Latest Posts › Data Breach

Share:

Mark Your Calendars: NY Cybersecurity Regulations to Go into Effect

A covered entity will need to arrange for someone to perform the CISO function, dedicate resources to conduct periodic risk assessments, develop and implement policies and procedures, and retain appropriate personnel and...more

HR Data Security in the Spotlight

Cloud computing has the potential to provide on-demand efficiency, lower costs and flexibility for HR functions. However, it is important to manage a number of data privacy and security issues to protect sensitive HR data in...more

How to Avoid and Respond to a Cybersecurity Breach

In light of numerous recent data breaches, cybersecurity has emerged as an issue impacting organizations ranging from the local hardware store to the largest multi-national firms in the world. In short, no industry is immune...more

Is Your Financial Institution the Next Target of a Cyber-Attack?

In This Presentation: - Regulatory expectations for financial institutions - Risks for financial institutions - Planning to reduce risks - The Breach - Duties and responsibilities -...more

Lack of Typicality and Adequacy of Representation Prevents Class Certification in Health Care Data Breach

The opinion from the Philadelphia Court of Common Pleas reinforces lack of standing as a defense for companies facing data breach–related class actions. On March 25, the Philadelphia Court of Common Pleas provided...more

California Data Breaches Require Identity Protection Services

California has long set the standard for protection of its residents’ personal information. California’s constitution explicitly recognizes a right to individual privacy and California’s legislature has been on the forefront...more

Connecticut Supreme Court Allows Plaintiffs to Circumvent HIPAA’s No Private Right of Action Clause

In an opinion released on November 11, the Connecticut Supreme Court ruled on whether the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and its implementing regulations preempt a common law claim for...more

California Data Breaches Require Identity Protection Services (and More)

On September 30, 2014, Gov. Edmund G. Brown signed AB 1710 into law, amending existing law to impose even stricter regulation on businesses with access to personal information about California residents. California has long...more

Ignoring XP End Of Life May Make Your Company An Attractive Target

On April 8, Microsoft officially ended all support and ceased providing updates for their Windows XP operating system. This “end of life” (EOL) announcement is not uncommon with software platforms, where continued support of...more

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately  [Video]

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

The Reports Of The Death Of Privacy Were Exaggerated: California Breathes New Life Into The Privacy Rights Of Its Residents

In a series of new bills amending existing California privacy laws, the State of California increases the protections presently provided to its residents by broadening the requirements for reporting breach of personal data;...more

Partly Cloudy With A Chance Of Data Breach

A report recently published by NIST sets forth steps federal agencies and the private sector providers who cater to them need to take to ensure the security of data stored and processed in the cloud....more

California Attorney General’s Report Reveals Millions Affected By Data Breaches In 2012

A report recently issued by the California Attorney General reveals that millions of Californians were the victims of a data breach in 2012, mostly due to intentional intrusions by outsiders or by unauthorized insiders....more

De-Identifying Protected Health Information: OCR Issues Long-Awaited Guidance

The HIPAA Privacy Rule is intended to protect individually identifiable health information by limiting its use and disclosure. But the Privacy Rule expressly permits the de-identification of that information, and in doing so...more

15 Results
/
View per page
Page: of 1

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!