General Business Science, Computers & Technology Privacy

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.
News & Analysis as of

Sizing Up Cyber Risks after the Sony Breach

Sony’s most recent data breach underscores the difficulties in underwriting and insuring cyber risk. Sony incurred losses that were surprising in both their scope and type. The company already is a defendant in at least four...more

North Korea’s Attack Raises Critical Coverage Issues and TRIA Implications

Potential Critical Coverage Issues - The FBI advised that the recent attack on Sony Pictures Entertainment (SPE) “destroyed systems” and “rendered thousands of SPE’s computers inoperable, forced SPE to take its entire...more

ISO Adopts Standard for Privacy in the Cloud

The use of public cloud computing services- broadly defined as contracting with another company for the provision of computing resources (networks, storage, applications, and services), offers many potential benefits for...more

A Proxy Season Guide to 2015

With the close of another year quickly approaching, it is time again for public companies to get equipped with the developments of the past year in order to position themselves for success in 2015. A review of previous years’...more

Cybersecurity Lessons Learned From the FTC’s Enforcement History

In 2014, cybersecurity and data breach incidents regularly made the headlines, with the reported breaches becoming increasingly large and complex. As in the past, these data breaches have inevitably been followed by a flurry...more

New Cybersecurity Laws Protect Government Agencies from Cyber Attacks

On December 18, President Obama signed five cybersecurity-related bills into law; an attempt to increase cyber protection in the wake of recent data breaches. This is the first time in 12 years that any significant...more

National Institute of Standards and Technology Publishes New Guidance on Privacy Controls

On December 16, the NIST announced the release of its new guidance on assessing the security and privacy safeguards for federal information systems and organizations. The updated guidance will be used by government IT...more

2014 Information Governance Year in Review

2014 has been perhaps the biggest year Information Governance (“IG”) has seen. A relatively small and, if not unknown, at least undefined field only a few years ago has grown into an area of interest—and concern—to many...more

Negotiating Cloud Contracts

The cloud computing market is evolving rapidly. New as a service (aaS) platforms are appearing and the dichotomy between public and private cloud domains has been fractured into many different shades of hybrid cloud...more

Article 29 Working Party Adopts Procedure on Approval of Model Clauses

On 26 November 2014, the Article 29 Working Party adopted a working document on establishing a cooperation procedure for issuing common opinions on whether contractual clauses are compliant with the European Commission’s...more

New York DFS Targets Third-Party Relationships in Letters to Banks

Why it matters - Continuing the regulatory focus on third-party relationships, New York’s Department of Financial Services (DFS) has sent multiple letters to banks across the country to address the issue of data...more

Lessons For Corporate Directors From The Wyndham Data Breach Derivative Action

On October 20, 2014, Wyndham Worldwide Corporation won dismissal of a shareholder derivative suit seeking damages arising out of three data breaches that occurred between 2008 and 2010. Dennis Palkon, et al. v. Stephen P....more

Failure to take basic security measures may result in HIPAA penalties – 6 tips to keep up with updates and patches

Covered Entities and their Business Associates must comply with HIPAA’s Security Rule, or they may face substantial penalties. The Office of Civil Rights (OCR) recently shared a resolution agreement that emphasizes the...more

Deputy Treasury Secretary Discusses Cybersecurity Checklist for Banks

Deputy Treasury Secretary Sarah Raskin, who recently spoke at the Texas Bankers’ Association Executive Leadership Cybersecurity Conference, provided bank executives and boards some guidance on preventing, preparing for and...more

An Update on the Cybersecurity Framework and Action Items for NIST

The National Institute of Standards and Technology (NIST) recently released an update on its Framework for Improving Critical Infrastructure Cybersecurity (The Framework). The Framework was first issued in February 2014 as a...more

FBI Issues Alert Following Unprecedented Malware Attack against U.S. Company

Last week, the Federal Bureau of Investigation (FBI) warned U.S. businesses to be alert for a malicious software bug capable of erasing hard drives and crashing networks. Although not specifically mentioned, cybersecurity...more

Adding Cyber Security to Corporate Risk Management

Corporate boards and senior management like to focus on business. They love the numbers, the strategy and the success of a business operation. They have a passion for it and that is why they are sitting on board or managing a...more

New York Establishes New Cyber Security Examination Process for Financial Institutions

New York’s Department of Financial Services released a letter on December 10, 2014, announcing the details of its plan to focus more attention on cyber security matters in conducting examinations. Directed at New...more

On the Fifth Day of Privacy, California (and Delaware) gave to me

sing it with me now…. Five Golden Rules…….(well, five new privacy laws/requirements) There are five significant new privacy laws/amendments that will be effective as of New Year’s Day — January 1, 2015 — and...more

Comptroller: Retailers Must Be Held Accountable for Data Breaches

Why it matters - Reflecting continued regulatory focus on the issue of cybersecurity, Comptroller of the Currency Thomas Curry said in recent remarks, retailers must be held accountable for data breaches, urging...more

A Primer on EMV Technology for Merchants

With the new year just around the corner, retailers should make a resolution to learn more about EMV technology. That’s because 2015 is slated to be the year EMV technology makes significant inroads in the United States, and...more

Data Security, Cyber Liability and First-party Costs for Mid Cap and Small Companies Are Reaching Catastrophic Levels

Curiously, while the numbers on data security and cyber liability losses have grabbed headlines, the published information has not focused on the insurance perspective. NetDiligence® recently released its Cyber Claims Study...more

Views on Data Security Readiness

Hacking breaches continue to push companies into the unwelcome public spotlight to defend their corporate data security practices—including recently the cyberattack on Sony Entertainment Corp. (13 PVLR 2062,...more

Don’t Be the Next Data Breach Target

As the much-publicized data breaches of the last year reveal, third parties are often the gateway to an organization’s data. As repositories of vast amounts of confidential client data in e-discovery, such as personally...more

Both Sides Now: Cloud Security and Privacy Enter the Modern Era with ISO 27018

Until recently, many cloud users felt like Joni Mitchell in her classic song, “Both Sides Now.” No matter how you looked at clouds, you never really understood them, how they worked, or what happened inside them. Cloud...more

1,195 Results
|
View per page
Page: of 48

Follow General Business Updates on: