News & Analysis as of

General Business Privacy

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.

Oregon Expands Deceptive Trade Practices Act to Include Misrepresentations About PI Usage

by BakerHostetler on

Effective January 1, 2018, Oregon will join Pennsylvania and Nebraska in expanding its definition of deceptive trade practices to explicitly include a material misstatement regarding the use of personal information. House...more

Eleventh Circuit to Weigh in on ‘Business Email Compromise’ Coverage Under Fidelity Bond

by Carlton Fields on

Banks have historically been at the forefront of technological advances in commerce. So it should be no surprise that they and other financial institutions were also among the first to suffer losses related to computer fraud...more

How To Protect Your Company From Cyber Regulatory-Enforcement: Part 2

by GB&A Insurance on

Experiencing a security breach is a bit like being on the titanic and feeling the tremble from hitting an iceberg. The impact sparks immediate panic - you know something very bad has just happened but are unsure whether the...more

At A Glance: De-Identification, Anonymization, and Pseudonymization under the GDPR

by Bryan Cave on

De-identification of data refers to the process used to prevent personal identifiers—both direct and indirect—from being connected with information. The EU General Data Protection Regulation (“GDPR”), which will replace the...more

Five Workforce Management Challenges in Unprecedented Times - Take 5 Newsletter - July 2017

by Epstein Becker & Green on

Employers across all industries are deep in the midst of exciting but unchartered and fluid times. Rapid and unforeseen technological advancements are largely responsible for this dynamic. And while there is a natural...more

An Ounce Of Data Breach Prevention…Address Attorney-Client Privilege In Your Breach Planning

by Jackson Lewis P.C. on

Data breach “horror” stories have become a new staple in today’s business environment. The frequency of attacks which threaten (or compromise) the security of business networks and information systems continually increases —...more

FBI Issues Warning about Internet-Connected Toys

We previously reported about the microphone and video capabilities of Echo technology. The FBI is also concerned about this technology being used in toys that are connected to the Internet....more

FTC Chronicle: “Lessons Learned” from the Agency’s Data Breach Investigations

The Federal Trade Commission (FTC) – often criticized for not providing clear guidance as to what the agency considers reasonable data security – announced on Friday that it would publish a weekly blog discussing “lessons...more

Deeper Dive: Application of Work-Product Doctrine to Forensic Investigations

by BakerHostetler on

In a recent post, we addressed the role a forensic investigation plays in a company’s response to a data security incident. We noted that to maximize the likelihood that a forensic firm’s work will be covered by the...more

National Association of Corporate Directors Updates Cyber-Risk Oversight Handbook

by Hogan Lovells on

Earlier this year, the National Association of Corporate Directors (NACD) released an updated version of its Director’s Handbook on Cyber-Risk Oversight (Handbook). The updates add 16 pages of content to the previously...more

GDPR Update: Rights of the data subjects (Dutch)

by Dentons on

Monthly update AVGB: Rights of the parties involved: (erasure, limitation, objection and automated decision making) Introduction - Following our previous updates regarding the rights of those involved, we treat the...more

New General Data Protection Regulations in European Union Has Cybersecurity Consequences

by Bennett Jones LLP on

The European Union’s General Data Protection Regulation (GDPR) will come into force on May 25, 2018. This new regulation replaces the current data protection law (Directive 95/46/EC) substantially and will bring important...more

Protecting Data: Vendors May Be Your Weakest Link

by Murtha Cullina on

A Verizon Communications vendor misconfigured a cloud server that caused the information of 6 million Verizon customers to be exposed on-line. When a cyber incident or data breach occurs on your vendor’s watch, regardless of...more

The Protection of Biometric Information

by Saul Ewing LLP on

As states develop new laws directed at the security of biometric identifiers, such as fingerprints and retina scans, institutions of higher education are likely to face a host of new compliance requirements and increased...more

Hurricane Cyber? Insurers Confront Unpredictable Data Breach Costs

by Fox Rothschild LLP on

Venerable insurer Lloyd’s of London says a global cyber attack on a major provider of cloud services could carry costs of up to $53 billion, reports Data Breach Today. That’s a hefty price tag that explains the rising...more

Defending Novel Theories In Data-Breach Litigation

by Ellis & Winters LLP on

The success of a data-breach lawsuit often turns on whether the plaintiff has standing to sue. Showing actual injury can be especially hard when the only alleged damage consists of a risk of future identity theft....more

NYDFS Updates FAQs to Clarify Cybersecurity Regulations

by Ballard Spahr LLP on

The New York Department of Financial Services (NYDFS) recently updated frequently asked questions (FAQs) about its cybersecurity regulations, 23 NYCRR 500, to address four new issues. NYDFS published its initial set of FAQs...more

VTech Escapes Class Action Case Over Breach of 11 Million Toy Users’ Information

In November 2015, VTech Electonics North America LLC (VTech) announced that an unauthorized party infiltrated its network and gained access to the personal information of 5 million adults and 6.5 million children through its...more

China Drafts Legislative Rules Regarding Cross-border Data Transfers

by Morgan Lewis on

The draft legislation provides further guidance on the regulations provided in the recent cybersecurity law, including definitions and details on the security assessments required for cross-border data transfers....more

National Cyber Security Alert

by Clark Hill PLC on

The continuing increase of cyber-crime and the almost daily reports of hacking attacks against businesses, government agencies, and citizens highlight the persistence of this escalating national security and corporate threat....more

Bavarian DPA Has Released GDPR Implementation Audit Questionnaire

by Reed Smith on

The Bavarian Data Protection Authority (“Bavarian DPA”) has published an English-language version of a GDPR implementation audit questionnaire (“Questionnaire”). The Questionnaire has been previously released in...more

Ransomware is taking the world by storm; does insurance respond?

On June 27, 2017, the world had its second major ransomware attack in two months, and experts are predicting more to come. The first, named WannaCry, began May 12, and quickly spread to over 400,000 machines, the vast...more

DFS Cyber Compliance Nightmare? Detailed survey results indicate compliance is far from reach

New York’s powerful Department of Financial Services (DFS) upended cybersecurity regulation with its new and sweeping “Cybersecurity Requirements for Financial Services Companies,” which took effect on March 1, 2017. But is...more

The State AG Report Weekly Update

by Cozen O'Connor on

Republican Chess Bedsole Announces Bid for Alabama Attorney General- Chess Bedsole, who previously served as the Alabama campaign chairman for President Trump, announced his candidacy to become the Alabama AG. Bedsole is...more

How Connected Cars and Autonomous Vehicles Will Change and Shape the Future of How We Move

by Hogan Lovells on

In this hoganlovells.com interview, Hogan Lovells partner Lance Bultena talks about the impact connected cars and autonomous vehicles (AVs) will have on America’s infrastructure and environment; the services associated with...more

3,635 Results
|
View per page
Page: of 146
Cybersecurity

Follow General Business Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.