Latest Posts › Cybersecurity

Share:

India’s Digital Personal Data Protection Act 2023 vs. the GDPR: A Comparison

Companies subject to India’s new data protection law should assess practical implications. The Indian parliament enacted India’s first comprehensive data protection law on 11 August 2023, namely the Digital Personal Data...more

Cybersecurity Incidents: 10 Things a General Counsel Must Know About EU Cyber Incidents

Cybersecurity incidents pose legal challenges for in-house counsel, alongside their technical implications. This overview highlights key aspects that legal departments must know when reacting to data breaches. ...more

Swiss Regulator Determines Swiss-US Privacy Shield Is Inadequate

Swiss companies are advised to take additional measures when transferring personal data from Switzerland to the US. On 8 September 2020, the Swiss data protection authority, Adrian Lobsiger (the Federal Data Protection and...more

UK Regulator Imposes Two Substantial Fines for GDPR Data Breaches

The ICO issued notices of intent to fine British Airways and Marriott. What happened? On 8 July 2019, the UK Information Commissioner’s Office (ICO) announced a notice of intent to fine British Airways £183.39 million (about...more

National Cyber Security Centre Releases NIS Directive Guidance

The UK agency’s principles-based guidance on cybersecurity for OES adds important detail to NIS Directive obligations. The National Cyber Security Centre (NCSC) has published introductory guidance for operators of...more

Cybersecurity: UK Government Releases Response to Public Consultation on NIS Directive

Proposed changes provide indication of the yet-to-be-published contents of the NIS Directive’s implementing regulation. The UK government moved closer to implementing the Security of Network and Information Systems...more

Cyber Risk a Modern Concern for M&A Dealmakers

Amid a growing number of high-profile corporate data breaches, cybersecurity is now a key issue for strategic acquirers. Thehack of Yahoo, which came to light midway through its 2016 takeover by Verizon, resulted in a US$350...more

Buyout Firms Must Take Action to Respond to Global Cyber Threats

Cybercrime has become a critical issue for buyout firms as hackers are increasingly targeting sensitive business data to profit from insider knowledge. According to a Private Funds Management survey of 91 PE houses, 54% of PE...more

China Issues Its First Network Security Law

The Standing Committee of the National People’s Congress of the People’s Republic of China (PRC) has introduced China’s first and comprehensive Network Security Law (also referred to as Cybersecurity Law). The law will have...more

China Issues Its First Network Security Law

The law will have far-reaching implications for parties that utilize the Internet and handle network data and personal information in the PRC. On November 7, 2016, the Standing Committee of the National People’s Congress...more

Prevent and Prepare for a Cybersecurity Breach

Hacking of organizations’ systems is becoming increasingly commonplace, even with advancements in security practices. To mitigate risk, a company must have an enterprise-level, cross-functional incident response plan that is...more

Mitigating Cybersecurity Risks

Hacking of organisations’ systems is becoming increasingly commonplace, even with advancements in security practices. To mitigate risk, a company must have an enterprise-level, cross-functional incident response plan that is...more

5 Preventative Steps to Manage Legal Risk Following a Cybersecurity Breach

Preparing for and rehearsing how to respond to a breach is as important as improving security systems and protocols. Hacking of organizations’ systems is becoming increasingly commonplace, even with advancements in...more

The General Counsel’s Role Before and After a Data Breach Incident

“It is often said that there are two kinds of companies out there — those that have suffered a data breach and those that will have one,” said Latham & Watkins partner Kevin Boyle. “So it makes a lot of sense to be prepared...more

5 Ways to Protect your Business from a Cyber Attack

Global cyber-attack threats stand at the highest ever recorded level, jumping 14 percent from 2012 to 2013 (Cisco 2014 Annual Security Report). Furthermore, a recent Microsoft Security Intelligence Report found that operating...more

Cybercrime Loses Its Right to Silence

In 2012, the director gen¬eral of MI5 revealed that a London-listed company had lost £800 million as a result of a state-backed cyber at¬tack. The company in question has not been publicly identified and no disclosures were...more

Looking Outside the Prism: How Safe are Data Transfers?

When former NSA contractor, Edward Snowden, leaked documents disclosing the NSA’s mass surveillance programme, known as PRISM, he re-invigorated the debate on, and the media interest in, the validity of the current safeguards...more

17 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide