Business Organization Privacy Communications & Media

Read Business Organization updates, alerts, news, and legal analysis from leading lawyers and law firms:
News & Analysis as of

The New Russian Data Protection Law: Five Important Things To Know

Early in July 2014, the Russian Federal Act on Data Protection was amended to require that personal data of Russian citizens be first processed and stored on servers located within the territory of Russia. Initially, the...more

Media Query Call on Line 1: Do’s and Don’ts from an Information Security Officer

Putting your organization’s name in the paper can be a boon to both your business and your career. The ego stroke isn’t bad either; it can be quite a jolt to see your name in a trade or general news publication for the first...more

9 Things Employees Should Do to Prevent Data Breaches

Avoiding employee mistakes that lead to inadvertent failures will free up valuable resources to fight the bad guys—and may save your job. ...more

Government Websites With Cybersecurity Tips & Information

As part of the government’s recent clarion call to improve our individual and collective cybersecurity posture, several federal and state agencies have released a variety of guidelines, frameworks, best practices and tips. ...more

Fines Issued for Transfer of Customer Data in an M&A Asset Deal

Recent enforcement actions by the Bavarian Data Protection Authority (DPA) [Bayerisches Landesamt für Datenschutzaufsicht] highlight the importance of severe restrictions placed on the transfer of such data, even in the...more

Popular Cybersecurity Reads on JD Supra

Once more the breach? A recap of some of the most well-read Cybsersecurity publications on JD Supra during August, 2015....more

“Pocket-Dial” Mobile Phone Calls: Private or Not?

If you accidentally “pocket dial” someone on your mobile phone, do you have a reasonable expectation of privacy about what’s said in that call? Here’s how courts looked at this issue recently. What Happened? James Huff...more

Popular Cybersecurity Reads on JD Supra

From latest data breach laws to cyber liability insurance to the FTC's consumer data safety guidance ... a recap of popular cybersecurity reads on JD Supra during the second half of July 2015....more

Advertising and Marketing News from Ifrah Law’s, Volume 6

Internet Advertising and Marketing Summer Newsletter from Ifrah Law with updates you won't want to miss!...more

Largest Breach in U.S. Government History Is a Wake-Up Call on Need for Encryption

Employees are reasonable in assuming that their employer is protecting their personal information from compromise. The obvious way to do that is to maintain appropriate encryption technology. Simply put: encryption,...more

Mobile Apps & the Law - Popular Reads on JD Supra

ICYMI a recap of recent well-read posts on JD Supra at the intersection of mobile apps and the law....more

A Deeper Dive: Risk Assessments Are a Necessary Step in Creating Layered Cyber Defenses

Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more

How to Avoid Choosing the Wrong Cybersecurity Firm

Although the inherent nature of cybersecurity radiates urgency, businesses should not let this characteristic dictate the vendor selection process....more

Rise of the Video Vigilantes: Handling Secret Workplace Recordings

Video vigilantes are on the rise, and their recordings can quickly go viral. What should employers do to prepare for, handle and prevent covert recordings made in the workplace? Just a few short years ago HR and...more

BakerHostetler Data Security Incident Response Report Shows Human Error is More Often to Blame

Human error was the number one cause of data security incidents according to a new report released today by the Privacy and Data Protection Team at BakerHostetler. In the incidents that the firm worked on last year, employee...more

Information Sharing Can Help Fortify Your Cybersecurity Strategy

Having strong cybersecurity policies is critical for protecting a company's business, as the amount of commerce conducted over networks and the Internet increases each year. Last month the Congressional Research Service...more

[Event] March Madness: Cyber Liability & Mitigating Risk - Mar. 19, San Diego, CA

The stakes are getting higher regarding cybersecurity. However, there are several steps organizations can take to protect against cybersecurity data breaches. Further, taking these steps can protect companies in the context...more

No Captain at the Helm: Information Governance’s Leadership Problem

Effective information governance is about taking information — your most important business asset — and looking at ways to better leverage it in a manner that streamlines the business processes, and reduces costs and risk....more

Russian Cyberattack May Trigger State Security Laws And Notification Obligations

Now that entities are aware that at least 1.2 billion records have been compromised from websites spanning across all industries, a question arises whether entities have an obligation to investigate whether their websites...more

5 Next Steps For Companies After News of Massive Russian Data Breach

Before taking any action on this latest data breach news out of Russia, there are a number of things to understand....more

The Great Russian Internet Heist – What Now?

A breach of this nature is reportable under the breach notification laws in both California and Florida, as recently amended: “Personal Information” includes user name or email address, in combination with a password or...more

Last Minute Uncertainty for Registered Charities Under Canada’s Anti-Spam Law

Canadian registered charities seeking to comply with Canada’s new anti-spam law (CASL) recently received some disappointing news. CASL is a very complex law and many important issues remain ambiguous and uncertain. Several...more

Popular Reads: On Google, the EU, and the Right to be Forgotten

A recap of most popular writings on the recent European Court Ruling that Google must allow citizens the right to be forgotten....more

When Tech Innovation Outpaces the Law, A Minefield Of Workplace Issues in Social Media

Part of JD Supra's series on innovation and the law. The NLRB has famously struck down employers’ social media policies based on a law that was adopted during the New Deal and has not been amended since....more

The Heartbleed Lesson for All Companies? Manage the Risk...

Threats to data privacy are not going away, but establishing appropriate security measures up-front, performing regular stress-tests on a security system, putting in place procedures to address a data breach and implementing...more

61 Results
View per page
Page: of 3

Follow Business Organization Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.