Science, Computers & Technology Business Organization Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Advertising and Marketing News from Ifrah Law’s FTCBeat.com, Volume 6

Internet Advertising and Marketing Summer Newsletter from Ifrah Law with updates you won't want to miss!...more

How Businesses Can Reduce Cyber Risk: Pre and Post Incident: Businesses Need to Take a More Proactive Approach to Reducing What Is...

As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more

RadioShack’s Consumer Data: A Highly Scrutinized Asset

Following the Texas Attorney General’s objection to the sale of RadioShack Corporation’s consumer data as an asset in its bankruptcy, 37 other state attorneys general and a large number of other consumer protection entities...more

Travel Wi-Fi and Security. You May Not Know Who’s Watching.

Over the past few years, users have become increasingly aware of the inherent dangers of connecting to unsecured Wi-Fi networks. Unfortunately, existing security vulnerabilities in the underlying network hardware may still...more

Cyber Security - Risk Management and Mitigation

In This Issue: - Agenda - Current Threat Environment - Current Threat Environment - Strategic Importance - Asian Data Privacy Regimes At-A-Glance - Data Protection: Regional temp - Asia-Pacific...more

Cybersecurity: Where Does the Buck Stop?

Over the last few months, we’ve been talking about cybersecurity issues for employers. We’ve discussed the responsibilities and risks associated with personally identifiable information and the wave of lawsuits resulting...more

Largest Breach in U.S. Government History Is a Wake-Up Call on Need for Encryption

Employees are reasonable in assuming that their employer is protecting their personal information from compromise. The obvious way to do that is to maintain appropriate encryption technology. Simply put: encryption,...more

[Webinar] Digital Health Update: Focus on Health Tech Startups - June 23, 1:00 CDT

Health care startups are expected to attract billions in venture capital in the next few years. Despite the pace and excitement this surge of investment creates, these next-wave digital disruptors need to keep three legal...more

House Passes Cyber Sharing Bills and Congress is Focusing on Data Protection

On Wednesday, April 22, 2015, the U.S. House of Representatives passed the Protecting Cyber Networks Act ("PCNA"), which would give companies certain liability protection against potential lawsuits when sharing cyber threat...more

The Intersection of Cyber and D&O Coverage [Video]

From the 2015 PLUS D&O Symposium session “Parting Shots: A Conversation with Industry Leaders,” moderator James Skarzynski (Skarzynski Black LLC) and panelists Dan Fortin (Berkshire Hathaway Specialty Insurance), Lisa Butera...more

Mobile Apps & the Law - Popular Reads on JD Supra

ICYMI a recap of recent well-read posts on JD Supra at the intersection of mobile apps and the law....more

A Deeper Dive: Risk Assessments Are a Necessary Step in Creating Layered Cyber Defenses

Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more

The Buck Stops Here: CEOs Held Most Accountable by Directors for Major Data Breaches

According to a recent joint survey of nearly 200 directors of public companies by the New York Stock Exchange and Veracode, CEOs are most likely to be held responsible in the event of a major data breach, ahead of the chief...more

Strategies For Businesses Protecting Electronic Data Within California

Businesses in California have a number of tools with which to fight off unauthorized intrusions into their electronic data whether perpetrated by employees, former employees, disreputable competitors or random hackers....more

How to Avoid Choosing the Wrong Cybersecurity Firm

Although the inherent nature of cybersecurity radiates urgency, businesses should not let this characteristic dictate the vendor selection process....more

SEC Issues New Guidance on Cybersecurity for Investment Companies and Investment Advisors

On April 28, 2015, the SEC's Division of Investment Management released a Guidance Update providing cybersecurity guidance for investment companies and investment advisors (firms). The SEC has prioritized cybersecurity as a...more

Fitbit IPO Cyber Risk Disclosures

Earlier this month, fitness-tracking company Fitbit, Inc. filed a Form S-1 Registration Statement for an IPO of up to $100 million that exhaustively disclosed potential cybersecurity risks with respect to the personal data...more

Inside Insight: How the FTC Approaches Data Breach Investigations

A data breach hurts in a myriad of ways – the tarnished image of the breached company, the diminished consumer trust, and the bottom-line impact of remedial costs and lost business. The last thing a company already reeling...more

Damage Control: After an Insider Breach

In the immediate aftermath of a major security or data breach companies should re-evaluate their risk management systems. In a previous post on insider threats, we outline what a company can do to prevent risks associated...more

Data Breach Increases Show Importance of Data Security Compliance in Business Sector

Data breaches have seen a lot of media attention in the past year, but that should come as no surprise since 2014 was a record year for them. According to a report by the Identity Theft Resource Center, there were 783 tracked...more

Roadmap Offers Important Insights on How to Prepare for FTC Data Breach Investigations

On May 20, 2015, Federal Trade Commission Assistant Director Mark Eichorn of the Bureau of Consumer Protection’s Division of Privacy and Identity Protection (DPIP) offered an inside look into the FTC’s investigative process...more

Blue Pill/Red Pill: How Officers and Board Members Can Swallow the Red Pill and See the Real World of Cybersecurity

Trying to understand how a hacker thinks can twist your brain around – while you normally think about how to make something work or why something is not working, hackers think how to get something to work in ways that it is...more

Nevada Broadens Definition of Personal Information for Purpose of Encryption and Breach Notices

On May 13, Nevada passed a new law (A.B. 179) expanding the definition of “personal information” to include a natural person’s first name or initial and last name in combination with: 1) medical and health insurance...more

7 Important Considerations for European Hotlines

As any organization that operates internationally knows, there are varying levels of data protection that are implemented from country to country. The idea is to share data in a manner that also protects personal privacy and...more

Justice to Target Corporations and C-Suite Executives in the Healthcare Industry

On Thursday, May 14, 2015, at a meeting of the American Bar Association’s Healthcare Fraud Section, Leslie Caldwell, the Assistant Attorney General for the Department of Justice (DOJ) Criminal Division, declared stamping out...more

179 Results
|
View per page
Page: of 8

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×