General Business Privacy Science, Computers & Technology

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.
News & Analysis as of

Noodles & Company alerts customers of credit card compromise

According to Noodles & Company (“Noodles”), it received information from Visa that Visa cards used by customers at its fast-food chains since January have “possibly” been compromised. It is presently investigating unusual...more

Preparing for Increased Cybersecurity Information Sharing

Cybersecurity remains a top focus of government regulators, and the prevailing trend is to encourage information sharing between the government and private entities to combat cybersecurity threats. In line with this theme, on...more

Strict and far-reaching new EU data protection regime comes into force

The EU General Data Protection Regulation ("GDPR") is now in force, and the clock is officially ticking for businesses to bring their operations into line with its sweeping changes. On 4 May 2016, after more than four...more

O’Charley’s diners warned of payment card data breach

Diners who used credit and debit cards at the Tennessee based O’Charley’s restaurants between March 18, 2016, and April 8, 2016, were notified by O’Charley’s of a data breach that affected its point of sale systems. Consumers...more

The End of the “Safe Harbor” Rule for E.U./U.S. Data Transfer: How Can Companies Transfer Personal Data and Remain Compliant?

Directive 95/46/EC of 24 October 1995 - Articles 25 and 26 - The transfer of personal data to a third country is allowed: ..if the third country ensures an adequate level of protection; the Commission can...more

European Parliament: EU-U.S. Privacy Shield Needs Further Improvement

Earlier today, the European Parliament passed a non-legislative resolution saying the EU Commission should go back to negotiating with the United States to remedy “deficiencies” in the proposed EU-U.S. Privacy Shield for EU...more

Data Privacy Considerations for Starting or Evaluating a Bounty Program

Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate,...more

CSBS Publishes Annual Report

Recently, the Conference of State Bank Supervisors (CSBS) published its 2015 Annual Report to provide an overview of its activities and initiatives in 2015. The report highlights that, throughout 2015, state regulators (i)...more

Recent Investment Management Developments - May 2016

Below is a summary of recent investment management developments that affect registered investment companies, private equity funds, hedge funds, investment advisers, and others in the investment management...more

Europe Counts Down to the General Data Protection Regulation

Businesses have two years to comply with Europe’s new privacy regime. On 24 May 2016, after more than four years of debate, the General Data Protection Regulation (GDPR, or the Regulation) enters into force. The GDPR...more

Data Breaches: Are You Ready (for the inevitable)?

In 2015, identity theft occurred every two seconds, disrupting the lives of 13.1 million people, according to Javelin Strategy and Research. Year after year, U.S. data breaches have hit record highs, reports the Identity...more

Recommendations for Evaluating Your Organization’s Use of Social Media

The majority of organizations utilize social media to market their products and services, interact with consumers, and manage their brand identity. Many mobile applications and websites even permit users to sign-in with their...more

Think you’re covered? Think again

Commercial General Liability policies (CGL) typically do not include data protection loss coverage, although some insurers offer additional data protection endorsements. Normally those additional endorsements only cover data...more

Privacy Best Practices for Commercial and Private Drone Use Adopted in NTIA Process

Consensus was reached in a proceeding of the National Telecommunications and Information Administration (NTIA) of the U.S. Department of Commerce on a set of privacy best practices for the commercial and recreational use of...more

"Big Data Enters the Agenda of EU Antitrust Authorities"

On May 10, 2016, the French Competition Authority and German Federal Cartel Office published “Competition Law and Data,” a joint report on big data and its implications for competition law. The paper identifies issues that...more

Cyber Security

Roughly one million pieces of malware—computer viruses or malicious software—are released every day. In recent years, we’ve witnessed an unprecedented level of activity in the cyber arena, both in the form of increased...more

How to Evaluate a Credit Monitoring Service

Organizations are not, generally, required to offer services to consumers whose information was involved in a breach. Nonetheless, many organizations choose to offer credit reports (i.e., a list of the open credit accounts...more

Reworked EU-U.S. Privacy Shield Still Undergoing Growing Pains

When the European Union’s highest court issued its October 2015 ruling striking down the U.S.-EU Safe Harbor framework, shock waves rippled on both sides of the Atlantic. For thousands of U.S. companies handling the...more

Tennessee Enacts Changes to Data Breach Statute

Businesses in the State of Tennessee should take note of several significant changes to Tennessee's data breach statute that take effect for data breaches occurring on or after July 1, 2016. Currently, Tennessee Code...more

Privacy Tip #34 – Get women on your board—they are more attuned to risks facing the organization

As a member of Women in the Boardroom, I am a big supporter of adding more diversity, including women, to corporate boards. Now I have a new reason. According to the 2016 Global Board of Directors report, a collaboration...more

Wendy’s confirms data breach of point of sale system

Wendy’s confirmed yesterday in its first quarter financial statement that its investigation into a credit card breach did uncover malicious software on its point of sale systems on fewer than 300 of its stores nationwide. It...more

UK Financial Regulatory Developments - May 2016 #6

Industry associations agree cyber principles - ISDA, the European Banking Federation and the Global Financial Markets Association have published a set of common principles they hope will encourage effective global policy...more

What's New with HIPAA?

A number of new developments have taken place related to Health Insurance Portability and Accountability Act (HIPAA) privacy and security compliance, and enforcement is increasing. Healthcare providers, health plans and other...more

Cybersecurity, Boards and Cyber-Board "Experts": Caution Should Rule

A continuing frequent question from public companies is how a board should be constituted to oversee cybersecurity. Many public companies foist this additional burden on the audit committee. Those large enough to have a...more

Managing Cybersecurity Risk for Nonprofit Organizations: A Fiduciary Duty?

We live in an era of increasingly prevalent cybercrime, and nonprofits are in the crosshairs.  Harvard University, Penn State University and two BlueCross BlueShield entities are just a few nonprofit organizations that...more

2,112 Results
|
View per page
Page: of 85

Follow General Business Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×