Latest Publications

Share:

So…Everyone’s Been Compromised? What To Do In The Wake Of The Equifax Breach

By now, you’ve probably heard that over 143 million records containing highly sensitive personal information have been compromised in the Equifax data breach. With numbers exceeding 40% of the population of the United States...more

More Companies Must Comply with the Gramm-Leach-Bliley Act, But Don’t Know It. Are You One of Them?

When the topic of data privacy and cyber security comes up, most people automatically think of data breaches, especially given the high-profile nature of so many of them. Breaches and hacks are certainly an issue about which...more

Analysis: Cyber-Monitoring: The Next Frontier

Cybersecurity is “hot” and will stay “hot” for corporations, executives, regulators, law enforcement and legislators. Rarely is there a corporate compliance discussion in 2017 where cyber isn’t “the” topic or a material part...more

Did Data Scraping Just Get A Tiny Bit Safer?

Is it okay to scrape data from another website? This is a frequently asked question that almost always leads to an ambiguous and equivocal answer. Legal practitioners are quick to point out the risks of civil and criminal...more

Website Operators In or Targeting Nevada, You Have Privacy Policies To Implement by October 1, 2017

As of October 1, 2017, Nevada will join California and Delaware to require the operators of certain websites and online services to post a notice on their website informing users about their privacy practices....more

Phishing Lures: What To Do If You’ve Taken The Bait - U.S. Version

Sometimes, it’s easy to know you’re being phished. There’s little chance that a bank administrator in a country you’ve never heard of really needs your help to get the unclaimed money of a deceased, rich foreigner out of the...more

Tennessee Adds Technical Requirements To Its Data Breach Notification Laws

Are you doing business in Tennessee? Do you have computerized personal information about anyone in Tennessee (including employees, clients, or customers)? Are you encrypting that data in accordance with the current version of...more

Analysis: Cyber-Monitoring: The Next Frontier

Cybersecurity is “hot” and will stay “hot” for corporations, executives, regulators, law enforcement and legislators. Rarely is there a corporate compliance discussion in 2017 where cyber isn’t “the” topic or a material part...more

8 Results
/
View per page
Page: of 1

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.