Michigan is poised to become the next state to adopt a data security law similar to the Insurance Data Security Model Law advocated by the National Association of Insurance Commissioners (NAIC). Michigan House Bill 6491, passed by the Michigan House during Michigan’s 99th Legislative Session on December 6, 2018, and passed by the Michigan Senate on December 19, 2018, was presented to its then-Governor Rick Snyder on December 27, 2018.
Read more »Tag: model law
-
Michigan Next State to Adopt Insurance Data Security Model Law Posted on: January 03, 2019 In: Data Privacy & Cybersecurity
Blog Search
Featured Posts
- January 29, 2019 Huawei Trade Secrets Indictment is Cautionary Tale for Tech Partnerships
- January 22, 2019 Modlishka – Exploiting Two-Factor Authentication
- January 17, 2019 Preserving Patent Rights on a Global Stage: Foreign Filing Options and How to Successfully Navigate Novelty Requirements
- January 08, 2019 Tax Return Theft: Tips for Prevention & Response
Blog Tags
2nd circuit
aba
alabama
america invents act
arkansas
audit
breach notification
ca9
california
ccpa
client notification
colorado
commission
congress
consumer notification
copyright
cryptocurrency
cybersecurity
cyber threat
data breach
data privacy directive
data protection officer
data security
delaware
department of commerce
department of financial services
digital music
employment
encryption attack
entertainment
epo
ethereum
ethics
eu
eu-u.s. data privacy shield
eu-u.s. privacy shield
european union
fcra
federal circuit
federal communication
federal trade commission
financial firms
financial services
first sale doctrine
foreign filing
gdpr
grace period
hacking
hippa
identity theft
incidence response plan
inter partes review
irs
malware
maryland
media
michigan
model law
multi-factor identification
naic
net neutrality
new mexico
ninth circuit
nist security controls
nydfs
ocabr
passwords
patching
patent
patent cooperation treaty
patents
penalties
personal data
phishing
post-grant review
privacy act
ptab
ransomware
rdp
redigi
regulations
remote desktop protocol
security posture assessment
security vulnerabilities
service provider agreement
social engineering
social media
south dakota
spear-phishing
spokeo
statute
supreme court
tax returns
tennessee
third party
utah
virginia
virus
wipo
workplace policy