Cloud Hacking Incidents May Prompt Congress and the Administration to Turn Attention Again to Mobile Privacy Issues

Sep 2, 2014

Reading Time : 1 min

By: Francine E. Friedman, Matthew Thomas (Senior Public Policy Specialist)

Not only are data, information, documents, etc. stored in the cloud vulnerable, but when they are transmitted or even deleted by a user they may still be at risk.  Several of the celebrities affected by the iCloud theft have stated that the pictures stolen were taken many years ago and were believed to have been deleted.  This could have serious ramifications for businesses and governments that use the convenience of cloud storage to encourage employee collaboration and to manage their information and data storage needs. 

While embarrassing in nature, the theft of private photographs is unlikely to have serious consequences for their owners.  More concerning is the risk of theft of confidential information concerning economic, legal and national security matters.  Adding to this concern, mobile device manufacturers are beginning to work with banks and credit card companies to allow the use of phones in place of credit/debit cards for payment purposes.  Already there have been major data breaches at retailers where consumers’ financial information was stolen.  Adding mobile devices to the mix may create another temptation for hackers, creating a renewed interest in policing mobile privacy and data security policy. 

Given the confluence of these recent events, it is possible that Congress and the Obama Administration may again turn their attention to mobile device privacy issues in the coming months.  Indeed, mobile privacy was one of the top priorities to be addressed by the U.S. Department of Commerce National Telecommunications and Information Administration’s (NTIA) multi-stakeholder privacy and data initiative.  The NTIA was unable to make any real headway on mobile privacy due to disagreements among involved stakeholders.  Many of the stakeholders have recommended NTIA scrap the process and instead pursue legislation from Congress.

In the meantime, consumers, businesses and federal and state agencies should review their use of mobile devices and cloud storage, and take measures to protect sensitive information and data from such breaches.

Share This Insight

Previous Entries

Deal Diary

April 12, 2023

Read More

Deal Diary

2022-12-15

On December 14, 2022, the Securities and Exchange Commission (SEC) adopted amendments regarding Rule 10b5-1 insider trading plans and related disclosures. The amendments aim to strengthen investor protections concerning insider trading and to help shareholders understand when and how insiders are trading in securities for which they may at times have material nonpublic information (MNPI). In light of these amendments, issuers should review and revise, if needed, their insider trading policies and equity grant policies.

Read more.

...

Read More

© 2024 Akin Gump Strauss Hauer & Feld LLP. All rights reserved. Attorney advertising. This document is distributed for informational use only; it does not constitute legal advice and should not be used as such. Prior results do not guarantee a similar outcome. Akin is the practicing name of Akin Gump LLP, a New York limited liability partnership authorized and regulated by the Solicitors Regulation Authority under number 267321. A list of the partners is available for inspection at Eighth Floor, Ten Bishops Square, London E1 6EG. For more information about Akin Gump LLP, Akin Gump Strauss Hauer & Feld LLP and other associated entities under which the Akin Gump network operates worldwide, please see our Legal Notices page.