Science, Computers & Technology Business Organization Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Yahoo Breach and Data/Information Security

The massive breach of accounts at Yahoo revealed on September 22, 2016, brings several thoughts to mind: The purchase of Yahoo by Verizon Wireless has not yet closed. Any companies undergoing diligence on the M&A front...more

Is your cybersecurity upgrade FDA reportable?

In today’s marketplace, technology evolves at a rapid rate, and must adapt to changing circumstances, such as threats to cybersecurity. For device companies, some types of modifications to devices post-market - potentially...more

Big Data, Big Risk? Privacy and Security Tips for Fintech Companies

Many fintech companies collect and process vast amounts of data in order to provide financial services quickly and inexpensively. Much of this data is highly sensitive personal information such as date of birth, social...more

New York proposes cybersecurity regulation aiming to protect financial services companies from criminal enterprises

The New York State Department of Financial Services (NYDFS) has set forth a proposed cybersecurity regulation for financial service companies. Announced this week by New York  Governor Andrew M. Cuomo, the proposed rule seeks...more

Blog: BDO Analysis Of Tech Industry Risk Factors Shows Increased Impact Of Cybersecurity And M&A Concerns

An analysis by audit firm BDO of the incidence of disclosure of various risk factors among tech companies over five years reflects increased emphasis on security breaches, the impact of M&A (including goodwill impairment) and...more

Asset Protection Wake Up Call: Data Security Top Concern for High Net Worth Investors

A recent study asked high net worth investors which of the following issues they were most concerned about: terrorism, data security, or a major illness. The most prevalent response might surprise you. Seventy-two percent...more

It's All About Blockchain - Don't Miss These 7 Reads

Don't miss these seven popular reads on Blockchain....more

Coal Plant Shutdowns: Operators Have Cyber Protection Obligations Even After Closing

As Yogi Berra used to say: “It ain’t over till it’s over.” Coal plant operators shutting down their plants should remember this phrase. Even after they throw the breakers, go off the grid, are no longer contributing to the...more

The Pitfalls of Using Technology to Improve Compliance Effectiveness; Cecelia Jefferson Explains [PODCAST]

Everybody has the intention of being committed to compliance, but when resources need to be devoted to compliance, the company’s true commitment comes into focus. Cecelia Jefferson is a strategic, multi-talented...more

German DPAs to Create Model Processing Records for GDPR Compliance

On May 25, 2018, the EU General Data Protection Regulation (GDPR) enters into force. One of the major changes the GDPR introduces is a duty for in-scope controllers and processors to maintain written records of processing...more

Cybersecurity, Cyber Insurance: What Fund Directors Need to Know

Cyberattacks are attempts by hackers to damage, destroy and/or steal data from a computer network or system. From 2013 to 2015, more than 153.6 million people had information stolen in cyberattacks involving companies such as...more

UK Financial Conduct Authority—Regulated Firms Can Go to the Cloud

July 7, 2016, saw the UK’s Financial Conduct Authority (FCA) publish fresh guidance in order to clarify the requirements which apply to the financial services firms it regulates when outsourcing to the cloud. When the FCA...more

Locke Lord Article: EU-U.S. Privacy Shield Now Available: What impact will it have on personal data transfers?

Beginning on August 1, 2016, U.S. companies have a new way to legally facilitate the transfer of personal data from the European Union to the U.S. Known as the EU-U.S. Privacy Shield, this new agreement between the EU and the...more

How Data Scientists & Compliance Can Work Together Better; Keith Furst Explains [PODCAST]

Data scientist Keith Furst and Masters of Disaster® podcast host Leona Lewis discuss how data scientists and compliance can collaborate better to get compliance the data it needs. It is almost impossible to have one...more

Big Risks in Big Data; Edward Chenard Explains [PODCAST]

Edward Chenard explains on the Masters of Disaster® podcast the significant risks that go along with the potential benefits of data science. Privacy practices around how company information is used extend to big data...more

This Week in Privacy Shield Developments

It’s been another exciting week of developments for U.S. companies on the EU data transfer front. From the first company to indicate that it will certify under Privacy Shield, to the first European Data Protection Authority...more

Is Your Business Ready to Wield the Privacy Shield?

Beginning August 1, U.S.-based companies that self-certify their compliance with the EU-U.S. Privacy Shield will be able to import data under the new data transfer framework. But how can your company best...more

E Pluribus Unum Is for eDiscovery Too

The proliferation of data to the point of excess is a common refrain and problem for many organizations today. The scale to which data has grown recently has a direct correlation to eDiscovery – as organizations struggle to...more

EU Commission Publishes Long-Awaited Privacy Shield Citizen’s Guide

Just over two weeks ago, the European Commission formally adopted the US-EU Privacy Shield. As part of making Privacy Shield accessible to EU residents, the Commission has long planned to issue a “Citizen’s Guide” to the...more

Cybersecurity in life sciences: what is your duty of care?

Cybersecurity continues to be headline-grabbing news, particularly following recent reports of high-profile cyber attacks on a number of major well-known corporations. Conscious of their fiduciary duties, boardrooms of global...more

Are You an Insider? Data Privacy Challenges Posed by New Insider List Requirements

The EU’s Market Abuse Regulation (“MAR”) came into effect on July 3, 2016 replacing the EU’s Market Abuse Directive. Unlike the Directive, the MAR has direct effect in each EU member state, including the UK....more

IT, Commercial and Outsourcing Contracts: Brexit Top 10

According to Theresa May, the UK’s recently installed prime minister, Brexit means Brexit. But what this actually means in practice is still unknown. There is still a huge amount of debate over what Brexit will look like,...more

Is the Privacy Shield Viable? Article 29 Working Party Proposes to Wait for Its Final Verdict

After its first draft of February 29, 2016, the European Commission adopted the EU-U.S. Privacy Shield adequacy decision on July 12, 2016. The first draft was adopted after the cancellation of the Safe Harbor by the Court of...more

Popular Cybersecurity Reads - Trending Right Now

Cybersecurity issues transcend numerous sectors, marketplaces, industries - as evidenced by this list of recent popular reads on the topic....more

Cybersecurity and Data Privacy: Confidential Data Breach - Escaping Potential Liability (7/16)

The first question asked by many companies after a data breach is – What is our potential liability? On July 12, 2016 a Missouri Federal Court issued a ruling that companies should be aware of when defending customers’ claims...more

361 Results
|
View per page
Page: of 15

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×