News & Analysis as of

Business Organization Privacy Labor & Employment

Read Business Organization updates, alerts, news, and legal analysis from leading lawyers and law firms:

Gavel to Gavel: Preventing data breaches

by McAfee & Taft on

The risk data breaches and cyberattacks pose to small businesses cannot be overstated. Roughly half experienced a breach within the past year at an average cost of $665,000 and immeasurable lost revenue. Worse yet,...more

Organizing Data Privacy Within A Company

by Bryan Cave on

Although organizations have dealt with privacy issues for years, only in the past decade have they begun to view the complexities of privacy as requiring formal organizational structure, dedicated employees, and/or dedicated...more

Compliance’s Role in Preventing the Next “WannaCry” Cyberattack

by NAVEX Global on

The global chaos unleashed by the WannaCry ransomware virus reinforces that cyberattacks are not just the problem of IT departments. Compliance must play an integral part of any organization’s cross-functional cybersecurity...more

Real Answers to Common Questions on Cybersecurity

by NAVEX Global on

Q: In my company, the IT directors see cybersecurity as an IT and software issue to be solved with software and hardware. How do I convince the team that employees need to also be trained on risky behavior – something that...more

Identifying and Managing Corporate Risk from Internal and External Stressors

by Tucker Arensberg, P.C. on

I’ve been asked the same simple question time and time again by clients who are faced with litigation – How did this happen? Sometimes they are referring to a looming dispute over large accounts receivable, employee...more

Keeping Your Company’s Data Safe This Tax Season

by Latham & Watkins LLP on

Tax-related identity theft is nothing new, but tax season 2016 took tax schemes to a new level. Last year, our cyber experts advised a large cluster of clients (public and private companies) over a period of only two...more

Privacy Perils: Social Engineering Fraud - the C-Suite Maneuver

by Bass, Berry & Sims PLC on

It's a common misconception that cyber-criminals use sophisticated technical tools to hack into a person's computer or online accounts. More often than not, cyber attackers use old fashioned trickery or "social engineering"...more

Gone Phishing: IRS Warns Businesses of Tax Season W-2 Phishing Scam

by Benesch on

Tax season is upon us, and as millions of people nationwide are preparing to file their tax returns, the Internal Revenue Services (IRS) has issued an urgent warning regarding a recurring e-mail phishing scheme targeting...more

Data Privacy and Security: A Practical Guide for In-House Counsel, 2017 Edition

by Bryan Cave on

Boulder Partner David Zetoony published the 2017 edition of his handbook, Data Privacy and Security: A Practical Guide for In-House Counsel, on Jan. 28 – Data Privacy Day. The guide provides an overview of laws relevant to a...more

W-2 Phishing Scammers Are Targeting Tech Companies

The W-2 phishing scams are back. Fraudsters have learned that W-2 phishing scams can be highly effective when targeting businesses while they are handling and sending employee income-tax-related documents early in a new year....more

Top 10 for 2017 – Happy Data Privacy Day

by Jackson Lewis P.C. on

In honor of Data Privacy Day, we provide the following “Top 10 for 2017.”  While the list is by no means exhaustive, it does provide some hot topics for organizations to consider in 2017. ...more

Compliance Role in Mitigating Cyber Mayhem

by NAVEX Global on

In recent years, attention has been drawn to the impact of cyber and data breaches and the extent to which our organizations remain vulnerable to these threats. The cost of cyber and data security breaches is well known and...more

In Case You Missed It: Launch Links - September, 2016 #4

by WilmerHale on

Some interesting links we found across the web this week: The Hacking Law That Can’t Hack It - For 30 years and counting, courts have struggled with the vagaries of the Computer Fraud and Abuse Act, a federal law...more

Organizing Data Privacy Within A Company

by Bryan Cave on

Although organizations have dealt with privacy issues for years, only in the past decade have they begun to view the complexities of privacy as requiring formal organizational structure, dedicated employees, and/or dedicated...more

How to Respond to National Security Letters That Ask for Personal Information

by Bryan Cave on

National Security Letters (“NSLs”) refer to a collection of statutes that authorize certain government agencies to obtain information and simultaneously impose a secrecy obligation upon the recipient of the letter. Four...more

Brexit – What Now For Your Business

So, the UK has voted to leave the EU. Everyone has their own opinion and we’ve all seen the news reports and various viewpoints but what does this result mean for you in practical terms and where do we go from here? Orrick’s...more

[Event] CLE for In-House Counsel - A 2016 Update on Current Issues Relating to Your Business - June 2nd, Chicago, Ill

by Locke Lord LLP on

Please join us for a complimentary CLE seminar on current issues affecting your business. Taught by leading practitioners at Locke Lord, the seminar offers three hours of CLE credit, including one hour of Professional...more

Media, Sport and Entertainment Intelligence - May 2016

by DLA Piper on

Welcome to the latest issue of Media, Sport and Entertainment Intelligence, offering you a selection of the latest and most impactful sector news worldwide. ...more

Reports Reveal Four Cyber Security Trends—and the Need for Better Cyber Security Training & Awareness

by NAVEX Global on

As cyber security issues continue to escalate and evolve, compliance officers have more opportunities to better protect and defend their organizations from cyber risk. One of compliance officers’ responsibilities is to stay...more

Preparing Your Organization Today to Win Its Future (Possibly Inevitable) Cyber Lawsuit: Making Crown Jewels Out of Paper

One day in the not too distant future, your organization may be fighting to protect its balance sheet against high-stakes claims in a cyber tort trial. Arrayed against you will be the best of the class action plaintiff’s...more

Benefits of using thin and zero client’s vs desktop PC’s

What are “thin clients” and their close cousins “zero client devices”? You probably have a desktop computer or laptop computer at work and all the software you use is installed on that computer. Although your data is...more

HR Departments Beware: Major Tax Season Phishing Scheme Claims Multiple Victims

by Fisher Phillips on

Another new phishing scheme has tricked numerous employers into disclosing highly sensitive, employee information. In the wake of tax season, spoofing emails were sent to payroll and human resource personnel at various...more

Agreement on Safe Harbor Replacement, the New EU-U.S. Privacy Shield: Considerations for HR Departments

by McGuireWoods LLP on

Our winter 2016 edition of the Employment Law Briefing Newsletter discussed the implications of the Court of Justice of the European Union’s (CJEU’s) decision to invalidate the Safe Harbor framework. Concern about the lack of...more

The Problem With Data Security is not the Hardware or the Software, It’s the Wetware

Remember this? - “Wetware” – coder slang for biological life forms (i.e., people) – is the weak link in most companies’ data security protections, according to a new data security report issued by the Association of...more

Legal Issues Business Leaders Need to Know in 2016

by Arnall Golden Gregory LLP on

A compilation of time-sensitive and trending legal and regulatory issues that general counsels and business leaders should be aware of in 2016. ...more

73 Results
|
View per page
Page: of 3
Cybersecurity

Follow Business Organization Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.