Privacy Business Organization

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:
News & Analysis as of

Prepare for the Hack: Five Things to Keep in Mind when Shopping for Cybersecurity Insurance

When your company's confidential information ends up on the dark web, it is obviously too late to start thinking about adequate insurance coverage for the barrage of claims and expenses that are about to hit like a tidal...more

Bitcoin: Cybersecurity Regulations on the Horizon?

As legislators grapple with creating legislation intended to bring virtual currencies, such as bitcoin, within the scope of anti-money laundering regulations, the vulnerability of Bitcoin exchanges to theft and other cyber...more

Industry Insight: Information Governance – Leverage Your Business Intelligence and Reduce Risk

“The goal is to turn data into information, and information into insight.” – Carly Fiorina, former CEO, Hewlett-Packard Co. The most valuable asset of every organization is information. Organizing, analyzing and...more


Following the UK Brexit referendum businesses will now find themselves assessing their future. Below is a checklist designed to raise some important questions that should be considered in order to assess potential risks and...more

Cybersecurity Q&A: What Canadian Companies Need to Know about the EU’s New Data Protection Law

It is trite to point out that information crosses national borders today at an unprecedented rate and with very few barriers. A consequence of this unconstrained international flow of information is that domestic data...more

The New European Union-U.S. Data Privacy Shield…Is It Right for You?

U.S. companies with transatlantic operations should carefully balance the need to transfer personal data about European customers and employees from Europe to the U.S. in light of the increased burdens and cost of compliance...more

Guidelines for Written Information Security Policies

Although federal law only requires that financial institutions and health care providers maintain a written information security policy or “WISP,” approximately thirty four states have enacted legislation that requires...more

Social Media Safety Guide for Companies

We’re delighted to publish our Social Media Safety Guide for Companies, which highlights key considerations to keep in mind in using social media to promote your company’s products and services and to engage with customers....more

Three Steps to the Right Cloud for Your Business

The term “cloud computing,” — a process by which remote computers are used to store, manage and process data — is no longer an unfamiliar term. According to at least one estimate, “approximately 90 percent of businesses...more

In Case You Missed It: Launch Links - September, 2016 #4

Some interesting links we found across the web this week: The Hacking Law That Can’t Hack It - For 30 years and counting, courts have struggled with the vagaries of the Computer Fraud and Abuse Act, a federal law...more

Privacy and Cybersecurity Checklist When Designing a Family Office

As family office executives set up a family office or review an existing family office, it is important to make sure the privacy and cybersecurity concerns are addressed and the governance and information security...more

Onward Transfer Grace Period Ends September 30

The EU-US Privacy Shield became operational on August 1, 2016; a nine-month grace period for compliance with the onward transfer requirements applies for organizations that sign up to the Privacy Shield prior to October 1,...more

Commerce Secretary: Trust Gap Hinders Cyber Attack Reporting

In a keynote address delivered on September 27, 2016 at the U.S. Chamber of Commerce’s fifth annual Cybersecurity Summit in Washington, DC, Commerce Department Secretary Penny Pritzker conceded that “the federal government...more

Yahoo Breach and Data/Information Security

The massive breach of accounts at Yahoo revealed on September 22, 2016, brings several thoughts to mind: The purchase of Yahoo by Verizon Wireless has not yet closed. Any companies undergoing diligence on the M&A front...more

Organizing Data Privacy Within A Company

Although organizations have dealt with privacy issues for years, only in the past decade have they begun to view the complexities of privacy as requiring formal organizational structure, dedicated employees, and/or dedicated...more

Mainbrace: September 2016 (No. 4)

It’s hard to believe another summer has come and gone. The kids are back in school, the commuter trains are a bit more crowded, and everyone is back from their holidays, hopefully refreshed and ready to get back down to...more

Is your cybersecurity upgrade FDA reportable?

In today’s marketplace, technology evolves at a rapid rate, and must adapt to changing circumstances, such as threats to cybersecurity. For device companies, some types of modifications to devices post-market - potentially...more

California Supreme Court Decision Could Allow for Greatly Expanded Personal Jurisdiction

The California Supreme Court’s recent opinion on specific jurisdiction may have far-reaching consequences for future actions brought in the state. In the recently published opinion in Bristol-Myers Squibb Co. v. Superior...more

Big Data, Big Risk? Privacy and Security Tips for Fintech Companies

Many fintech companies collect and process vast amounts of data in order to provide financial services quickly and inexpensively. Much of this data is highly sensitive personal information such as date of birth, social...more

How to Respond To Third Party (Non-Government) Civil Subpoenas And Document Requests That Ask For Personal Information

Litigants in a civil dispute often use subpoenas, subpoenas duces tecum, and discovery requests to obtain personal information about individuals who may not be present in the litigation. A request for documents and...more

New York proposes cybersecurity regulation aiming to protect financial services companies from criminal enterprises

The New York State Department of Financial Services (NYDFS) has set forth a proposed cybersecurity regulation for financial service companies. Announced this week by New York  Governor Andrew M. Cuomo, the proposed rule seeks...more

Spoofing, Sports and the Panama Papers: BakerHostetler Offers Mid-Year Review of Cross-Border Government Investigations and...

Halfway through 2016, the international community has seen a staggering variety of cross-border investigations and enforcement actions. Brexit, the release of the Panama Papers, allegations of widespread sports doping and the...more

How to Respond to National Security Letters That Ask for Personal Information

National Security Letters (“NSLs”) refer to a collection of statutes that authorize certain government agencies to obtain information and simultaneously impose a secrecy obligation upon the recipient of the letter. Four...more

Blog: BDO Analysis Of Tech Industry Risk Factors Shows Increased Impact Of Cybersecurity And M&A Concerns

An analysis by audit firm BDO of the incidence of disclosure of various risk factors among tech companies over five years reflects increased emphasis on security breaches, the impact of M&A (including goodwill impairment) and...more

Asset Protection Wake Up Call: Data Security Top Concern for High Net Worth Investors

A recent study asked high net worth investors which of the following issues they were most concerned about: terrorism, data security, or a major illness. The most prevalent response might surprise you. Seventy-two percent...more

568 Results
View per page
Page: of 23

Follow Privacy Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.