Science, Computers & Technology Business Organization Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Cybersecurity, Corporate Governance, and Risk Management: Best Practices

As litigators, we help clients resolve conflicts that have matured into disputes. In the realm of cybersecurity, we defend claims brought by private parties or governmental entities against companies facing the fallout from...more

Privacy & Cybersecurity Newsletter: April 2016

What seems like a long time ago now, in 2011 PricewaterhouseCoopers (PwC) warned that “there is no question that law firms are among the companies being targeted by cyber criminals.” Despite this, many law firms believed (or...more

Phishing and Spoofing Scams — A Few Tips to Protect Yourself and Your Business

The phone rings. The caller ID says it’s your attorney’s office. When you answer, you are told you owe your attorney additional money and are directed to call a toll-free number. When you call the number, you are told how...more

Venture Capital Coast to Coast – April 2016

VC WATCH - The Venture Capital “Reset” – We Were Expecting You - Venture capital fundraising declined in 2015, with total money raised down more than 9 percent and a 13 percent decrease in the number of fund...more

Cybersecurity Advice to CEOs and Boards “Take more responsibility”!

The White House and its top security advisors are regularly advised about cyberintrusions and as a result the “time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security”...more

Tennessee Amends Its Data Breach Notification Laws

Removes the Encryption Safe Harbor, Limits the Timing of Notice, and Expands “Unauthorized Persons” - Effective July 1, 2016, Tennessee becomes the first state to remove the encryption safe harbor from its data breach...more

Revenge of the Dorks: Their Time Has Come and They Might be Malicious

A nerd. A dork. A geek. You’ve seen them. You know them. Maybe you are one of them. And you definitely know the type. In fact, it was way back in the 1980s when a group of bullied collegiate outcasts rose up to defeat an...more

Preparing Your Organization Today to Win Its Future (Possibly Inevitable) Cyber Lawsuit: Making Crown Jewels Out of Paper

One day in the not too distant future, your organization may be fighting to protect its balance sheet against high-stakes claims in a cyber tort trial. Arrayed against you will be the best of the class action plaintiff’s...more

Shielded but Not Covered – Privacy Demands Better Protection

Yesterday, the Article 29 Working Party took action which some found surprising and others predicted. It found the EU-U.S. Privacy Shield did not contain adequate protections and needs further improvement. While...more

It’s Not Just the Internet of Things Anymore

Last year, there were an estimated 16 billion devices connected to the Internet, and predictions say that the number will rise as high as 30 billion devices by 2020. The Internet of Things (IoT) has gained publicity (or...more

WP 29 Expresses Concerns About EU-U.S. Privacy Shield

This April 13, the Article 29 Working Party (WP 29, which includes the EU national data protection authorities) expressed its concerns regarding the Privacy Shield during a press conference. The WP 29 will publish its...more

Is Data Really a “Toxic” Asset?

In his “Data Is a Toxic Asset” blog post, Bruce Schneier argues that data is a toxic asset and that the lesson all the recent data breaches are teaching us is that storing this asset is “dangerous,” because it makes companies...more

FDIC’s Corporate Governance Guidance Reinforces Board of Directors’ Role in Cybersecurity Preparedness

The Federal Deposit Insurance Corporation has long considered a community bank’s board of directors as one of the most important elements in the successful operation of a bank. Nearly thirty years ago, the FDIC issued its...more

Benefits of using thin and zero client’s vs desktop PC’s

What are “thin clients” and their close cousins “zero client devices”? You probably have a desktop computer or laptop computer at work and all the software you use is installed on that computer. Although your data is...more

Information Security and Privacy Group News: Cities and Towns Being Targeted by Hackers: Connecticut Municipalities Must Follow...

In the world of data breaches, John Chambers, CEO at Cisco, explained it best: "There are only two kinds of companies. Those that were hacked and those that don’t yet know they were hacked." With the ever increasing rate of...more

HR Departments Beware: Major Tax Season Phishing Scheme Claims Multiple Victims

Another new phishing scheme has tricked numerous employers into disclosing highly sensitive, employee information. In the wake of tax season, spoofing emails were sent to payroll and human resource personnel at various...more

On the Front Lines of Cybersecurity: The Corporate Challenge

Are corporate boards suffering from cyber fatigue? Hardly. Recent surveys tell us that cybersecurity is the top risk faced by corporate America. The Bank Director’s 2016 Risk Practices survey – out yesterday –...more

Our Global Privacy Officer Answers Data Privacy FAQs

Every company in the world stores data—and much of it is personal information about customers, employees, vendors and other stakeholders. Regardless of size, industry or location, these organizations are obligated to follow a...more

Corporate and Financial Weekly Digest - Volume XI, Issue 9

SEC/CORPORATE - SEC Chair Addresses Advisory Committee on Small and Emerging Companies - On February 25, Securities and Exchange Commission Chair Mary Jo White addressed members of the SEC’s Advisory Committee on...more

DHS/DOJ Issue Guidance on Cyber Threat Info Sharing

On February 16, 2016, the Department of Homeland Security (DHS) and Department of Justice (DOJ) issued “guidance” to assist federal agencies and non-federal entities in implementing the Cybersecurity Act of 2015.  The Act was...more

CFTC’s New Proposed Rules Mandate Extensive Cybersecurity Testing; Comments Due Feb. 22, 2016

On December 16, 2015, the Commodity Futures Trading Commission (“CFTC”) released two Notices of Proposed Rulemaking (“NPRMs” or “Proposed Rules”) that would, if finalized, supplement existing regulations covering the...more

SEC Enforcement Lays out Approach to Cybersecurity Cases

If you’ve ever attended the annual SEC Speaks conference, you know that the official program is an intensely uninteresting collection of short speeches by SEC officials who don’t have a lot of incentives to say groundbreaking...more

FDIC & Cyber: Words of Warning to Financial Institutions and their Boards

Financial institutions sit atop a wealth of personal information – not to mention money. In an interconnected world in which sensitive customer information is stored on servers and in the cloud – and online and mobile...more

How to Choose the Right Cybersecurity Firm [Video]

Cybersecurity and Data Privacy Lawyer Kaylee Cox suggests four essential elements to consider when selecting a cybersecurity firm for your business....more

FDIC "Framework for Cybersecurity" Highlights How Financial Institution Information Security Programs Can Better Respond to...

In February, 2016, the Division of Risk Management Supervision of the Federal Deposit Insurance Corporation (“FDIC”) published “A Framework for Cybersecurity.” The article provides a good “sanity check” for financial...more

299 Results
|
View per page
Page: of 12

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×