News & Analysis as of

General Business Privacy

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.

Lawmakers Push FCC To Confront Cell Phone Cyber Threats

by King & Spalding on

In a letter dated March 28, 2017, Senator Ron Wyden, D-Ore., and Representative Ted Lieu, D-Calif., urged the Federal Communications Commission (“FCC”) to address cybersecurity vulnerabilities in the cell phone industry,...more

China's new cyber security law is only 6 weeks away

by DLA Piper on

7 THINGS YOU NEED TO KNOW - Regulation of personal and business data and restrictions on your ability to transfer it out of China is set to become a reality on 1 June 2017 when the PRC Cybersecurity Law comes into...more

Data Privacy and Security Legal Reform, and Plaintiffs’ Bar White Paper the Focus of IAPP Panel

by Reed Smith on

A panel on legal reform in the area of privacy and data security at this week’s IAPP Summit provided an opportunity for a discussion between businesses and regulators, as well as for the launch of a white paper on the...more

Deeper Dive: Protecting Paper Records

by BakerHostetler on

Our third annual BakerHostetler Data Security Incident Response Report analyzes the more than 450 data security incidents we led clients through in 2016, and includes a number of interesting trends relating to the causes of...more

Breach Notification Update: New Mexico becomes the 48th State Requiring Breach Notification and Tennessee Adds a Safe Harbor for...

by Sedgwick LLP on

As the frequency of data breaches continues, so do legislative developments on notification requirements that must be met in the event of a breach of Personally Identifiable Information (PII). Even as of now, not every state...more

Six Tips to Consider in Hiring Privacy and Data Security Experts

by Jackson Lewis P.C. on

Facing increasingly pervasive issues relating to privacy and data security companies are faced with what qualifications they should think about when looking to hire experts in these areas, and their role within the company is...more

"The Emerging Need for Cybersecurity Diligence in M&A"

Cybercrime has emerged as one of the foremost threats a company faces. As a result of a few keystrokes, a company may find its customers’ data sold on the dark web, its intellectual property in the hands of a competitor or...more

InterContinental Hotels Reports Credit Card Breach

InterContinental Hotels Group (IHG) has reported a data breach of its payment card processing system. The breach involves malware that infected certain locations between September 29, 2016, and December 29, 2016. The malware...more

French CNIL Releases GDPR Compliance Toolkit

by Alston & Bird on

On March 15, 2017, the French data protection authority (CNIL) released its six step- GDPR compliance program together with GDPR-tailored templates for use by companies, the “GDPR Toolkit.” The GDPR Toolkit is helpful for...more

The New Privacy Shield Twist

by Conduent on

The new Privacy Shield Framework was created to help American companies protect EU customer data privacy. However, in an unexpected twist, uncertainties may threaten the Privacy Shield: The White House passed a directive in...more

Processor BCRs Under the GDPR: Realizing the Potential

by Alston & Bird on

Binding Corporate Rules (BCRs) are an intracompany code of conduct that regulates the principles and rules that apply to the processing and transfer of personal data within a company group, including cross-border. BCRs were...more

New Mexico Enacts Data Breach Notification Act (Updated)

by Jackson Lewis P.C. on

New Mexico has become the 48th state to enact a data breach notification law requiring that individuals be notified of security breaches of information involving personal identifying information. Governor Susana Martinez...more

Deeper Dive: Frequency and Severity

by BakerHostetler on

All industries are affected by cyberattacks, but how often and to what extent they occur vary greatly by industry type. As for frequency, the healthcare industry in 2016, for the third year in a row, saw the greatest...more

Be Compromise Ready: Go Back to the Basics

by BakerHostetler on

We are excited to release our third annual BakerHostetler Data Security Incident Response Report. This report analyzes the more than 450 data security incidents we led clients through in 2016. Companies continued to...more

Your Business Drone Crashed... What Do You Do?

by Rumberger Kirk & Caldwell on

Understanding FAA & NTSB Drone Accident Reporting Requirements - When a corporate drone crashes, it can be one of the worst-case scenarios for owners who rely on UAS technology to conduct a wide-array of business...more

New Mexico Enacts Data Breach Notification Act

by Jackson Lewis P.C. on

On April 6, 2017, New Mexico Governor Susana Martinez signed HB 15, making New Mexico the 48th state to enact a data breach notification law. The law has an effective date of June 16, 2017 and follows the same general...more

Monthly newsletter GDPR: Accountability Privacy by Design and Privacy by Default (Dutch)

by Dentons on

This fourth edition of the GDPR newsletter, the first after our tie-up with Dentons, deals with the (new) data protection principles of accountability, privacy by design and privacy by default....more

Monthly newsletter GDPR: Accountability Privacy by Design and Privacy by Default

by Dentons on

This fourth edition of the GDPR newsletter, the first after our tie-up with Dentons, deals with the (new) data protection principles of accountability, privacy by design and privacy by default....more

Meritas Data Protection & Privacy Law GDPR: New territorial scope, one stop shop and consistency mechanisms

One of the undeniable highlights of the new General Data Protection Regulation (GDPR), which will come into force on 25 May 2018, is its extended territorial scope. The new geographical reach does not only come as a reaction...more

Meritas Data Protection & Privacy The GDPR - new data governance obligations on businesses

Let’s start with the good news. The current obligation to register with the national data protection authority will be abolished. Along with the fines and criminal offences of failing to do so. In its place, the...more

When Confidential is Not Confidential - Identities of Confidential Sources of Distressed Debt Reporter are Not Subject to NY...

by Dechert LLP on

There is the general expectation that when a source discloses information to a reporter on a confidential basis, the source will be protected and their identity and communications cannot be forced to be disclosed. This is...more

China Publishes Draft Measures Restricting Outbound Data Transfers

by Latham & Watkins LLP on

The current draft grants Chinese regulators broad discretion to prohibit data transfers. Key Points: ..The draft requires both the consent of the data subjects and/or the permission of the regulators for any...more

Data Protection Impact Assessments under GDPR: Article 29 Working Party Adopts Draft Guidelines

by WilmerHale on

The EU General Data Protection Regulation’s (GDPR) requirements are coming into focus quickly as EU data protection authorities continue to issue guidance on different aspects of the law. On April 4, 2017, the Article 29...more

GameStop Investigating Data Breach of Credit Card Information

Brian Krebs broke the story that GameStop was investigating a possible data breach affecting customers’ credit card information. This week, GameStop confirmed that it is investigating the possible compromise of credit card...more

Meritas Data Protection & Privacy Law: Getting ready for the new GDPR: Issues to consider now

The Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and...more

3,402 Results
|
View per page
Page: of 137
Cybersecurity

Follow General Business Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!