Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Polsinelli Podcast - Telephone Consumer Protection Act and Consequences for Corporations
Cullen & Dykman Sees Colleges Calling for Title IX Help v
Legal Minute: Cybersecurity Reporting Requirements for Government Contractors
Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
In the wake of reported security breaches at a number of significant financial institutions, cybersecurity is garnering more attention and concern than ever before — both within the financial services industry and among...more
In a recently-released Form 8-K filing announcing fourth quarter and year-end financial results, Target Corporation reported that expenses incurred in 2014 relating to its 2013 data breach totaled over $191 million. Those...more
FINRA recently issued a Report on Cybersecurity Practices (“Report”), growing out of its targeted examination of firms last year. To issue the Report, FINRA gave careful consideration to the needs of many broker-dealers for...more
On February 3, 2015, the Securities and Exchange Commission’s (“SEC”) Office of Compliance Inspections and Examinations (“OCIE”) released a Risk Alert (the “2015 Risk Alert”) with summary observations from its recently...more
Twin reports provide a roadmap to best practices.
U.S. financial markets and participants, much like other segments of the U.S. economy, are prime targets for technological hacks, intrusions, and breaches that can occur...more
An SEC cybersecurity sweep examination by the SEC’s Office of Compliance Inspections and Examinations (OCIE) found that 88 percent of the broker-dealers (BDs) and 74 percent of the registered investment advisers (RIAs) they...more
On February 3, 2015, the U.S. Securities and Exchange Commission released a Risk Alert addressing cybersecurity issues at brokerage and advisory firms, along with suggestions to investors on ways they can protect themselves...more
As many of you know, last April the SEC issued the Cybersecurity Examination Initiative to assess the cybersecurity practices and preparedness of registered broker-dealers and investment advisers. The initiative arose from an...more
On February 3, 2015, the Office of Compliance Inspections and Examinations (OCIE) of the U.S. Securities and Exchange Commission (SEC) issued a Risk Alert summarizing findings from its examinations of over 100 registered...more
On February 3, 2015, the U.S. Securities and Exchange Commission (“SEC”) staff released two publications: the results of an examination sweep of 57 registered broker-dealers and 49 registered investment advisers, and guidance...more
We are pleased to share with you the BakerHostetler 2014 Year-End Review of Class Actions, which offers a summary of some of the key developments in class action litigation during the past year. Class action litigation...more
Cybersecurity is an increasing concern for companies. Last April, the UK Department for Business, Innovation & Skills (BIS) published the 2014 information security breaches survey: technical report. The report comprises the...more
The SEC today published in the Federal Register its Regulation SCI (Regulation Systems Compliance and Integrity), which requires key market participants to have and implement written policies and procedures reasonably...more
On November 19, 2014, the Securities and Exchange Commission (SEC) unanimously voted to adopt Regulation Systems Compliance and Integrity (Reg SCI), which will govern the technology infrastructure of the U.S.’s securities...more
While 2014 Has Seen Miami Emerge as a Growing Technology Hub, the Year Has Also Highlighted Significant Risks that Technology Poses for Businesses of all Types....more
This legal insight summarises many key points made at the 24th Annual Credit Law Conference (Conference) held on 1-3 October 2014 and attended by over 200 delegates from the financial services industry.
Hardly a month passes without headlines of a prominent business, from retail giants like Target and Home Depot to sophisticated financial institutions like JPMorgan Chase, experiencing a data breach involving the unauthorized...more
While Congress continues its aggressive push on cybersecurity legislation, regulatory oversight and legal efforts continue across the spectrum of industries effectively filling the gap in addressing now every day concerns...more
If a corporation is the target of a cyberattack resulting in a data breach, its board may be the target of a shareholder derivative action claiming breach of fiduciary duty. A recent example is Palkon v. Holmes, No....more
Community Health Systems, Inc. (“CHS”) reported yesterday that the information of approximately 4.5 million individuals has been affected by a Chinese cyber-attack. CHS and its affiliates own and operate 206 hospitals in 29...more
PricewaterhouseCoopers LLP (PwC) and Investor Responsibility Research Center Institute (IRRCi) have weighed in on the cybersecurity issue from an investor’s point of view in their paper called What investors need to know...more
Data security breaches—no industry is immune. These hackers can phish, spoof, skim, packet sniff, and key log their way into your system. Once a hacker successfully hacks into a corporation’s server, the breach will go...more
Debt collectors are using social media more and more frequently to try to track down people who owe money, but they are bound by restrictions in the Fair Debt Collection Practices Act when they do so, just as if they used...more
On June 10, 2014, Commissioner Luis A. Aguilar spoke at a NYSE conference, “Cyber Risks and the Boardroom,” about what boards of directors should do to ensure that their companies are appropriately considering and addressing...more
On April 15, 2014, the Office of Compliance Inspections and Examinations (OCIE) of the Securities and Exchange Commission (SEC) released a National Exam Priority Risk Alert announcing its initiative to evaluate cybersecurity...more
Find a Privacy Author »
Back to Top