Business Organization Privacy

Read Business Organization updates, alerts, news, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Tips for Protecting Your Company Against Cyberattacks

Cybersecurity has become, as it should, an extremely important topic on company boards’ agendas. The main question on everyone’s mind is: “How can we eliminate this problem?” The answer, unfortunately, is that you can’t....more

Upping the Ante: Cybersecurity, the SEC and the Perils of Being Unprepared

The U.S. Securities and Exchange Commission is finally getting serious about cybersecurity – and for good reason. If the ever-growing business and headline risks aren’t enough to scare investment advisers and broker-dealers...more

New Bank Examination Procedures for Cybersecurity

There is no more pressing problem facing business organizations today, of all types, than cybersecurity threats. For a highly regulated industry like banking, regulators are watching closely to see how the IT governance...more

Tackling Cybersecurity in the Boardroom: Special M&A Considerations

During Akin Gump Strauss Hauer & Feld LLP’s most recent cybersecurity event, “Tackling Cybersecurity in the Boardroom,” hosted on November 12, 2015, our panels discussed a number of issues facing directors....more

Benchmark surveys: GCs, Executives Not Prepared to Defend Against Cyberbreaches - Key Protective Steps

Although cybersecurity has become a more prominent issue for executives and boards of directors, three recent benchmark surveys - the BDO Board Survey, the 2015 Consero Group’s General Counsel Data Survey, and the 2015 US...more

Weltimmo v Hungarian DPA: Landmark Verdict on the Meaning of “Established”

In the case of Weltimmo s.r.o. v Nemzeti Adatvédelmi és Információszabadság Hatóság, the Court of Justice of the European Union (“CJEU”) handed down a landmark judgment in October 2015 on data protection legislation, tackling...more

California Amends Breach Notification Law: Unique New Refinements and Requirements

The California legislature has again amended the state’s breach notification statutes to impose new and unique requirements and refinements, adding further complexity to the patchwork of breach notification requirements....more

Breaches, Damned Breaches and Their Statistics

Interesting conclusions about data breach costs emerge from two new studies, the 2015 Ponemon Institute’s Cost of Cyber Crime Study: Global and the 2015 NetDiligence® Cyber Claims Study. While the phrase alluded to in our...more

The Schrems Decision: How the End of Safe Harbor Affects Your FCPA Compliance Plan

Like a needle to a balloon, the Schrems decision has drastically altered the data privacy landscape. Who is affected? Everyone – consumers, corporations, employees. But who needs to take action? Any company with offices in...more

Should Your Firm Have a Chief Privacy Officer?

Following the trend in big business, a Pennsylvania law firm has just appointed its first Chief Privacy Officer (CPO). Should your firm consider having such a position? The short answer is: Yes!...more

Financial Services Weekly News - November 2015 #2

Regulatory Developments: CFTC and NFA Staff Publish FAQs and Other Resources for Filing and Reporting on Forms CPO-PQR and CTA-PR - On Nov. 5 the Division of Swap Dealer and Intermediary Oversight of the CFTC...more

Highlights from the FTC’s Second “Start With Security” Initiative

On November 5, the FTC hosted its second “Start With Security” event in Austin, Texas in an effort to provide companies with practical tips and strategies for implementing effective data security....more

Securities and Corporate Governance Litigation Quarterly

Welcome to the fifth issue of Securities and Corporate Governance Litigation Quarterly, Seyfarth’s quarterly publication of the Securities & Financial Litigation Group focusing on decisions or other items of interest for...more

Preview of NAVEX Global’s 2015 Ethics and Compliance Virtual Conference

As 2015 draws to a close (where did the time go?), the 2016 planning season is in full swing. You likely already have an idea of initiatives you’ll want to tackle, but taking your ethics and compliance program to the next...more

Data Breach Planning in 10 Easy Steps: How to Think Like A Litigator

For the first Tuesday in November, we have 10 easy steps to make sure that your data breach incident response planning is viewed from that pesky point of view of a litigator....more

Cybersecurity 2.0: What’s Expected of Federally Regulated Financial Institutions

As federally regulated financial institutions (FRFIs) expand their reliance on technology, employ progressively complicated and interconnected networks and systems, increase their electronic service offerings and collaborate...more

Board Participation in Cybersecurity: What More Needs to Be Done?

High-profile data breaches seem to hit the headlines almost every day. These breaches have proved terrifying for many companies, particularly as the attackers release embarrassing emails and other information. The frequency...more

[Webinar] The New Compliance Challenge: Protecting Confidential Assets From Cyber Threats and Malicious Insiders - Nov. 5th,...

The growing prevalence of cyber-security issues and insider breaches has put information security squarely on the agenda for many corporations – and increasingly in the realm of compliance. In this webinar, we discuss these...more

Cyber-Risks 2015 – A Board Primer

Cyber-risk is a witch’s brew of reputational, operational, legal and financial dangers. This toxic combination exposes a financial institution to a potentially existential hazard when an intrusion occurs. The only way to...more

5 Questions to Ensure Your Policies Keep Up With the Pace of Change

You hear a lot these days about the ways that individuals’ private data is collected and potentially exposed—to technology companies, employers, the government and so on. You hear less about the concern of many employers, who...more

Cybersecurity and Risk Management: “Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers”

A timely new resource for business executives, technology professionals, and lawyers alike is the newly-published Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers from the New York...more

5 Popular Cybersecurity Writers to Follow Right Now

For your convenience, a short list of JD Supra writers covering the myriad issues raised surrounding Cybersecurity, date privacy and protection, and related matters. ...more

Interview: Amy Much - Director, Global Compliance, Under Armour

Protect This House - Amy Much discusses building a compliance program from the ground up at a fast moving, international organization....more

Mintz TechConnect - Octoer 2015

Letter from the Editors - We are thrilled to provide you with the first issue of Mintz Levin’s TechConnect, a bi-monthly newsletter on “all things technology” in the legal and business world, from our perspective, of...more

Data Breaches, Media Relations, and the Bottom Line

Data breaches are crisis moments that business must prepare for in many ways: not just in taking steps at prevention, but also mitigating losses, arranging for business continuity, complying with legal and regulatory...more

379 Results
View per page
Page: of 16

Follow Business Organization Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.