Privacy Business Organization Science, Computers & Technology

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

NYDFS: A Lawyer’s Responsibility

New York Financial Regulator to Enforce First-of-Its-Kind Cybersecurity Regulations in Coming Weeks - On December 28, 2016, the New York Department of Financial Services (NYDFS) issued revised cybersecurity regulations...more

Informing Illinois Newsletter - January 2017

How to Protect Business Information From Disclosure Under Illinois' FOIA - Local governments often possess sensitive proprietary information of their vendors or of regulated businesses. Because the Illinois Freedom of...more

Internet of Things: Navigating Privacy, Data Security, and Client Trust in the Age of Big Data

In-house attorneys Olga Mack and Katia Bloom on risk management, data security, privacy, and client trust in the rapidly developing IoT Age....more

Deals and Data: Cybersecurity M&A Due Diligence

Cybersecurity due diligence is quickly becoming part of standard best practices in Merger & Acquisition (“M&A”) deals. Traditionally, the primary goal of due diligence is to investigate the target of a merger or acquisition...more

ICO to Assume Telephone Preference Service Responsibility

Effective 30 December 2016, the Information Commissioner’s Office (‘ICO’) will be responsible for recording and maintaining the Telephone Preference Service (‘TPS’) register. The TPS is a free service offered to the...more

Home Depot Evades Shareholder’s Derivative Suit for 2014 Data Breach

Public companies that are proactively working to mitigate “cyber” risks and prepare to respond to potential incidents frequently ask whether a “breach” will lead to litigation, loss of customers, stock price decline, and...more

Compliance Role in Mitigating Cyber Mayhem

In recent years, attention has been drawn to the impact of cyber and data breaches and the extent to which our organizations remain vulnerable to these threats. The cost of cyber and data security breaches is well known and...more

Data Protection Officers: A Comparison of US Law, EU Law, and Soon-to-be-EU Law

Although organizations in the United States have dealt with privacy issues for years, only in the past decade have they begun to view the complexities of privacy as requiring formal organizational structure and, in some...more

The New Cybersecurity Law—New Compliance Focus for Enterprises in China

On November 7, 2016, the Standing Committee of the National People’s Congress (NPC) of the People’s Republic of China (PRC) passed the final Cybersecurity Law (CSL) after three rounds of review by the NPC since June 2015....more

Officers and Directors Spared Home Depot Data Breach Derivative Lawsuit

Officers and directors may breathe a temporary sigh of relief following the recent dismissal of the Home Depot data breach derivative case. Others will look to the facts for guidance. The complaint alleging the board had...more

There’s No Flying Under the Radar: Why Small Businesses Should Get Smart About Information Security

The latest publication by the National Institute of Standards and Technology (NIST), entitled “Small Business Information Security: The Fundamentals,” aims to promote and assist small businesses in their efforts to manage...more

FINRA Fines Lincoln Financial Sub $650,000 For Cybersecurity Shortcomings

A Lincoln Financial Group subsidiary agreed to pay $650,000 to the Financial Industry Regulatory Authority (FINRA) to resolve allegations that it failed to implement sufficient security policies to protect confidential...more

DFS Cyber Regulation: Part II – An Interview with Bay Dynamics’ Steven Grossman

This is the second installment in our interview with Steven Grossman, VP Strategy & Enablement at Bay Dynamics, the cyber risk analytics company. Here, Steven discusses the importance of aligning an institution’s risk...more

Attacking Cybersecurity from the Inside Out: Part III

Over the last couple of weeks, we’ve explored the steps a company’s leadership team should take to prioritize cybersecurity and how businesses can improve their cybersecurity strategy by enhancing their employee-level cyber...more

The FTC’s New Data Breach Response Guide (and a Reminder)

The two-pronged mission of the Federal Trade Commission is to protect consumers and promote competition. According to the FTC’s website, protecting consumers includes “stopping unfair, deceptive or fraudulent practices in the...more

Bryan Cave Data Security Breach Handbook - 2016

Since the first publication of this handbook in 2014, the legal ramifications for mishandling a data security incident have become more severe. In the United States, the number of federal and state laws that claim to...more

NIST Releases Cybersecurity Guide for Small Businesses

We often hear from small businesses that they do not believe they can be a “target” of hackers, or that they are at risk of a cyber intrusion. This thought is naïve as small businesses are at risk of cyber intrusions, and due...more

Cybersecurity liability: Delaware has good news for directors

The Delaware Chancery Court just issued an opinion that will have directors breathing a sigh of relief in connection with cybersecurity risks. In its opinion – Reiter v Fairbank, C.A. No. 11693-CB (Del. Ch. Oct. 18, 2016) –...more

Company Bosses Can No Longer Dodge Nuisance Call Fines

In an ongoing effort to tackle nuisance calls, the UK government has signalled its intention to make company directors directly liable for breaches of the Privacy and Electronic Communications Regulations (PERC) carried out...more

Cyber Regulation Demands Board Accountability: Part 2 in a 3-Part Series

This is our second installment in a three-part series examining the New York State Department of Financial Services (“DFS”) new cybersecurity regulation. In this installment, we provide an overview of the regulation’s impact...more

Attacking Cybersecurity from the Inside Out: Part II

Last week in the first installment of our Attacking Cybersecurity from the Inside Out series, we outlined the steps a company’s board and executive leadership should take to prioritize cybersecurity. In this second...more

Top 10 Takeaways From Our Interactive Simulation

During McGuireWoods’ Nov. 3 Data Privacy and Security Seminar in Chicago, McGuireWoods lawyers Anne Peterson and Alex Brackett conducted a data breach tabletop exercise simulating a variety of breach scenarios. For those who...more

Feeling Lost in a Storm After Suffering a Data Breach?

When faced with a data breach, it’s easy for companies to feel like they’re attempting to navigate a storm without a rudder. To provide a guiding light to companies, the Federal Trade Commission (“FTC”) recently issued...more

How The FTC Guides Businesses Through Data Breaches

The Federal Trade Commission (“FTC”) recently released a data breach guide for businesses, along with a video and blog to help companies following the immediate aftermath of a data breach. The FTC also provides a model data...more

Is it Legal to Transfer Personal Data from the European Union to the United States?

Human Resources professionals have one more item to add to their compliance checklist – ensuring the lawful transfer of employee, consumer or customer personal data from the European Union (“EU”) to the United States....more

407 Results
|
View per page
Page: of 17

Follow Privacy Updates on:

Popular Topics

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×