Privacy Business Organization

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Insurance & Reinsurance Newsletter

In Texas Department of Housing and Community Affairs v. Inclusive Communities Project, Inc., 135 S. Ct. 2507 (2015), one of the most watched cases of 2015, the Supreme Court held that plaintiffs may rely on a disparate impact...more

Beyond Breach: Challenges in Cybersecurity & Coverage

Some of the biggest threats to cybersecurity involve controlling, damaging and interrupting systems, denying access to critical data and destroying data; “breach” not so much. Organizations need to make sure that their...more

Companies Face Uncertainty as Privacy Shield Encounters New Hurdles

The Privacy Shield, proposed this past February and greeted with cautious optimism by European and U.S. regulators alike as a more robust “replacement” for the invalidated Safe Harbor framework, appears to be suffering death...more

Cyber Security Takes Centre Stage in UK Government’s Strategy

The UK Department for Culture, Media and Sport recently released a statement on cyber security, in which it urged businesses to take better care to protect against cyber criminals. This statement follows publication of its...more

The General Data Protection Regulation: What Insurers Should Do Now to Prepare for Its Implementation

The General Data Protection Regulation (GDPR or Regulation) has been approved by European Union (EU) members as well as the Council of Europe and, at the time of writing, the draft Regulation is before the European Parliament...more

Liability of Cloud-Based Service Provider For Data Breach

Silverpop Systems provides digital marketing services through a cloud-based tool called ‘Engage’. Leading Market Technologies, Inc. (“LMT”) engaged Silverpop through a service agreement and during the course of that agreement...more

TeslaCrypt Ransomware Developers Retire, Release Master Decryption Key

Ransomware is a particularly nefarious type of malware that hijacks computers and forces victims to pay a ransom in order to access their files. One of the reasons it is so successful is because ransomware developers use...more

Cybersecurity, Boards and Cyber-Board “Experts”: Caution Should Rule

A continuing frequent question from public companies is how a board should be constituted to oversee cybersecurity. Many public companies foist this additional burden on the audit committee. Those large enough to have a...more

Rocky Mountain Securities Conference: Cybersecurity Takes Center Stage

Given the security industry’s increased use of information technology and the constant evolution of cyber threats, cybersecurity will continue to demand significant attention from regulators and industry participants in the...more

What Companies Need to Know About Cyber Threat Information Sharing Under CISA

Cyber threat information sharing has the potential to provide numerous benefits for organizations (both public and private) faced with cyberattacks, which are increasing in frequency and sophistication. Cyber threat...more

[Event] CLE for In-House Counsel - A 2016 Update on Current Issues Relating to Your Business - June 2nd, Chicago, Ill

Please join us for a complimentary CLE seminar on current issues affecting your business. Taught by leading practitioners at Locke Lord, the seminar offers three hours of CLE credit, including one hour of Professional...more

Data Privacy Due Diligence: Questions to Consider in a Merger or Acquisition

The FTC can hold an acquirer responsible for the bad data security and privacy practices of a company that they acquire. Evaluating a potential target’s data privacy and security practices, however, can be daunting and...more

FTC: Data Security Primer for Small Businesses and Start-ups

The Federal Trade Commission will host a one day-conference in Chicago at Northwestern’s Pritzker School of Law on June 15, 2016. This event will be the fourth of the FTC’s Start with Security Events nationwide, which build...more

Key Data Privacy and Security Concerns for Investment Firms

Privacy and data security concerns are among the most critical issues facing investment funds, advisors and managers (collectively, “investment firms”). This article outlines the privacy and data security challenges...more

Media, Sport and Entertainment Intelligence - May 2016

Welcome to the latest issue of Media, Sport and Entertainment Intelligence, offering you a selection of the latest and most impactful sector news worldwide. ...more

Hong Kong in the Spotlight – the ICIJ Release Panama Papers Offshore Companies Data

On May 9, 2016 the International Consortium of Investigative Journalists (ICIJ) released a searchable database with information on almost 320,000 offshore entities from of the Panama Papers and Offshore Leaks investigations....more

Reports Reveal Four Cyber Security Trends—and the Need for Better Cyber Security Training & Awareness

?As cyber security issues continue to escalate and evolve, compliance officers have more opportunities to better protect and defend their organizations from cyber risk. One of compliance officers’ responsibilities is to stay...more

English court compels investigators to disclose information on data protection grounds

The High Court has ruled that a company conducting an investigation may be compelled to give effect to requests for information made under data protection legislation. The case serves as a stark reminder that data protection...more

Five Nutshell Questions about Cybersecurity for the Board of Directors

On April 29, 2016, the Council of Institutional Investors (CII) published its new Special Report, Prioritizing Cybersecurity: Five Investor Questions for Portfolio Company Boards. ...more

Cybersecurity, Corporate Governance, and Risk Management: Best Practices

As litigators, we help clients resolve conflicts that have matured into disputes. In the realm of cybersecurity, we defend claims brought by private parties or governmental entities against companies facing the fallout from...more

Privacy & Cybersecurity Newsletter: April 2016

What seems like a long time ago now, in 2011 PricewaterhouseCoopers (PwC) warned that “there is no question that law firms are among the companies being targeted by cyber criminals.” Despite this, many law firms believed (or...more

Phishing and Spoofing Scams — A Few Tips to Protect Yourself and Your Business

The phone rings. The caller ID says it’s your attorney’s office. When you answer, you are told you owe your attorney additional money and are directed to call a toll-free number. When you call the number, you are told how...more

Venture Capital Coast to Coast – April 2016

VC WATCH - The Venture Capital “Reset” – We Were Expecting You - Venture capital fundraising declined in 2015, with total money raised down more than 9 percent and a 13 percent decrease in the number of fund...more

Cybersecurity Advice to CEOs and Boards “Take more responsibility”!

The White House and its top security advisors are regularly advised about cyberintrusions and as a result the “time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security”...more

Microsoft Sues Justice Department Claiming Statute That Authorizes “Gag Orders” Is Unconstitutional

Adding to the number of recent, high-profile confrontations between the government and tech companies concerning the limits of government investigations and the protection of privacy interests, last week, Microsoft filed a...more

483 Results
|
View per page
Page: of 20

Follow Privacy Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×