Business Organization Privacy Science, Computers & Technology

Read Business Organization updates, alerts, news, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Goal? Identify Rogue Employees Before They Misbehave. Means? Computer Algorithm. Impact? TBD...

In an attempt to weed out bad actors before they act, JPMorgan Chase & Co. is implementing a computer surveillance program to identify potential problem employees. Here's a legal perspective on the initiative from Keith...more

Cyber Security Regulations Ahead Says New York State’s Dept. of Financial Services

Based on a report released last week about cyber security vulnerabilities faced by financial institutions, New York State Department of Financial Services (“NYDFS”) Superintendent Benjamin Lawsky signaled that the agency will...more

The Evolving U.S. Cybersecurity Landscape: What Firms Want to Know

Following a year of high-profile data breaches, the Securities and Exchange Commission (SEC) announced on January 13, 2015 that, for the second consecutive year, its Office of Compliance Inspections and Examinations (OCIE)...more

Data Privacy and Security Considerations in M&A Transactions

By some estimates, cybercrime costs the global economy $445 billion annually. If cybercrime were a single country, this dollar amount would place it within the world’s top 30 countries in terms of gross domestic product, and...more

Two Oft-Neglected Cybersecurity Protections

With each passing year, cybercrime moves further into the mainstream of public company existence. What until recently was mostly an annoying, abstract concern for a handful of companies is now a daily menace that impacts...more

Into the Breach: Tips for Effectively Partnering With Outside Counsel in the Data Breach Planning Process

Target recently announced that the total cost of its data breach response efforts since late 2013 now exceeds $252 million (approximately $90 million of that has been offset by insurance proceeds). Such news, particularly...more

Cyber Incident/Data Breach Response: Your emergency Checklist

The first 24 hours after you discover a data breach are critical to restoring security, minimising harm, obtaining and preserving evidence and complying with contractual and legal obligations. This Emergency Checklist...more

Information Sharing Can Help Fortify Your Cybersecurity Strategy

Having strong cybersecurity policies is critical for protecting a company's business, as the amount of commerce conducted over networks and the Internet increases each year. Last month the Congressional Research Service...more

Securities and Exchange Commission: Critical Issues Facing Public Companies

Latham & Watkins partners William Baker, Alexander Cohen, Joel Trotter and Lawrence West hosted a webcast “Securities and Exchange Commission: Critical Issues Facing Public Companies.” Topics discussed included the increasing...more

Toysmart Pt. Deux

An auction of RadioShack assets which concluded this week included the names and physical addresses of 65 million customers and email addresses of 13 million customers. The auction result and transfer of assets is still...more

Effective cybersecurity: 8 questions for you and your team

Cybersecurity has become a top-tier risk for US and multinational organizations. It is only a matter of time before a determined hacker will penetrate your organization’s system and successfully exfiltrate some data. (Indeed,...more

FINRA Issues Report on Cybersecurity Practices

Following up on our post from last week on the SEC’s cybersecurity exam sweep, you should also know about FINRA’s recent report on this area. Last month, FINRA published a Report on Cybersecurity Practices that really could...more

Too Small to be Hacked?

We are not the size of Target or Home Depot, we won’t be a target of cyber-attack. This is a dangerous assumption. Recently reported in the news was that ISIL (a terrorist organization) had hacked and taken over certain...more

[Event] March Madness: Cyber Liability & Mitigating Risk - Mar. 19, San Diego, CA

The stakes are getting higher regarding cybersecurity. However, there are several steps organizations can take to protect against cybersecurity data breaches. Further, taking these steps can protect companies in the context...more

Reps. Burgess, Blackburn and Welch Release Data Breach Bill

On Thursday, March 12, 2015, House Energy & Commerce Subcommittee on Commerce, Manufacturing, and Trade Chairman Michael Burgess (R-TX), along with Reps. Marsha Blackburn (R-TN) and Peter Welch (D-VT), released draft text of...more

President Obama’s Proposed Privacy Bill of Rights - Part 6: FTC Enforcement Powers

In this post, we look at the additional powers given to the Federal Trade Commission (FTC) to enforce the Consumer Privacy Bill of Rights (CPBR) and what it may mean for the agency that already enjoys significant authority to...more

No Captain at the Helm: Information Governance’s Leadership Problem

Effective information governance is about taking information — your most important business asset — and looking at ways to better leverage it in a manner that streamlines the business processes, and reduces costs and risk....more

SEC’s Risk Alert Offers Observations on Cybersecurity

Why it matters - Joining a growing chorus of regulators, the Securities and Exchange Commission (SEC) released two publications addressing cybersecurity: a Risk Alert based on observations from the Office of Compliance...more

Board Oversight of Cyberrisks: Directors and Officers Litigation

The duty of a board to monitor and oversee organizational risk includes cyberrisks. As cyberrisks and incidents proliferate, boards are seeking to enhance the information they receive about cyberrisks and incidents. One...more

Breaches in the Boardroom: What Directors and Officers can do to Reduce the Risk of Personal Liability for Data Security Breaches

Corporate directors and officers may increasingly be targets of shareholder derivative lawsuits in the wake of the surge of regulatory actions and private litigation around data breaches,. While no individual directors and...more

What Obama's Proposed Anti-Hacking Legislation Means for Entrepreneurs

The slew of highly publicized data breaches over the past few years has brought the issue of cyber-security truly to the mainstream -- most recently reaching our living rooms through President Barack Obama’s State of the...more

Department Of Health And Human Services Issues Proposed New Rules Implicating The Use Of Electronic Health Records And Patient...

On December 8, 2014, the U.S. Department of Health and Human Services (“HHS”) issued a proposed rule related to changes to the Medicare Shared Savings Program. These revisions promote the use of electronic health records by...more

Data Privacy: The Next Frontier of Corporate Compliance [Video]

Companies are collecting more and more personal data. With that collection is an increased responsibility and the potential for more government regulation. Attorneys Rick Martinez and Seth Northrop discuss the changes that...more

Delaware Data Destruction Law Highlights the Necessity of Data Destruction Plans

The list of states requiring the disposal or destruction of personal data is growing, and companies need to respond accordingly by adopting data destruction plans. Delaware recently became the latest in a series of states to...more

The Uber Playbook: 5 Best Practices for Protecting Data Privacy

The risks are significant if managing sensitive data is not part of a proactive plan—the consequences can include penalties, sanctions and reputational damage....more

132 Results
|
View per page
Page: of 6

Follow Business Organization Updates on:

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×