Science, Computers & Technology General Business Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Cliff Notes from the Joint OCR/NIST HIPAA Security Conference

As a service to our readers, we have distilled last week’s joint HHS Office of Civil Rights (OCR) and National Institute of Standards in Technology (NIST) conference, “Safeguarding Health Information: Building Assurance...more

Cyber Liability Insurance: Where’s the Beef?

“Cyber liability insurance” is often used to describe a range of insurance policies, in the same way that the word cyber is used to describe a broad range of information security related tools, processes and services....more

Mobile apps – increasing privacy transparency is on top of your to-do list!

As previously announced, the Global Privacy Enforcement Network (GPEN) recently released the results of the global privacy sweep of mobile applications it conducted in May 2014....more

Privacy & Cybersecurity Update - September 2014

In This Issue: - Home Depot Data Breach — Lawsuits, Calls to Action and Lessons Learned - Skadden Participates in FBI Cyber-Intelligence Workshop - FTC Explores Impact of ‘Big Data’ on American...more

Cyber Risk Insurance: Surging Demand and Evolving Coverage

Cyber risk insurers are doing a brisk business these days. Reports of data breaches abound, and risk managers are understandably looking to offload some of the risk through insurance. As a result, insurers are issuing new...more

FFIEC Announces Cybersecurity Preparedness Efforts

The Federal Financial Institutions Examination Council (FFIEC) recently announced a series of initiatives aimed at promoting cybersecurity preparedness for community financial institutions throughout the country....more

Your Client is Hacked and Personal Information is Leaked Online – Now What?

You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more

How EU data protection laws impact cross-border FCPA investigations

EU data protection laws apply to "personal data" in the broadest sense. For instance, a business email sent by an employee from the office constitutes "personal data" as long as the email directly or indirectly identifies an...more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

The Human Element of Information Security, Continued - In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the...more

Intel Committee Chief Says Cyber Bill Could Face Two-Year Wait

On September 19, 2014, House Intelligence Committee Chairman Mike Rogers followed up on comments he and Senate Intelligence Committee Vice Chairman Saxby Chambliss made last week concerning the prospects for cybersecurity...more

Five Basic Steps for Dealing with Cybersecurity Threats

Recent legal headlines have been filled with news about data breaches and lapses of information security across all sectors of the economy. Hospitals, colleges, and even major international retailers such as Target and Home...more

How To Avoid Common Data Breach Pitfalls

Cost of Data Breach in 2014: - $5.9 million U.S. average cost of a data breach - 15% Annual increase in the average cost of a data breach around the world - $201 Average cost paid for each exposed...more

Bipartisan LEADS Act Aims to Protect Data Stored Abroad

On September 18, 2014, Senators Orrin Hatch, Dean Heller and Chris Coons introduced "The Law Enforcement Access to Data Stored Abroad Act" (LEADS), a bill that would amend provisions in the Electronic Communications Privacy...more

Today's special - fraud, hammers and nails

"... the company was slow to respond to early threats and only belatedly took action." By now we've all heard about the latest credit card breach within Home Depot - that account information of 56 million cardholders...more

The Internet of Things: The Future of Listening

What is the Internet of Things? - The Internet of Things (IoT) conceptually refers to the dynamic networks that link physical objects with the virtual world via Internet connection, enabling “things” to sense, log,...more

Users Choose The Rules of Reddit – Which Is Why They Need Code of Ethics Training

If you haven’t heard about it already, or maybe you are just like me and try and stay out of the celebrity gossip as much as possible, there has been a leak of several celebrities’ nude photos across the internet. Celebrities...more

Italian Data Protection Authority: analysis of the first half 2014 and action plan

The Italian Data Protection Authority (Garante) has recently made available the results of the first half 2014 activities: 196 inspections, fines issued in the range of 2,5M Euro (already collected). ...more

So You Think You Have a Point of Sale Terminal Problem?

If your company has a Point of Sale (POS) terminal anywhere in its infrastructure, you are no doubt aware from the active media coverage that malware attacks have been plaguing POS systems across the country....more

The Home Depot Data Breach: There’s No Time Like the Present for Cybersecurity

As Home Depot’s recent cybersecurity breach emphasizes, there is no time like the present to institute controls designed to prevent an attack. In the latest data security breach, Home Depot’s servers were broken into,...more

Post navigation Cyber Insurance Primer – An Overview of Coverages

Insurance coverage for cyber risk – both first-party and third-party loss – is a burgeoning type of insurance many major carriers are now offering to their policyholders. In view of this significant growth, this blog will –...more

Intellectual Property and Technology News (Asia)

Welcome to the most recent Asia Pacific edition of Intellectual Property and Technology News, our biannual publication designed to report on worldwide developments in IP and technology law, offering perspectives, analysis and...more

HIPAA Omnibus Rule: Deadline Approaching to Update Grandfathered Business Associate Agreements

Although the HIPAA Omnibus Rule (the “Rule”) went into effect nearly 18 months ago, the transition period for bringing business associate agreements into compliance with the Rule’s new requirements will end on September 23,...more

Emerging Technologies Push the Boundaries of Privacy Law

As technology developers continue to push the envelope on services and applications affecting the daily lives of consumers, the intersection of technology and privacy is becoming increasingly fraught with legal implications...more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

The Human Element of Information Security - In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the data...more

Why Worry About a Little Skimmer?

Merchants—rightfully so—are worried about securing their payment card environments so that their name does not appear in a headline discussing how millions of cards were stolen from them. Faced with the challenge of...more

1,058 Results
|
View per page
Page: of 43

Follow Science, Computers & Technology Updates on: