Blog: Legal Requirements

Page 12

Washington D.C. Security Breach Protection Amendment Act of 2019

Following several other US states, and many legal jurisdictions around the world, Washington, D.C. has strengthened one of its key privacy laws: the Washington D.C. Data Breach Notification Law. The Security Breach Protection Amendment Act of 2019, B23-0215, makes several important changes to the D.C. data breach law, including a broader...

Why the EU-U.S. Privacy Shield Was Invalidated

Editor's Note: In July of 2023, the new EU-U.S. Data Privacy Framework was adopted. On July 16, 2020, the Court of Justice of the European Union (CJEU) delivered its judgment on the case of Data Protection Commissioner v Facebook Ireland Ltd and Maximillian Schrems (otherwise known as "Schrems II"). The CJEU decided...

Standard Contractual Clauses (SCCs)

On June 4, 2021, the European Commission released updated EU standard contractual clauses (SCCs) to ensure the lawful transfer of personal data to countries outside the European Economic Area (aka third countries). The old SCCs pre-dated the EU General Data Protection Regulation (GDPR) and, as such, do not reflect its stringent...

Privacy Policy for Apps With Camera Access

If you're developing an app that requests camera access, you're asking your users to place a lot of trust in you. You also enter into some perilous territory regarding privacy law and your agreements with service providers that make your app function. When requesting such sensitive access to a user's device, you...

What Can Happen if You Violate Privacy Laws

Failing to respect your customers' privacy can result in reputational harm, loss of personal information, and wasted resources. Increasingly, it can also put you in violation of the law, and lead to large fines and legal claims. No matter where your business operates, there is almost certainly at least one privacy...

Computer Misuse Act 1990

The Computer Misuse Act 1990 is the UK's legal defense against hacking, allowing the state to prosecute those who use or access computers for malicious purposes. Understanding this law is a key way for businesses with UK operations to keep cybercriminals out of their systems. This article will break down what this...