News & Analysis as of

Privacy Science, Computers & Technology General Business

Read Privacy Law updates, news, and legal commentary from leading lawyers and law firms:

Digital transformation in the aviation sector

by DLA Piper on

In the aviation sector today, an effective digital strategy is critical for long-term success. The role of digital technology has changed from being a source of marginal efficiency gains to becoming the foundation for...more

Privacy Shield certifications reach 2,000, still far short of Safe Harbor

Timothy Toohey was quoted in an article published by CQ Roll Call on April 24, 2017, about the number of Privacy Shield-certified companies under the new program allowing transfers of personal data from Europe to the United...more

Will the New General Data Protection Regulations (“GDPR”) Be a Block in the Chain?

by Cozen O'Connor on

Yes, I know that I ooze wit, but seriously, on the 25 May 2018, the new GDPR will come into force, which replaces the current data protection regulations (irrespective of Brexit). The principle at the heart of the GDPR is...more

Colorado Proposes Cybersecurity Rules for Investment Advisers, Broker-Dealers

by Ballard Spahr LLP on

The Colorado Division of Securities recently issued proposed rules directed at establishing cybersecurity requirements for broker-dealers and investment advisers. The proposed rules were issued only a month after New York...more

Colorado Proposes New Cybersecurity Rules For Financial Advisers

by Dentons on

Earlier this month, the Colorado Division of Securities released a set of proposed changes to the Colorado securities laws that would, if adopted, impose strict cybersecurity requirements on investment advisers and...more

Launch of Swiss-US Privacy Shield Framework Announced by US Secretary of Commerce

by Revision Legal on

International commerce is a huge business, but one of the challenges involved in conducting international business is that different countries may have different laws concerning privacy and the handling of personal data. Many...more

Deeper Dive: Phishing/Hacking/Malware Attack Remain Leading Cause of Security Incidents

by BakerHostetler on

During 2016, our BakerHostetler privacy and data protection team worked on data security incidents across virtually all industries. For the second year in a row, phishing/hacking/malware attacks have accounted for the largest...more

What To Do When You Hire A Thief

by Foley & Lardner LLP on

Employers victimized by trade secret misappropriation appropriately express righteous outrage, both at the offending ex-employee and sometimes at the new employer. However, on another day the roles can reverse: That same...more

What Compliance Needs to Know About Data Privacy and Security

by Michael Volkov on

You don’t have to be a tech-savvy computer genius to address the basics of data privacy. Like many areas which compliance departments oversee, asking the right question and getting the right internal controls in place are the...more

Kimpton Data Breach Decision Highlights Lingering Confusion on Standing Issues

When data thieves steal payment card data, consumers suffer no legally cognizable injuries. Card issuers absorb the fraudulent charges and replace the affected cards. Because fraudulent charges are not billed to consumers,...more

HIPAA and the Cloud’s Shared Responsibility Models

by Snell & Wilmer on

Cloud-based service providers (CSPs), like Amazon Web Services and Microsoft Azure, offer online access to shared computing resources. As such, they have developed a “shared responsibility model” for how CSPs and companies...more

Lawmakers Push FCC To Confront Cell Phone Cyber Threats

by King & Spalding on

In a letter dated March 28, 2017, Senator Ron Wyden, D-Ore., and Representative Ted Lieu, D-Calif., urged the Federal Communications Commission (“FCC”) to address cybersecurity vulnerabilities in the cell phone industry,...more

Data Privacy and Security Legal Reform, and Plaintiffs’ Bar White Paper the Focus of IAPP Panel

by Reed Smith on

A panel on legal reform in the area of privacy and data security at this week’s IAPP Summit provided an opportunity for a discussion between businesses and regulators, as well as for the launch of a white paper on the...more

Deeper Dive: Protecting Paper Records

by BakerHostetler on

Our third annual BakerHostetler Data Security Incident Response Report analyzes the more than 450 data security incidents we led clients through in 2016, and includes a number of interesting trends relating to the causes of...more

Breach Notification Update: New Mexico becomes the 48th State Requiring Breach Notification and Tennessee Adds a Safe Harbor for...

by Sedgwick LLP on

As the frequency of data breaches continues, so do legislative developments on notification requirements that must be met in the event of a breach of Personally Identifiable Information (PII). Even as of now, not every state...more

Six Tips to Consider in Hiring Privacy and Data Security Experts

by Jackson Lewis P.C. on

Facing increasingly pervasive issues relating to privacy and data security companies are faced with what qualifications they should think about when looking to hire experts in these areas, and their role within the company is...more

"The Emerging Need for Cybersecurity Diligence in M&A"

Cybercrime has emerged as one of the foremost threats a company faces. As a result of a few keystrokes, a company may find its customers’ data sold on the dark web, its intellectual property in the hands of a competitor or...more

InterContinental Hotels Reports Credit Card Breach

InterContinental Hotels Group (IHG) has reported a data breach of its payment card processing system. The breach involves malware that infected certain locations between September 29, 2016, and December 29, 2016. The malware...more

French CNIL Releases GDPR Compliance Toolkit

by Alston & Bird on

On March 15, 2017, the French data protection authority (CNIL) released its six step- GDPR compliance program together with GDPR-tailored templates for use by companies, the “GDPR Toolkit.” The GDPR Toolkit is helpful for...more

The New Privacy Shield Twist

by Conduent on

The new Privacy Shield Framework was created to help American companies protect EU customer data privacy. However, in an unexpected twist, uncertainties may threaten the Privacy Shield: The White House passed a directive in...more

Processor BCRs Under the GDPR: Realizing the Potential

by Alston & Bird on

Binding Corporate Rules (BCRs) are an intracompany code of conduct that regulates the principles and rules that apply to the processing and transfer of personal data within a company group, including cross-border. BCRs were...more

New Mexico Enacts Data Breach Notification Act (Updated)

by Jackson Lewis P.C. on

New Mexico has become the 48th state to enact a data breach notification law requiring that individuals be notified of security breaches of information involving personal identifying information. Governor Susana Martinez...more

Deeper Dive: Frequency and Severity

by BakerHostetler on

All industries are affected by cyberattacks, but how often and to what extent they occur vary greatly by industry type. As for frequency, the healthcare industry in 2016, for the third year in a row, saw the greatest...more

Be Compromise Ready: Go Back to the Basics

by BakerHostetler on

We are excited to release our third annual BakerHostetler Data Security Incident Response Report. This report analyzes the more than 450 data security incidents we led clients through in 2016. Companies continued to...more

Your Business Drone Crashed... What Do You Do?

by Rumberger Kirk & Caldwell on

Understanding FAA & NTSB Drone Accident Reporting Requirements - When a corporate drone crashes, it can be one of the worst-case scenarios for owners who rely on UAS technology to conduct a wide-array of business...more

2,532 Results
|
View per page
Page: of 102
Cybersecurity

Follow Privacy Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!