Confidential Information Data Breach

News & Analysis as of

Q&A: James Pooley on Trade Secret Protection

In this Q&A, we talk with James Pooley about his new book, Secrets: Managing Information Assets in the Age of Cyberespionage. James has a wealth of experience in information security and intellectual property law. In 2009, he...more

Privacy & Cybersecurity Newsletter: International Edition July 2015

Retail Tracking Update: Privacy Guidance Following Nomi Technologies - There is currently a widespread effort to quantify everything, from steps, to sleep, to batted ball exit velocity. Fifteen years ago, TV host Jeremy...more

Also In the News - Data, Privacy, & Security Practice Report - July 2015 #2

FCC Working Group Issues Report On Cybersecurity Best Practices – The June 2015 issue of the Intellectual Property & Technology Law Journal features an article by King & Spalding partner Steven Snyder on a Federal...more

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

Connecticut to Tighten Data Privacy Requirements

On June 1, 2015, the Connecticut Legislature passed S.B. 949, a comprehensive data privacy and security bill that tightens the state’s data breach response requirements and imposes new obligations on state contractors and the...more

PA Judge Nixes Employees’ Negligence Claim for Data Security Breach

Red On May 28, 2015, in the first known ruling of its kind, a trial court in Allegheny County held that Pennsylvania law does not recognize a civil cause of action against companies for failing to secure its employees’...more

Data Breach Negligence Claims Not Recognized in Pennsylvania

In an important and well-reasoned 12-page decision, Judge Wettick of the Court of Common Pleas of Allegheny County refused to create a common law duty to protect and secure confidential information. The decision was issued in...more

Pennsylvania Court Refuses to Create a Duty of Care to Protect Confidential Personal Data

On May 28, 2015, Judge R. Stanton Wettick, Jr. refused to create a new cause of action sounding in negligence allowing a claim for damages resulting from improper disclosure of confidential personal and financial...more

A Different Kind of Data Breach—Loss or Disclosure of Company Information by Employee Theft

Data breaches are all over the news, but those stories most often cover high-profile cybersecurity breaches that result from the malicious efforts of hackers or other outsiders. Just as insidious, and more likely to occur,...more

Ethical Issues Implicated by Lawyers’ Use of Third-Party Cloud Services

Law firms increasingly turn to “cloud services” for processing and storing confidential client information because of their greater flexibility and efficiency. Use of “the cloud,” however, outsources the administration,...more

Time for an Updated Cyber Risk Approach; BPI Data Breach

Our traditional approach to cyber risk and security has been focused on privacy and financial data. The data breach or loss concerns that typically rank high on our risk ratings are private and confidential data like names...more

This Party is BYOD, Part Two

Another pitfall that might arise in a BYOD context pertains to the nature of the information on the device itself. In addition to proprietary information of the company, certain other information is subject to additional...more

Did Sony Let the Terrorists Win?

Unless you’ve been living under a rock recently, you’ve probably heard about the hoopla caused by the new Seth Rogen and James Franco movie called the interview. The movie follows a plot to assassinate North Korean dictator...more

How to Respond to SEC Inquiries Concerning Data Breach and Data Security Policies

Every company, whether public or private, has exposure to potential data breach or theft of confidential information. When this occurs, various state and federal regulatory organizations have jurisdiction over ensuring that...more

Employment Law Commentary -- Volume 26, Issue 7 July 2014 -- Building A Workforce Culture Of Data Security In The Post-Snowden Era

Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more

To keep data safe, law firms must embrace a culture of security

As the White House report on big data indicates, an enormous amount of information is collected, stored, analyzed and relayed in digitized form over the Internet and, increasingly, using mobile technology. Headlines...more

Health Data Breach Victims Have Standing to Sue Says WV Supreme Court

The most common defense against class actions for data breach has itself been breached in a ruling last week by the West Virginia Supreme Court....more

Connecticut Court Declines To Open New Door To Coverage In Data Breach Cases

Massive data breaches, now commonplace, often prompt alarm. But the danger they represent — unauthorized use of confidential information — does not always follow straightforwardly. ...more

Legal Briefs: A periodic summary of judicial decisions affecting accounting and financial services professionals – May 2014

Loss of Confidential Electronic Data: New Risks for Financial Professionals - Recent highly publicized incidents of "hacking" of sensitive customer information should cause accountants and other financial professionals...more

Damages Issues Again Thwart the Bulk of Plaintiffs’ Claims in the PlayStation Network Data Breach Class Action

In the latest chapter in the Sony PlayStation Network (“PSN”) data breach saga, a decision that issued on January 21, 2014 permanently dismissed all but a handful of the class action claims advanced in a 51 count complaint. ...more

New Jersey Federal Court Applies Supreme Court’s Clapper Decision and Dismisses Data Breach Class Action

Relying in part on the recent United States Supreme Court’s ruling in Clapper v. Amnesty International, a federal judge in New Jersey dismissed a putative data breach class action against three healthcare entities and a...more

How To Catch-Up in a Revised HIPAA World

The HIPAA final omnibus rule (Omnibus Rule) made sweeping changes to the HIPAA Privacy, Security, Breach Notification and Enforcement Rules earlier this year. Although the compliance deadline of September 23, 2013 has come...more

Hiding in plain sight: Failure to scrub patient data from digital copiers returned to leasing company results in $1.2 million...

We’ve sounded warnings about the lowly copy machine before. The proliferation of digital devices in the workplace means that data security must extend beyond computer networks and laptops. Seemingly old fashioned equipment,...more

Data Breach at Gunpoint

You might think that if you lock your backup tapes in a safe they are protected from a data breach, but Kmart’s recent data breach proves that’s not the case. Last month, a person held a Kmart employee in Little Rock,...more

24 Results
|
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×