Cynthia Larose

Cynthia Larose

Mintz Levin

Contact  |  View Bio  |  RSS

Latest Posts › Cybersecurity

Share:

House Energy & Commerce Committee Holds Hearing on Security of the Internet of Things

The growing scale of cybersecurity concerns is prompting action from government leadership on the federal level. Before the Thanksgiving recess, the House’s Committee on Energy and Commerce got in on the act when two of its...more

12/1/2016 - Cybersecurity Data Breach Distributed Denial of Service Internet of Things

The Cyber President? What To Expect From the Trump Administration On Cybersecurity And Privacy

Even president-elect Donald Trump has been the victim of a data breach. Several times actually. The payment card system for his Trump Hotel Collection was infected by malware in May 2014 and 70,000 credit card numbers were...more

11/17/2016 - Cybersecurity Cybersecurity Information Sharing Act (CISA) Data Security Donald Trump EU Data Protection Laws EU-US Privacy Shield Internet of Things Presidential Elections Trump Administration US-EU Safe Harbor Framework

How did the Internet of Things allow the latest attack — on the Internet?

Over the last week, details have become available to explain how an attack against a well-known domain name service (DNS) provider occurred. What about the potential legal risks? We will attempt to provide insights into...more

10/28/2016 - Cybersecurity Denial of Service Attacks Domain Names Internet Internet of Things

3 Guidelines to Maximize Value of Data

Imagine you are the CEO of company sitting across from an interviewer. The interviewer asks you the age old question, “So tell me about your company’s strengths and weaknesses?” You start thinking about your competitive...more

10/24/2016 - Cybersecurity Data Breach Data Collection Data Protection Data Security

New York Proposes First-Ever Cybersecurity Regulation for Financial Institutions

The New York Department of Financial Services recently announced a new proposed rule, which would require financial institutions and insurers to implement strong policies for responding to cyberattacks and data breaches. ...more

9/19/2016 - Cyber Attacks Cybersecurity Data Breach Financial Institutions Financial Sector

Eddie Bauer Latest Victim of POS Malware Attack

Last week the clothing retailer Eddie Bauer LLC issued a press release to announce that its point of sale (“POS”) system at retail stores was compromised by malware for more than six months earlier this year. The...more

8/23/2016 - Cybersecurity Data Breach Malware Point of Sale Terminals Retail Sales State Data Breach Notification Statutes

FinTech Companies Face Big Privacy Challenges in 2016

According to the FBI, “there are only two types of companies: those that have been hacked and those that will be.” It does not take an actual data breach, however, for a company to be liable for its data security practices. ...more

7/20/2016 - CFPB Cybersecurity Data Breach Data Collection Data Privacy Data Security Dwolla FinTech FTC v Wyndham Hackers Personal Data Privacy Laws

EU Adopts Cybersecurity Directive: What US Companies Need to Know

Not all the news coming out of Europe these days is about Brexit. In fact, the forces of unity and harmonization remain a top priority for European regulators hoping to combat digital security threats and create a safer and...more

7/11/2016 - Amazon Cyber Incident Reporting Cyber Threats Cybersecurity Digital Service Providers Digital Single Market eBay EU European Commission Google International Harmonization Member State Multinationals Network and Information Security Directive Operators of Essential Services

Colorado Student Data Privacy Bill – What EdTech software providers need to know

Colorado is the latest state to revisit, and expand upon, its laws pertaining to the use and protection of student data. Colorado Governor John Hickenlooper recently signed into law House Bill 16-1423 (the “Bill”) designed to...more

6/28/2016 - Cybersecurity Data Collection Data Protection Data Security Educational Institutions Personally Identifiable Information Public Schools Software Student Privacy

“Interim” No More: DHS and DOJ Publish Final CISA Guidance on Cybersecurity Sharing

The Department of Homeland Security (DHS) and the Department of Justice (DOJ) have issued the long-awaited final procedures for both Federal and Non-Federal Entities under the Cybersecurity Information Sharing Act (CISA)...more

6/20/2016 - Cyber Threats Cybersecurity Cybersecurity Information Sharing Act (CISA) DHS DOJ Information Sharing Private Sector

PCI DSS 3.2: It’s here, what does it mean for you?

The Payment Card Industry Security Standards Council (PCI SSC) has released a new version of its data security standard for the protection of cardholder data, the Payment Card Industry Data Security Standard (PCI DSS). PCI...more

5/9/2016 - Cyber Attacks Cybersecurity Data Security Debit and Credit Card Transactions Fraudulent Charges PCI-DSS Standard SSL

State Data Security Breach Notification Laws - April 2016

The general definition of “personal information” used in the majority of statutes is: An individual’s first name or first initial and last name plus one or more of the following data elements: (i) Social Security number, (ii)...more

4/4/2016 - Breach Notification Rule Corporate Counsel Cybersecurity Data Breach Data Security Personally Identifiable Information Popular Young Lawyers

CISA Guidelines: Privacy and Civil Liberties Interim Guidelines for Federal Agencies

Last week, we discussed the Federal government’s first steps toward implementing the Cybersecurity Information Sharing Act (CISA). Among the guidance documents released by the Department of Homeland Security and the...more

3/2/2016 - Cybersecurity Cybersecurity Information Sharing Act (CISA) Fair Information Practice Principles (FIPPs) Information Sharing Transparency

California by the Numbers (Part 1): 24 Million Compromised in 2015

California Attorney General Kamala Harris has released a report of the data breaches that have been reported to her office from 2012 until 2015. Although the California data breach notification law took effect in 2003,...more

2/27/2016 - Attorney Generals Cybersecurity Data Breach Data Protection Hackers Kamala Harris Malware Social Security Numbers

California by the Numbers (Part 2): How to Stay out of the 2017 Report

Receently, we reviewed the staggering numbers in California Attorney General Kamala Harris’ 2016 Data Breach Report. In addition to providing a comprehensive analysis of four years of data breaches, the report provides...more

2/26/2016 - Annual Reports Attorney Generals Cybersecurity Data Breach Data Protection Kamala Harris

Cybersecurity Tops SEC Office of Compliance Inspections 2016 Examination Priorities

The 2016 lists are starting to be released by regulatory agencies in the United States, giving a heads’ up to covered entities as to what compliance issues will take front and center this year. Once again, the Office of...more

1/13/2016 - Broker-Dealer Cybersecurity Investment Adviser OCIE SEC SEC Examination Priorities

The Problem With Data Security is not the Hardware or the Software, It’s the Wetware

Remember this? - “Wetware” – coder slang for biological life forms (i.e., people) – is the weak link in most companies’ data security protections, according to a new data security report issued by the Association of...more

1/13/2016 - Cybersecurity Data Breach Data Security Employee Training Popular

Happy New Year – Cybersecurity Information Sharing Act

Just at the end of 2015, the Cybersecurity Information Sharing Act (CISA) was enacted into law as part of the omnibus spending measure passed by Congress and signed by President Obama at right before Christmas. The...more

1/5/2016 - CISA Cybersecurity DHS ECPA Information Sharing Private Sector Repeal

Data Breach Planning in 10 Easy Steps: How to Think Like A Litigator

For the first Tuesday in November, we have 10 easy steps to make sure that your data breach incident response planning is viewed from that pesky point of view of a litigator....more

11/3/2015 - Cyber Incident Reporting Cybersecurity Data Breach Data Breach Plans Data Privacy Data Protection Data Security Email Policies Personally Identifiable Information Popular Tone At The Top Training

5 Popular Cybersecurity Writers to Follow Right Now

For your convenience, a short list of JD Supra writers covering the myriad issues raised surrounding Cybersecurity, date privacy and protection, and related matters. ...more

10/23/2015 - Corporate Counsel Cybersecurity Data Breach Data Protection Popular

Privacy Tuesday – August 24, 2015 – FTC vs. Wyndham Update

Rather than our usual Privacy Monday “bits and bytes,” we have a breaking story relating to the ongoing Wyndham/FTC saga. Today, Wyndham Worldwide Corp. lost a critical round in the Third Circuit. Anticipated since...more

8/25/2015 - Best Practices Credit Cards Cybersecurity Data Breach Data Privacy Data Security FTC FTC Act FTC v Wyndham Personally Identifiable Information Section 5 Unfair or Deceptive Trade Practices Wyndham

Privacy Tuesday – August 2015

While you enjoy what is left of the summer of 2015, we will kick off your week with a few privacy and security bits and bytes....more

8/4/2015 - Cyber Threats Cybersecurity Data Privacy Data Protection Data Security FDA Hackers Healthcare Facilities Hospitals Medical Devices NAIC Nursing Homes Personally Identifiable Information

Privacy Monday – July 2015

Welcome to the dog days of summer 2015. Three privacy & security bits and bytes to start your week (if you are reading this on vacation … good for you!) 1. ICYMI: Massive Data Breach at OPM Claims Victim — The Director...more

7/14/2015 - China Cyber Attacks Cyber Threats Cybersecurity Cybertheft Data Breach Data Protection Office of Personnel Management (OPM) Personally Identifiable Information Russia Third-Party United Nations

Privacy Tuesday – June 2015

It’s appropriate that the “boys of summer” feature prominently in today’s post. Strike three for the St. Louis Cardinals? On another summer Privacy Monday in 2014, we made note of a reported hack into the Houston...more

6/23/2015 - Books & Records Cyber Attacks Cybersecurity Data Breach Data Protection Home Depot Houston Astros

93 Results
|
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×