Privacy Business Organization Science, Computers & Technology

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Home Depot Alleges Visa, MasterCard Colluded To Delay Chip-and-PIN Implementation; Exposed Retailers, Consumers to Data Breach...

A recent bombshell lawsuit by The Home Depot alleges patterns of antitrust violations, illegal collusion, and anti-competitive conduct by the Visa and MasterCard credit card networks. The suit arises in a climate in which the...more

Unfair and Unbalanced-the Victimization Episode [Video]

In this episode Roy Snell and I discuss: Victimization and the value of personal responsibility; Standing up for your principles; The idea that you can make your sales goals without breaking the law; Roy translates wink...more

Cybersecurity and Data Privacy: FBI Issues Public Service Announcement About Recent E-Mail Scam Targeting Businesses (6/16)

On June 14, 2016, the Federal Bureau of Investigation (FBI) issued a public service announcement relating to a recent surge in ‘business e-mail compromise’ (BEC) scams, which are sophisticated scams that target businesses...more

Practice Spotlight: Best Practices for Responding to the Threat of Ransomware

Ransomware, a specialized form of malware used for extortion attempts, has been around the internet for more than a decade but now, because of a rash of recent attacks, has moved to the forefront as the most problematic cyber...more

Happy Times, High Crimes and Misdemeanors (Silicon Valley – Episode 25)

In this week’s episode of Silicon Valley, Richard enjoyed an unprecedented run of success, culminating with the official launch of Pied Piper’s platform. Richard has suffered so many setbacks, it’s little wonder he is...more

Arizona Court Rules That Chubb Cyber Policy Does Not Cover Credit Card Theft Losses

As cyber attacks increase at an unprecedented pace, more and more businesses are purchasing cyber insurance to protect against that risk. The insurance industry now faces an avalanche of claims, and those claims now are...more

German Data Protection Authority Issues Fines for Unlawful Cross-Atlantic Data Transfers

The Data Protection Authority of Hamburg, Germany has made good on its promise to audit cross-Atlantic data transfers in the wake of the October 2015 Safe Harbor decision. On June 6, the Hamburg DPA announced that it had...more

Cybersecurity and Data Privacy: Proposed Legislation Would Substantially Expand and Strengthen New York’s Data Breach Notification...

A bill currently pending before the New York State Assembly (A10475) would make a number of significant changes to New York’s data breach notification statute (General Business Law Section 899-aa) in the event that it is...more

New FBI Ransomware Alert: Bureau Provides Key Guidance for Prevention and Business Continuity Planning

The Cyber Division of the Federal Bureau of Investigation (FBI) recently issued a new ransomware notice. The notice encourages organizations, regardless of industry and size, to focus on two areas in their efforts to minimize...more

Beyond Breach: Challenges in Cybersecurity & Coverage

Some of the biggest threats to cybersecurity involve controlling, damaging and interrupting systems, denying access to critical data and destroying data; “breach” not so much. Organizations need to make sure that their...more

Cyber Security Takes Centre Stage in UK Government’s Strategy

The UK Department for Culture, Media and Sport recently released a statement on cyber security, in which it urged businesses to take better care to protect against cyber criminals. This statement follows publication of its...more

Cybersecurity, Boards and Cyber-Board “Experts”: Caution Should Rule

A continuing frequent question from public companies is how a board should be constituted to oversee cybersecurity. Many public companies foist this additional burden on the audit committee. Those large enough to have a...more

Rocky Mountain Securities Conference: Cybersecurity Takes Center Stage

Given the security industry’s increased use of information technology and the constant evolution of cyber threats, cybersecurity will continue to demand significant attention from regulators and industry participants in the...more

What Companies Need to Know About Cyber Threat Information Sharing Under CISA

Cyber threat information sharing has the potential to provide numerous benefits for organizations (both public and private) faced with cyberattacks, which are increasing in frequency and sophistication. Cyber threat...more

Data Privacy Due Diligence: Questions to Consider in a Merger or Acquisition

The FTC can hold an acquirer responsible for the bad data security and privacy practices of a company that they acquire. Evaluating a potential target’s data privacy and security practices, however, can be daunting and...more

FTC: Data Security Primer for Small Businesses and Start-ups

The Federal Trade Commission will host a one day-conference in Chicago at Northwestern’s Pritzker School of Law on June 15, 2016. This event will be the fourth of the FTC’s Start with Security Events nationwide, which build...more

Key Data Privacy and Security Concerns for Investment Firms

Privacy and data security concerns are among the most critical issues facing investment funds, advisors and managers (collectively, “investment firms”). This article outlines the privacy and data security challenges...more

Reports Reveal Four Cyber Security Trends—and the Need for Better Cyber Security Training & Awareness

?As cyber security issues continue to escalate and evolve, compliance officers have more opportunities to better protect and defend their organizations from cyber risk. One of compliance officers’ responsibilities is to stay...more

Cybersecurity, Corporate Governance, and Risk Management: Best Practices

As litigators, we help clients resolve conflicts that have matured into disputes. In the realm of cybersecurity, we defend claims brought by private parties or governmental entities against companies facing the fallout from...more

Privacy & Cybersecurity Newsletter: April 2016

What seems like a long time ago now, in 2011 PricewaterhouseCoopers (PwC) warned that “there is no question that law firms are among the companies being targeted by cyber criminals.” Despite this, many law firms believed (or...more

Phishing and Spoofing Scams — A Few Tips to Protect Yourself and Your Business

The phone rings. The caller ID says it’s your attorney’s office. When you answer, you are told you owe your attorney additional money and are directed to call a toll-free number. When you call the number, you are told how...more

Venture Capital Coast to Coast – April 2016

VC WATCH - The Venture Capital “Reset” – We Were Expecting You - Venture capital fundraising declined in 2015, with total money raised down more than 9 percent and a 13 percent decrease in the number of fund...more

Cybersecurity Advice to CEOs and Boards “Take more responsibility”!

The White House and its top security advisors are regularly advised about cyberintrusions and as a result the “time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security”...more

Tennessee Amends Its Data Breach Notification Laws

Removes the Encryption Safe Harbor, Limits the Timing of Notice, and Expands “Unauthorized Persons” - Effective July 1, 2016, Tennessee becomes the first state to remove the encryption safe harbor from its data breach...more

Revenge of the Dorks: Their Time Has Come and They Might be Malicious

A nerd. A dork. A geek. You’ve seen them. You know them. Maybe you are one of them. And you definitely know the type. In fact, it was way back in the 1980s when a group of bullied collegiate outcasts rose up to defeat an...more

310 Results
|
View per page
Page: of 13

Follow Privacy Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×