the use of landmarks, buildings, monuments, and other frequented locations.
July 27 2016