General Business Privacy Business Organization

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.
News & Analysis as of

English court compels investigators to disclose information on data protection grounds

The High Court has ruled that a company conducting an investigation may be compelled to give effect to requests for information made under data protection legislation. The case serves as a stark reminder that data protection...more

Our Global Privacy Officer Answers Data Privacy FAQs

Every company in the world stores data—and much of it is personal information about customers, employees, vendors and other stakeholders. Regardless of size, industry or location, these organizations are obligated to follow a...more

Four Questions to Ask before Disclosing (or Withholding) PHI in Transaction Due Diligence

HIPAA’s restrictions on the use or disclosure of protected health information (“PHI”) by a covered entity or business associate may be familiar to many in healthcare. Also familiar may be the exception that allows covered...more

U.K. Procurement Managers to Vendors: Take Cyber Security Seriously or You’re Out

The headlines about massive cyber-security breaches just keep coming these days. Corporate giants Vodaphone, Home Depot, Talk Talk and JP Morgan Chase have all been hacked—to and they're far from the only ones.. But the...more

Privacy & Data Security Advisory: It’s Not Just Europe: Why 2016 Cloud Vendor Management Programs Should Address Evolving Global...

2015 has seen landmark changes in privacy and cybersecurity laws and regulatory best practices. These developments have had a direct impact on cloud vendors. For example, evolving judicial and regulatory interpretations of...more

Business Litigation Alert: "Is Your Board of Directors Providing Sufficient Oversight for Cyber Attacks?"

Last month, we discussed the recent federal court decision that allows whistleblowers to sue board members directly for retaliation. Now, it seems as though board members are assuming a bigger role in managing another...more

Cyber Threats: Can you Answer These Questions from the Board?

Discussions about cyber threats have moved from ‘server rooms’ to ‘Board rooms.’ For good reason – hacks and breaches of corporate data and trade secrets can seriously compromise a company and spark significant reputational...more

Benchmark surveys: GCs, Executives Not Prepared to Defend Against Cyberbreaches - Key Protective Steps

Although cybersecurity has become a more prominent issue for executives and boards of directors, three recent benchmark surveys - the BDO Board Survey, the 2015 Consero Group’s General Counsel Data Survey, and the 2015 US...more

The Schrems Decision: How the End of Safe Harbor Affects Your FCPA Compliance Plan

Like a needle to a balloon, the Schrems decision has drastically altered the data privacy landscape. Who is affected? Everyone – consumers, corporations, employees. But who needs to take action? Any company with offices in...more

Securities and Corporate Governance Litigation Quarterly

Welcome to the fifth issue of Securities and Corporate Governance Litigation Quarterly, Seyfarth’s quarterly publication of the Securities & Financial Litigation Group focusing on decisions or other items of interest for...more

[Webinar] The New Compliance Challenge: Protecting Confidential Assets From Cyber Threats and Malicious Insiders - Nov. 5th,...

The growing prevalence of cyber-security issues and insider breaches has put information security squarely on the agenda for many corporations – and increasingly in the realm of compliance. In this webinar, we discuss these...more

New Round of SEC Cybersecurity Examinations of Financial Service Firms and Their Cyber Controls

The Office of Compliance Inspections and Examinations (the OCIE) has just published a new Risk Alert on cyber risks and precautions identifying specific areas it will be focusing on during the second round of examinations of...more

[Event] Retail Best Practices: Accommodating Disabilities with Acumen, Protecting Data with Diligence, and Avoiding Class Actions...

Topics covered will include: Accommodating Disabilities in The Retail Work Environment: A discussion of recent developments under the employment provisions of the Americans with Disabilities Act impacting...more

Five Legal Issues Your eSports Company Needs to Know About Operating in the U.S.

With a $143 million market in North America, eSports is big business in the U.S. And given its swift rise in popularity – 205 million people worldwide watched or played eSports in 2014, it will only become bigger. At last...more

United Kingdom: handling internal investigations

With so much potentially at stake, the initial steps and strategic decisions taken in any company investigation are critical to setting the tone for a focused, credible and effective inquiry. This is paramount not only for...more

Are Your Trade Secrets Safe?

A few years back, we had a client – a manufacturing business – that decided to sue an ex-employee for stealing its trade secrets. Our client had developed a process that was unique. Using this process, it was able to...more

How Businesses Can Reduce Cyber Risk: Pre and Post Incident: Businesses Need to Take a More Proactive Approach to Reducing What Is...

As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more

RadioShack’s Consumer Data: A Highly Scrutinized Asset

Following the Texas Attorney General’s objection to the sale of RadioShack Corporation’s consumer data as an asset in its bankruptcy, 37 other state attorneys general and a large number of other consumer protection entities...more

Cyber Security - Risk Management and Mitigation

In This Issue: - Agenda - Current Threat Environment - Current Threat Environment - Strategic Importance - Asian Data Privacy Regimes At-A-Glance - Data Protection: Regional temp - Asia-Pacific...more

Blue Pill/Red Pill: How Officers and Board Members Can Swallow the Red Pill and See the Real World of Cybersecurity

Trying to understand how a hacker thinks can twist your brain around – while you normally think about how to make something work or why something is not working, hackers think how to get something to work in ways that it is...more

The DOJ’s New Cyber Security Best Practices — Creating a Standard of Care?

On April 29, 2015, the U.S. Department of Justice Computer Crime and Intellectual Property Section (“DOJ”) issued version 1.0 of its “Best Practices for Victim Response and Reporting of Cyber Incidents.” It draws on “lessons...more

Economic Impact from a Company’s Data Breach – No Big Deal? Not So Fast!

Recent data breaches have prompted worries about economic damage to the infiltrated companies. Analyses in fact show minimal effects on stock prices or revenues of the hacked companies. But that may be only temporary comfort...more

Taking Control of Cybersecurity: A Practical Guide for Officers and Directors

Major cybersecurity attacks of increased sophistication — and calculated to maximize the reputational and financial damage caused to the corporate targets — are now commonplace. These attacks have catapulted cybersecurity to...more

Spotlight on Responsibility and Accountability: OIG’s New Compliance Guidance for Health Care Governing Boards

On April 20, 2015, the Office of the Inspector General of the U.S. Department of Health and Human Resources (“OIG”), in collaboration with the American Health Lawyers Association, the Association of Healthcare Internal...more

SEC Updates Guidance on Cybersecurity

Emphasizing the critical importance of cybersecurity to registered investment companies (RICs), including insurance separate accounts and business development companies, and to investment advisers, the SEC’s Division of...more

93 Results
|
View per page
Page: of 4

Follow General Business Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×