News & Analysis as of

Confidential Information Data Protection

Privacy Tip #94 – Keep Your Day Job and Stay Out of Jail

One of my favorite lines when I conduct employee education about data privacy and cybersecurity is “Keep Your Day Job.” The context of the comment is when I tell audiences about the dumb moves of employees who think they can...more

[Webinar] Current Issues in Multijurisdictional Practice; Protecting Confidential and Privileged Information with International...

by Thompson Coburn LLP on

When legal issues with footprints in many jurisdictions need to be resolved, attorneys need a roadmap and a checklist to plan their strategy. This webinar will cover current rules and issues/mishaps, and the consequences for...more

There Is More To Come In Europe: The Draft Of The ePrivacy Regulation

by King & Spalding on

In January 2017, the European Commission (the “EC”) published its proposal for a new ePrivacy Regulation (the “ePrivacy Proposal”), which will replace the ePrivacy Directive of 2002 (2002/58/EC) and the Cookie Directives of...more

4 Key Takeaways: All the Crime We Cannot See

Kilpatrick Townsend Partner Audra Dial recently served as moderator on a prestigious panel at the American Bar Association’s 32nd Annual Intellectual Property Law Conference (IPL Spring) in Arlington, Virginia. The panel,...more

Business Litigation Alert: "The Risks of File Sharing Sites - Is using DropBox like leaving a document on a park bench?"

by Porter Hedges LLP on

File sharing sites such as DropBox have become commonplace, allowing users to upload and access electronic documents from a variety of locations. These sites are particularly convenient when multiple people are required to...more

Eight Keys to Securing Portable Devices

by Baker Donelson on

Securing physical worksites and workspaces is by now old hat. We all know file cabinets should be locked, worksites secured and personal access to information monitored. Securing portable devices, however, often receives less...more

Health Company Fined by UK’s Information Commissioner Office

by Hogan Lovells on

Last week, the UK’s Information Commissioner’s Office (ICO) published a monetary penalty notice which fined a private healthcare company, HCA International, £200,000 for its failure to keep sensitive data secure....more

New Cybersecurity Requirements for New York Financial Companies

by Snell & Wilmer on

The New York Department of Financial Services has new cybersecurity regulations “designed to promote the protection of customer information as well as the information technology systems of regulated entities [financial...more

New York Financial Services Cybersecurity Regulations Go Into Effect on March 1st

We have previously reported about the upcoming New York Financial Services Cybersecurity Regulations. On February 16, 2017, Governor Andrew M. Cuomo announced that “the first-in the-nation cybersecurity regulation to protect...more

Pooley’s Corner: How to Recruit and Hire While Avoiding Data Contamination

When we think about trade secrets, we usually focus on keeping our own data safe. But an even bigger risk comes from hiring employees who can infect our systems with confidential information from a competitor. Companies often...more

The “Final Final” is Here: NYDFS Cybersecurity Regulations

by Hogan Lovells on

As Hogan Lovells previously reported, the New York State Department of Financial Services (NYDFS) has launched a significant initiative to impose detailed cybersecurity requirements on covered financial institutions. On...more

NY DFS Cybersecurity Regulations Take Effect March 1, 2017

by Carlton Fields on

We previously reported on the New York Department of Financial Services’ proposed cybersecurity regulations. During the public comment period, the DFS received over 150 comments. In response, the DFS announced on December 28,...more

The Risks and Implications of Failing to Comply with U.S. Government Cyber and IT Requirements

by Pepper Hamilton LLP on

This article summarizes some of the many risks and implications that are associated with failing to comply with U.S. government-unique cyber and information technology requirements. We are often asked by small and...more

Employer Has No Legal Duty To Protect Employee Electronic Information

A court in Pennsylvania recently held that an employer does not have a legal duty to act reasonably in managing its computer systems to safeguard sensitive personal information collected from its employees, when the employer...more

NY DFS Proposed Cybersecurity Regulations Revised and Implementation Delayed

by Carlton Fields on

We previously reported on the New York Department of Financial Services’ proposed cybersecurity regulations. During the public comment period, the DFS received over 150 comments. In response, the DFS announced on December 28,...more

EU Commission Publishes Its Proposals for New e-Privacy Regulation

by Reed Smith on

On 10 January, the EU Commission proposed a new Regulation on Privacy and Electronic Communications (“proposed Regulation”) to replace Directive 2002/58 (known as the “ePrivacy Directive”). The proposed Regulation...more

EU Proposed ePrivacy Rules to Extend to all Electronic Communications Providers

by Morgan Lewis on

On January 10, the European Commission proposed new legislation that would update and supplement current ePrivacy rules and extend their scope to all providers of electronic communication services. The following is a...more

The Panama Papers Make ‘Share Everything’ Security Policies a Thing of the Past

by Prosperoware on

The breach of the Panamanian law firm, Mossack Fonseca, two weeks ago and the ensuing leak of 11.5 million documents — 2.6 terabytes of data — to the press revealed in extraordinary detail how offshore bank accounts and tax...more

Fenwick Privacy Bulletin - Fall 2016

by Fenwick & West LLP on

Privacy Shield – An Early Reflection - EU law generally prohibits the transfer of personal data from the European Economic Area to the U.S., unless the transfer is made in accordance with an authorized data transfer...more

Bring Your Own Device (BYOD) – Be Smart

by LeClairRyan on

At the dawn of portable electronic devices, they were primarily work-related productivity tools. Often, employers would purchase (or lease) devices and distribute them to their need-to-have employee base. It’s not so long...more

Regulators Nationwide Weigh in on CPUC Litigation

by Nossaman LLP on

In May, we posted a blog on litigation filed by telecom providers and trade associations to prevent the California Public Utilities Commission (CPUC) from requiring Plaintiffs to turn over competitively sensitive data to a...more

How to Prepare for Theft of Company Information

by Dorsey & Whitney LLP on

Companies should take three steps now to ensure use of the Defend Trade Secrets Act. In May, President Barack Obama signed into law the Defend Trade Secrets Act that creates a federal civil cause of action for the...more

UK Financial Regulatory Developments - April 2016 #21

by Dentons on

EIOPA consults on infrastructure corporates - EIOPA is consulting on the Commission’s request for technical advice on the identification and calibration of “other infrastructure investment risk” categories. The...more

Der Markteintritt für deutsche IT Firmen aus dem Bereich des Gesundheitswesens

by Arnall Golden Gregory LLP on

With expenditures of over $ 3 trillion of market in the field of health care in the United States is huge. Incentives of the Federal Government for the introduction of electronic medical records resulted increasingly in the...more

Think You Have Insurance Against Claims for Disclosure of Confidential Information? You May Want to Check Again

by Cole Schotz on

Are you relying on your insurance policy to cover unauthorized or unintended electronic disclosure of confidential information? If so, you may want to take a closer look at your policy with an eye towards objections to...more

80 Results
|
View per page
Page: of 4
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.