News & Analysis as of

General Business Criminal Law Privacy

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.

InterContinental Hotels Reports Credit Card Breach

InterContinental Hotels Group (IHG) has reported a data breach of its payment card processing system. The breach involves malware that infected certain locations between September 29, 2016, and December 29, 2016. The malware...more

[Webinar] Business E-mail Compromise Scams - Practical Perspectives - January 12th, 10:30am EST

by Locke Lord LLP on

An increasing number of businesses are targeted by very sophisticated email scams designed to convince company employees responsible for executing financial transactions to wire funds to overseas accounts controlled by...more

Large Majority of Businesses Pay to Unlock Ransomware

2016 has been a banner year for ransomware cybercriminals. We have seen a dramatic rise in the use of ransomware, and businesses continue to become victims to ransomware, primarily through phishing and spear phishing schemes....more

Gym members shocked as Fitness First installs CCTV cameras in changing rooms

by Hassan Elhais on

DUBAI // The operator of a gymnasium chain has installed security cameras in changing areas, sparking anger from members and warnings that it could be breaking the law. Customers of Fitness First Middle East’s gym...more

High Court Permits University’s Contravention of Its Own Privacy Policy

by Reed Smith on

The High Court in Bangura v Loughborough University [2016] EWHC 1503 (QB) ruled 19 May that Loughborough University acted lawfully under the Data Protection Act 1998 (“DPA”) in supplying Leicestershire Police with the...more

Ransomware Update: The FBI Weighs In

The FBI recently released an article discussing the spate of ransomware attacks on a variety of different entities, including hospitals. In the article, the FBI warned that ransomware attacks and the cybercriminals carrying...more

Ransomware: Electronic Extortion for a Digital Era

by Butler Snow LLP on

Last month, the FBI asked the American Bar Association to share a cyberalert with its members warning of an increased risk of ransomware. Ransomware poses significant legal and operational risks to businesses. Personnel at...more

The Scariest Hack So Far

Hackers have upped the ante. Data controllers wax fondly about the good old days when data was outright stolen. Back then, in 2013, there was a sense of fair play. Trolls did troll things. Assuming the victim implemented and...more

English court compels investigators to disclose information on data protection grounds

by White & Case LLP on

The High Court has ruled that a company conducting an investigation may be compelled to give effect to requests for information made under data protection legislation. The case serves as a stark reminder that data protection...more

When Attorneys General Attack: Cybersecurity Investigations and Related Insurance Coverage Issues

Are criminal cyberattacks increasing in sophistication and frequency? Yes. Is every company, in every industry, that collects or stores sensitive customer, employee, or business data vulnerable to cyberattacks?...more

Phishing Season Opens for 2016 Tax Filings – Beware of “W-2 Phishing Scams”

by K&L Gates LLP on

Tax season brings many headaches, but none as miserable as sophisticated scammer efforts to steal employee W-2 information. Using social engineering and modest technological tools, a “spear phishing” attack seeks to trick...more

The California Electronic Communications Privacy Act – California Takes the Lead on Digital Privacy in the U.S.

California, home of many of the world’s largest technology companies, has long been at the forefront of protecting personal electronic information in the United States. California adopted the nation’s first data breach...more

Appellate Court Notes

by Pullman & Comley, LLC on

Supreme Court Advance Release Opinions: SC19253 - RBC Nice Bearings, Inc. v. SKF USA, Inc. [An important decision on contract waiver but one all attorneys should recall from the UCC or Contracts course we took...more

Insider Trading Hack was Cinematic in Scope

by Cozen O'Connor on

The U.S. Department of Justice announced indictments in Brooklyn and New Jersey last month of 32 people for fraudulently obtaining inside information and then using that knowledge to make millions in the market, in the...more

The Justice Department Has Some Things to Tell You about Cybersecurity

by Brooks Pierce on

In April the Justice Department’s Computer Crime and Intellectual Property Section issued its Best Practices for Victim Response and Reporting of Cyber Incidents. It is an excellent guide for a business organization to...more

Supreme Court Strikes Down Law That Required Hotels To Comply With Warrantless Police Requests For Guest Registries

by Jaburg Wilk on

On June 22, 2015, in a 5-4 ruling, the U.S. Supreme Court in City of Los Angeles v. Patel struck down a Los Angeles Municipal Code that required hotel operators to provide guest registries to police upon demand, and without a...more

Breaking Down the DOJ Cybersecurity Unit’s Guidance on Responding to Cyberattacks

Another federal agency has weighed in with “guidance” on cybersecurity preparation and breach response. The Department of Justice (DOJ) is the latest to issue guidance on how companies should respond to data breaches. The...more

DOJ Cybersecurity Unit Releases “Best Practices” For Cyber Breaches

by McGuireWoods LLP on

Last week, in conjunction with the Criminal Division’s Cybersecurity Industry Roundtable, the U.S. Department of Justice released its “Best Practices” guide for preparing for and responding to a cyber incident....more

Two Regulatory Crises

by Brooks Pierce on

It strikes me that two civil regulators are facing dire attacks on aspects of their enforcement programs – both in different U.S. Courts of Appeals – at the same time. Both of these attacks arise out of generalized statutes...more

Guard Your Sheep, The Dyre Wolf is Coming

by Butler Snow LLP on

IBM announced this week that it had uncovered a highly-sophisticated scheme to steal funds from medium to large U.S.-based companies. The scheme dubbed “The Dyre Wolf” only targets companies, unlike past schemes which also...more

Cyber Extortion: What to Do When Your Data is Being Held for Ransom

by Mintz Levin on

Imagine you are the IT systems administrator of a large corporation. Coffee in hand, you sit down one morning and log in. You receive a message that there has been an intrusion into the corporate database, a large amount of...more

International Fraud & Asset Tracing (3rd Edition), France

by Latham & Watkins LLP on

In this Guide: - Introduction - Managing the Internal Investigation - Disclosure from Third Parties - Steps to Preserve Assets/Documents - Civil Proceedings - Anti-Bribery/Anti-Corruption Legislation -...more

Recorded Conversations with In-House Counsel Permitted as Evidence in FCPA Trial

Earlier this month, a federal judge in New Jersey held that a secretly recorded conversation between a former chief executive officer and his general counsel may be used by prosecutors as evidence against the former executive...more

Civil Antitrust Attorneys Receive Wire-Tap Evidence

The Canada Supreme Court ruled earlier this month that civil antitrust plaintiffs may receive wire-tap evidence obtained in the criminal investigation into an alleged price-fixing scheme by several large gas companies. During...more

Making UK Employees Aware of the Perils of Pilfering Their Employers' Confidential Information

by Dechert LLP on

Employers need to appreciate and address the fact that employees who remove their employers’ confidential information often do not appear to appreciate the risks of being caught or the potentially very serious consequences of...more

59 Results
|
View per page
Page: of 3
Cybersecurity

Follow General Business Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!