Science, Computers & Technology General Business Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Data breach coverage denial upheld by Connecticut Supreme Court

In a 3 page per curiam decision issued this week, the Connecticut Supreme Court upheld a lower court’s decision holding in Recall Total Information Management, Inc., et. al v. Federal Insurance Company, that Federal Insurance...more

April Brings Amendments to Washington and North Dakota Breach Notification Requirements

April saw amendments to Washington State's and North Dakota's breach notification statutes. In a prior Orrick Alert, we discussed some of the implications from the proposed data breach notification amendments in...more

Connecticut Affirms Personal Injury Coverage for Data Breach Requires Actual Publication

As expected, the Connecticut Supreme Court has affirmed decisions by both the trial court and intermediate appellate court that personal injury liability coverage for a business’s data loss or theft requires publication as a...more

Guidance for Incident Response Plans  

Organizations are preparing for data incidents and breaches by developing, updating, implementing, and testing incident response plans. This article provides a checklist of key components of an incident response...more

What The Nomi Case Could Mean For Retail Tracking

In law school, everybody learns the adage that hard cases make bad law. When it comes to the Federal Trade Commission, a better aphorism might be, “easy cases make new law.” The FTC’s recent settlement with Nomi Technologies...more

Cyber Resilience for Financial Services Entities

In March this year, the Australian Securities and Investments Commission (ASIC), issued Report 429 Cyber resilience: Health check (REP 429). The report aims to highlight the importance of cyber resilience for entities...more

Connecticut Supreme Court Affirms No Coverage for Lost Tapes Absent Publication of Data

In Recall Total Information Mgmt., Inc. v. Federal Ins. Co., SC19201 (Conn. May 18, 2015), the Connecticut Supreme Court held that where there was no factual support that anyone ever actually accessed private information...more

The DOJ’s New Cyber Security Best Practices — Creating a Standard of Care?

On April 29, 2015, the U.S. Department of Justice Computer Crime and Intellectual Property Section (“DOJ”) issued version 1.0 of its “Best Practices for Victim Response and Reporting of Cyber Incidents.” It draws on “lessons...more

Cybersecurity: Integral to Overall Risk Management for Insurers and TPAs

Recent data breaches have brought cybersecurity to the attention of insurance companies, and serve as a reminder to third party administrators ("TPAs") that cybersecurity issues are a serious compliance and regulatory...more

Explaining the Implications for Merchants of EMV and the Liability Shift

The EMV liability shift is coming. Sounds ominous, but what does it really mean? And how can retailers and merchants determine the potential impact of the shift on their business? Like many issues in the payment card...more

Mobile Privacy Rules to Be Enforced Starting September 1, 2015

All businesses acting in the mobile ecosystem—including app developers, analytics companies, advertising networks, app platform providers, and providers of devices and related services—should be aware that the Digital...more

Target Court Refuses to Block MasterCard Settlement Reached Prior to Class Certification

In another development in the multi-faceted litigation arising from Target’s December 2013 data breach, Defendant Target announced a tentative $19 million settlement with non-party MasterCard, to resolve claims of...more

U.S. SEC Division of Investment Management Issues Cybersecurity Guidance

The Division of Investment Management (Division) of the U.S. Securities and Exchange Commission (SEC) issued a Guidance Update on April 28, 2015 (Guidance) relating to the cybersecurity of registered investment companies and...more

The Data Breach Notification That Cried Wolf: How Connecticut’s Overbroad Data Breach Notification Statute Undermines the...

Connecticut’s data breach statute is a wolf in sheep’s clothing. That statute’s definition of “breach of security” is overbroad, encourages over-notification, and undermines the goal of protecting consumers from identity...more

Quirky Question #260, Data breach incident response plans

Question: For data breach preparation, what guidance have federal and state regulators issued regarding incident response plans? Originally published on IRMI.com....more

Patriot Act Reauthorization Debate Delays Cybersecurity Legislation

In This Issue: - Industry Liability Protections and Standards - Legislative Timeframe - Additional Notification Bill Expected - Conclusion - For More Information - Excerpt from Industry...more

The Cost of a Data Breach

In 2014, the Ponemon Institute published the 2014 Cost of Data Breach Study that includes interesting cost information related to remediation efforts undertaken by 61 companies that operate in the United States....more

[Webinar] Compliance Agility: Managing Privacy in a Dynamic Environment - June 9, 1:00-2:00 pm Eastern

Privacy risk, legislation, and regulation is growing at an exponential rate. Organizations – themselves in constant states of change – are struggling to keep up and fearful because a single organizational change, be it...more

Gavel to Gavel: Protect your data

The ever-increasing expense of corrective actions taken by companies after data breaches is often publicized. What’s not as apparent, or as publicized, are steps companies can take that may reduce the costs and the likelihood...more

SEC Division of Investment Management Issues Cybersecurity Guidance for Investment Funds and Advisers

The U.S. Securities and Exchange Commission’s (“SEC”) Division of Investment Management (“Division”) recently released a Guidance Update (“Guidance”) highlighting the importance of cybersecurity for registered investment...more

DHS Breaks New Ground With Issuance of SAFETY Act Certifications for Advanced Cybersecurity Defense Systems

FireEye’s MVX and DTI Technologies become the first cybersecurity products to earn certification as “Qualified Anti-Terrorism Technologies.” The Department of Homeland Security (DHS) crossed an important barrier in...more

CFTC’s Market Risk Advisory Committee to Meet on June 2

The Commodity Futures Trading Commission’s Market Risk Advisory Committee (MRAC) will hold a public meeting at the CFTC’s headquarters in Washington, DC on June 2. MRAC will consider issues including the appropriate industry...more

Cloud Computing Contracts Top Issues for Healthcare Providers

In this Issue: - Summary - Overview - Cloud - Use - Security - Privacy - Functions - Availability - Performance - Location - Services -...more

2015 BakerHostetler Incident Response Report Deeper Dive—Retailer Liability Arising from Stolen Payment Cards

We released the inaugural BakerHostetler Data Security Incident Response Report, which provides insights generated from the review of more than 200 incidents that our attorneys advised on in 2014. Over the next four weeks, we...more

Guidance for Incident Response Plans

Organizations are preparing for data incidents and breaches by developing, updating, implementing, and testing incident response plans. This article provides a checklist of key components of an incident response...more

1,398 Results
|
View per page
Page: of 56

Follow Science, Computers & Technology Updates on:

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×