Science, Computers & Technology Business Organization Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Prepare for the Hack: Five Things to Keep in Mind when Shopping for Cybersecurity Insurance

When your company's confidential information ends up on the dark web, it is obviously too late to start thinking about adequate insurance coverage for the barrage of claims and expenses that are about to hit like a tidal...more

Bitcoin: Cybersecurity Regulations on the Horizon?

As legislators grapple with creating legislation intended to bring virtual currencies, such as bitcoin, within the scope of anti-money laundering regulations, the vulnerability of Bitcoin exchanges to theft and other cyber...more

Industry Insight: Information Governance – Leverage Your Business Intelligence and Reduce Risk

“The goal is to turn data into information, and information into insight.” – Carly Fiorina, former CEO, Hewlett-Packard Co. The most valuable asset of every organization is information. Organizing, analyzing and...more


Following the UK Brexit referendum businesses will now find themselves assessing their future. Below is a checklist designed to raise some important questions that should be considered in order to assess potential risks and...more

The New European Union-U.S. Data Privacy Shield…Is It Right for You?

U.S. companies with transatlantic operations should carefully balance the need to transfer personal data about European customers and employees from Europe to the U.S. in light of the increased burdens and cost of compliance...more

Social Media Safety Guide for Companies

We’re delighted to publish our Social Media Safety Guide for Companies, which highlights key considerations to keep in mind in using social media to promote your company’s products and services and to engage with customers....more

Three Steps to the Right Cloud for Your Business

The term “cloud computing,” — a process by which remote computers are used to store, manage and process data — is no longer an unfamiliar term. According to at least one estimate, “approximately 90 percent of businesses...more

In Case You Missed It: Launch Links - September, 2016 #4

Some interesting links we found across the web this week: The Hacking Law That Can’t Hack It - For 30 years and counting, courts have struggled with the vagaries of the Computer Fraud and Abuse Act, a federal law...more

Privacy and Cybersecurity Checklist When Designing a Family Office

As family office executives set up a family office or review an existing family office, it is important to make sure the privacy and cybersecurity concerns are addressed and the governance and information security...more

Commerce Secretary: Trust Gap Hinders Cyber Attack Reporting

In a keynote address delivered on September 27, 2016 at the U.S. Chamber of Commerce’s fifth annual Cybersecurity Summit in Washington, DC, Commerce Department Secretary Penny Pritzker conceded that “the federal government...more

Yahoo Breach and Data/Information Security

The massive breach of accounts at Yahoo revealed on September 22, 2016, brings several thoughts to mind: The purchase of Yahoo by Verizon Wireless has not yet closed. Any companies undergoing diligence on the M&A front...more

Is your cybersecurity upgrade FDA reportable?

In today’s marketplace, technology evolves at a rapid rate, and must adapt to changing circumstances, such as threats to cybersecurity. For device companies, some types of modifications to devices post-market - potentially...more

Big Data, Big Risk? Privacy and Security Tips for Fintech Companies

Many fintech companies collect and process vast amounts of data in order to provide financial services quickly and inexpensively. Much of this data is highly sensitive personal information such as date of birth, social...more

New York proposes cybersecurity regulation aiming to protect financial services companies from criminal enterprises

The New York State Department of Financial Services (NYDFS) has set forth a proposed cybersecurity regulation for financial service companies. Announced this week by New York  Governor Andrew M. Cuomo, the proposed rule seeks...more

Blog: BDO Analysis Of Tech Industry Risk Factors Shows Increased Impact Of Cybersecurity And M&A Concerns

An analysis by audit firm BDO of the incidence of disclosure of various risk factors among tech companies over five years reflects increased emphasis on security breaches, the impact of M&A (including goodwill impairment) and...more

Asset Protection Wake Up Call: Data Security Top Concern for High Net Worth Investors

A recent study asked high net worth investors which of the following issues they were most concerned about: terrorism, data security, or a major illness. The most prevalent response might surprise you. Seventy-two percent...more

It's All About Blockchain - Don't Miss These 7 Reads

Don't miss these seven popular reads on Blockchain....more

Coal Plant Shutdowns: Operators Have Cyber Protection Obligations Even After Closing

As Yogi Berra used to say: “It ain’t over till it’s over.” Coal plant operators shutting down their plants should remember this phrase. Even after they throw the breakers, go off the grid, are no longer contributing to the...more

The Pitfalls of Using Technology to Improve Compliance Effectiveness; Cecelia Jefferson Explains [PODCAST]

Everybody has the intention of being committed to compliance, but when resources need to be devoted to compliance, the company’s true commitment comes into focus. Cecelia Jefferson is a strategic, multi-talented...more

German DPAs to Create Model Processing Records for GDPR Compliance

On May 25, 2018, the EU General Data Protection Regulation (GDPR) enters into force. One of the major changes the GDPR introduces is a duty for in-scope controllers and processors to maintain written records of processing...more

Cybersecurity, Cyber Insurance: What Fund Directors Need to Know

Cyberattacks are attempts by hackers to damage, destroy and/or steal data from a computer network or system. From 2013 to 2015, more than 153.6 million people had information stolen in cyberattacks involving companies such as...more

UK Financial Conduct Authority—Regulated Firms Can Go to the Cloud

July 7, 2016, saw the UK’s Financial Conduct Authority (FCA) publish fresh guidance in order to clarify the requirements which apply to the financial services firms it regulates when outsourcing to the cloud. When the FCA...more

Locke Lord Article: EU-U.S. Privacy Shield Now Available: What impact will it have on personal data transfers?

Beginning on August 1, 2016, U.S. companies have a new way to legally facilitate the transfer of personal data from the European Union to the U.S. Known as the EU-U.S. Privacy Shield, this new agreement between the EU and the...more

How Data Scientists & Compliance Can Work Together Better; Keith Furst Explains [PODCAST]

Data scientist Keith Furst and Masters of Disaster® podcast host Leona Lewis discuss how data scientists and compliance can collaborate better to get compliance the data it needs. It is almost impossible to have one...more

Big Risks in Big Data; Edward Chenard Explains [PODCAST]

Edward Chenard explains on the Masters of Disaster® podcast the significant risks that go along with the potential benefits of data science. Privacy practices around how company information is used extend to big data...more

371 Results
View per page
Page: of 15

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.