News & Analysis as of

Science, Computers & Technology Consumer Protection Business Organization

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Financial Services Weekly News - September 2017

by Goodwin on

Editor's Note - The Roundup has been on hiatus since its August 23 edition. Since then, we have had the misfortune to witness the widespread devastation inflicted by Hurricanes Harvey and Irma. Our hearts go out to the...more

New Cybersecurity Report Asks the Private Sector to Join Forces with the Government

by McDermott Will & Emery on

The government is continuing to ask for more help from the private sector to defend against cyber attacks. The National Infrastructure Advisory Council (NIAC) recently published a report discussing current cyber threats and...more

SEC Focuses on Initial Coin Offerings: Tokens May Be Securities Under Federal Securities Laws

by Dechert LLP on

The U.S. Securities and Exchange Commission (SEC) has recently taken several actions to make clear that it is focused on and actively monitoring the rapidly growing market for so-called “token sales” or “initial coin...more

With Big Data Comes Big Responsibility

by NAVEX Global on

Big data refers to the huge and ever-growing volume of data organizations mine to uncover opportunities for building deeper customer relationships and developing new strategies for growth. Gartner describes big data as having...more

Proposed Changes to Singapore Personal Data Protection Act 2012

by Morgan Lewis on

The Personal Data Protection Commission is holding a public consultation exercise on its proposed changes to the Personal Data Protection Act 2012....more

High Security: How to Minimize Marijuana Data Risks

As we’ve blogged in the past, the cannabis industry is particularly susceptible to cyberattacks. With threats like a federal crackdown and workplace drug testing, customers have a vested interest in keeping their information...more

Passwords Remain Important for Data Security, FTC Reminds Businesses

For the most recent installment in the Federal Trade Commission’s “Stick with Security” series, the agency’s blog post focused on passwords....more

Set Sensible Limits on Data Access, FTC Explains

In its third post in the “Stick with Security” series, the Federal Trade Commission (FTC) suggested that access to sensitive data should be sensibly limited....more

OCIE Provides Insight into Issues Identified in Recent Cybersecurity Sweep

by Morrison & Foerster LLP on

The National Exam Program of the SEC’s Office of Compliance Inspections and Examinations (OCIE) recently published its observations from the second generation of its Cybersecurity Initiative. It reported overall improvement...more

Patching Up Your Information Security Review

by Morgan Lewis on

In light of recent significant ransomware cyberattacks such as the one that originated in Ukraine and quickly spread to affect hundreds of thousands of computers in more than 150 countries, we wanted to provide a few pointers...more

Corporate Law & Governance Update - August 2017

by McDermott Will & Emery on

A new article published in the Harvard Business Review confirms that the preservation of reputation continues to be a significant motivating concern for individual board members. This is a factor that should be taken...more

And So It Begins: The First DFS Transition Period Comes to an End August 28

by King & Spalding on

In September 2016, the New York Department of Financial Services (“DFS”) introduced the first draft of its cybersecurity regulation, which is now in a position to lead a new trend in industry-specific cybersecurity...more

Warning: New Proposition 65 Warning Regulations Taking Effect

by Morrison & Foerster LLP on

A year from now, dramatic changes to California’s Proposition 65 warning regulations take full effect. The new regulations (formally published by the State in August 2016) significantly alter the “safe harbor” rules for...more

EPA Issues Three Final TSCA Framework Rules

by Morgan Lewis on

The final rules establish procedures to identify high-risk chemicals, conduct risk evaluations, and reset the TSCA Inventory. The US Environmental Protection Agency (EPA) recently issued three final framework rules...more

The Evolution of the President’s Commission to Enhance National Cyber Security

by NAVEX Global on

Through a presidential commission and executive order, the presidencies of the former and current administrations have been linked in a shared effort to bolster our nation’s cyber security. ...more

The General Data Protection Regulation – Top 10 Considerations

by Goodwin on

The clock is ticking and in less than a year the European Union (EU) General Data Protection Regulation (GDPR) will be in full force. Companies should be getting ready now in order to avoid hefty fines for violations (up to...more

Lawmaker Investigates Small-Business Fintech Lending

Expressing concern about potential discrimination, one federal lawmaker has decided to take a closer look at small-business financial technology lending, sending letters to several fintechs with a series of questions....more

SEC Chairman Clayton Talks Cyber Threats And Responses

by King & Spalding on

On July 12, 2017, U.S. Securities and Exchange Commission Chairman Jay Clayton made his first public speech as head of the Commission, emphasizing the need for coordination between companies and regulators to thwart cyber...more

The Impact of the General Data Protection Regulation on Responses to Data Breaches Involving EU Personal Data

by McDermott Will & Emery on

The forthcoming General Data Protection Regulation will expand the legal obligations of companies that process EU personal data when they suffer a data breach. Every company faces the risk of a data breach that might trigger...more

Timely Reminder: Lawyers’ Ethical Obligations and Technology

by Morgan Lewis on

In June 2017, companies, government entities, and law firms faced a global ransomware attack from a type of malware where attackers lock certain data or components of a system and demand payment in exchange for returned...more

MoFocus: Our Insights into the Risk + Crisis Landscape - Vol.1 Issue. 1

by Morrison & Foerster LLP on

What Companies Should Be Doing to Prepare for the Next Ransomware Attack - The “WannaCry” cyberattack that struck in May paralyzed businesses, government entities, and Britain’s National Health Service, encrypting computer...more

China’s Network Security Law Comes into Effect: What It Means for Your Company

by McDermott Will & Emery on

On June 1, 2017, China’s much anticipated Network Security Law comes into effect after two years of review, revisions over three drafts and a public commenting process. The law is a historical development for China’s...more

GDPR is Coming: Is Your Business Ready?

Even if your company primarily operates in the U.S., the European Union’s General Data Protection Regulation (GDPR)—which will take effect on May 25, 2018—may affect your organization. Here are three facts that all...more

The First 24 Hours: How to Prepare and Respond to a Major Cybersecurity Attack

by McDermott Will & Emery on

In today’s digital age, data privacy and security incident response plans are critical. Companies need to have a well-designed cybersecurity plan to protect their systems from attacks and respond to a crisis when they are...more

Senate Committee Advances Cybersecurity Bill For Small Businesses

by King & Spalding on

The U.S. Senate will soon consider legislation aimed at providing simplified resources to help small businesses protect themselves and their customers from cyber threats. The bill, entitled the MAIN STREET Cybersecurity Act...more

142 Results
|
View per page
Page: of 6
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.