Science, Computers & Technology Finance & Banking Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Eddie Bauer Latest Victim of Point-of-Sale Compromise

Eddie Bauer announced on August 18th that it is the latest retailer who has become a victim of a “sophisticated” cyber intrusion that has compromised all of the cash registers in the 350 Eddie Bauer stores throughout the U.S....more

Also In the News - Data, Privacy, & Security Practice Report - August 2016

FDIC Office Of Inspector General Reports On FDIC’s Cybersecurity Practices – On August 11, 2016, the Federal Deposit Insurance Corporation’s (“FDIC’s”) Office of Inspector General issued a report based on an audit of the...more

NAIC Cybersecurity Task Force Weighs Credit Freezes

On May 24-25, the NAIC Cybersecurity (EX) Task Force held an interim meeting to hear comments from various industry trade organizations and other interested parties on the proposed Insurance Data Security Model Law exposed...more

Heal Thyself: Insider Threats to Heed, Especially for Industries with Large Amounts of Personal Information

A recent study by the Ponemon Institute found that insider threats due to malicious or negligent employees are the leading cause of private-sector cybersecurity incidents. Of the over 600 information security professionals...more

FFIEC Provides Banks with Guidance Following the SWIFT Hacks

On June 7, 2016, the Federal Financial Institutions Examination Council (FFIEC) reminded banks of the cyber risks associated with interbank messaging and wholesale payment networks. FFIEC made its announcement after hackers...more

FCC and Federal Debt Collectors, More Restrictions under TCPA

In July we wrote about the exemption for robocalls made by the federal government (or its contractors) from the restrictions of the Telephone Consumer Protection Act (TCPA). Now, the Federal Communications Commission (FCC)...more

A New Solution to an Old Problem

Citizens in many countries the world over are plagued by an inability to record their land interests in a reliable and secure registry. Inefficiency, corruption and nepotism are rife, leaving countless people at risk of...more

Dude, Where’s My Bitcoin?

Somewhere in a lavish Mediterranean villa a drug lord wearing an off-white suit had a heart attack. Elsewhere a tech whiz in Silicon Valley refreshed his browser multiple times as his heart sank further with each reloaded...more

In Case You Missed It: Launch Links - August, 2016

Some interesting links we found across the web this week: - Department of Commerce Now Accepting Privacy Shield - Self-Certifications: A Primer for Compliance and Self-Certification We’ve mentioned many times...more

Best Practices to Thwart Hackers Using Email to Get Your Money

Not a week goes by without some news report of another hacking incident. The industries targeted include large retail stores, restaurants, banks, attorneys, accountants and recently in Maryland, a title company. In...more

Researchers say Chip-based Credit Cards aren’t as Secure as we Thought

Payment technology company, NCR Corporation (NCR), determined last week that the new chip-based credit card technology isn’t as secure as we thought. The technology behind these chip cards that is supposed to make them more...more

Your daily dose of financial news - The Brief – 8.15.16

More details have emerged from the February cyberheist that resulted in the theft of more than $81 million from Bangladesh’s account at the NY Fed, including a pretty significant lack of critical concern from the bank itself....more

Oracle’s MICROS Point of Sale Division Hacked

KrebsonSecurity has reported that the Russian organized cybercrime group dubbed the Carbanak Gang, which in the past has been suspected of stealing more than $1 billion from banks, retailers and hotels and restaurants...more

Bitcoin theft highlights cryptocurrency regulatory uncertainty

The recent suspension of trading on Hong Kong based Bitcoin exchange Bitfinex following the apparent theft of approximately US$60m worth of bitcoins is the latest in a series of Bitcoin thefts. With Bitcoin still in its...more

Singapore’s enforcement of data protection law on the rise

Singapore's Personal Data Protection Commission (PDPC) is stepping up its efforts to enforce the Personal Data Protection Act 2012 (PDPA). Following the release of its first nine enforcement decisions in April this year, the...more

New EU Directive on Security of Information Systems 

A new Directive on cyber security was published in the Official Journal of the European Union. The Directive aims to achieve a common level of security of network and information systems within the EU. It requires all Member...more

UK Financial Conduct Authority—Regulated Firms Can Go to the Cloud

July 7, 2016, saw the UK’s Financial Conduct Authority (FCA) publish fresh guidance in order to clarify the requirements which apply to the financial services firms it regulates when outsourcing to the cloud. When the FCA...more

How Data Scientists & Compliance Can Work Together Better; Keith Furst Explains [PODCAST]

Data scientist Keith Furst and Masters of Disaster® podcast host Leona Lewis discuss how data scientists and compliance can collaborate better to get compliance the data it needs. It is almost impossible to have one...more

Banner Health Begins to Notify 3.7 Million Patients This Week of Data Breach From Cyberattack

Phoenix, Arizona, based Banner Health (Banner), reportedly one of the largest health care organizations in the country, began notifying up to 3.7 million patients this week of a data breach of its computer systems that...more

Congressional Report Finds FDIC Data Breach Response Obstructed Congressional Oversight

On July 12, the U.S. House of Representatives Committee on Science, Space, and Technology (the “Science Committee”) released a report regarding its investigation of an October 2015 data breach and the subsequent response of...more

Kimpton Hotels investigates credit and debit card breach

Kimpton Hotels and Restaurants has announced that it is investigating a point-of-sale credit and debit card breach affecting approximately two dozen of its properties in the U.S....more

HIPAA Wake-Up Call for Financial Institutions: First HIPAA Settlement with Business Associate

It’s a HIPAA first. A business associate has settled a direct enforcement action over allegations that it potentially violated the Health Insurance Portability and Accountability Act (HIPAA). This settlement portends future...more

Are You an Insider? Data Privacy Challenges Posed by New Insider List Requirements

The EU’s Market Abuse Regulation (“MAR”) came into effect on July 3, 2016 replacing the EU’s Market Abuse Directive. Unlike the Directive, the MAR has direct effect in each EU member state, including the UK....more

New guidance for outsourcing to the cloud published

The FCA have now published their guidance on outsourcing to the cloud for financial services organisations in the UK. This guidance, which follows on from a consultation exercise which took place at the start of the year,...more

Regulators' IM Crackdown May Increase Cyber Risk

In April, the Office of the Comptroller of the Currency issued a bulletin specifically aimed at banks' use of internal messaging software. The bulletin was issued to "remind" banks of their obligations related to the...more

902 Results
|
View per page
Page: of 37

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×