News & Analysis as of

Cybersecurity

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -

Lawmakers Push FCC To Confront Cell Phone Cyber Threats

by King & Spalding on

In a letter dated March 28, 2017, Senator Ron Wyden, D-Ore., and Representative Ted Lieu, D-Calif., urged the Federal Communications Commission (“FCC”) to address cybersecurity vulnerabilities in the cell phone industry,...more

China's new cyber security law is only 6 weeks away

by DLA Piper on

7 THINGS YOU NEED TO KNOW - Regulation of personal and business data and restrictions on your ability to transfer it out of China is set to become a reality on 1 June 2017 when the PRC Cybersecurity Law comes into...more

Counsel To Counsel: A Law Firm GC's Data Protection Duties

by WilmerHale on

Many law firms now have a designated general counsel, or a group of counsel, tasked with managing myriad legal matters for the firm. What are some top-of-mind priorities for these GCs today as they strive to keep their firms...more

China's draft data localisation measures open for comment

by Hogan Lovells on

On 11 April 2017 the Cyberspace Administration of China published a circular calling for comments on its draft Security Assessment for Personal Information and Important Data Transmitted Outside of the People’s Republic of...more

Chinese Government Releases Overreaching Draft Regulations on Cross-Border Data Transfer

by Davis Wright Tremaine LLP on

The Cyber Security Law was adopted in November 2016 and will become effective on June 1, 2017. The Cyber Security Law creates a new concept of Critical Information Infrastructure (“CII”). The operators of CII are subject to...more

Data Privacy and Security Legal Reform, and Plaintiffs’ Bar White Paper the Focus of IAPP Panel

by Reed Smith on

A panel on legal reform in the area of privacy and data security at this week’s IAPP Summit provided an opportunity for a discussion between businesses and regulators, as well as for the launch of a white paper on the...more

Deeper Dive: Protecting Paper Records

by BakerHostetler on

Our third annual BakerHostetler Data Security Incident Response Report analyzes the more than 450 data security incidents we led clients through in 2016, and includes a number of interesting trends relating to the causes of...more

Breach Notification Update: New Mexico becomes the 48th State Requiring Breach Notification and Tennessee Adds a Safe Harbor for...

by Sedgwick LLP on

As the frequency of data breaches continues, so do legislative developments on notification requirements that must be met in the event of a breach of Personally Identifiable Information (PII). Even as of now, not every state...more

Privacy Tip #83 – “Alexa, Disconnect Yourself from the Internet Now!” BrickerBot Malware Attacking IoT

We often talk about how anything that is connected to the Internet is hackable and unsafe, and to be careful about how you buy and connect devices, products, appliances, home security systems and other wireless “things.”...more

"The Emerging Need for Cybersecurity Diligence in M&A"

Cybercrime has emerged as one of the foremost threats a company faces. As a result of a few keystrokes, a company may find its customers’ data sold on the dark web, its intellectual property in the hands of a competitor or...more

UK: FCA 2017/2018 Business Plan - Sector priorities for general insurance

by Hogan Lovells on

In its recently published 2017/2018 Business Plan the FCA outlines its priorities for the general insurance sector over the coming year and beyond....more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

New FCC Chair Ajit Pai is wasting little time in reversing Obama-era regulatory efforts meant to restrict media firms and telecomm companies, and he’s got his sights set on net neutrality next....more

New Mexico Becomes 48th State to Enact Data Breach Notification Law

by Ballard Spahr LLP on

New Mexico recently became the 48th state to enact a data breach notification law. This continues the accelerated pace of state data breach legislative activity in the last two years. Since 2015, at least 41 states have...more

New Mexico Enacts Data Breach Notification Act (Updated)

by Jackson Lewis P.C. on

New Mexico has become the 48th state to enact a data breach notification law requiring that individuals be notified of security breaches of information involving personal identifying information. Governor Susana Martinez...more

Banks’ Boards of Directors Face New Cybersecurity Challenges

by BakerHostetler on

Banks’ boards of directors must, among other things, understand the risks associated with existing and planned IT operations, monitor risk management, and work with senior bank managers on strategic technology planning. See...more

Deeper Dive: Frequency and Severity

by BakerHostetler on

All industries are affected by cyberattacks, but how often and to what extent they occur vary greatly by industry type. As for frequency, the healthcare industry in 2016, for the third year in a row, saw the greatest...more

Cybersecurity Bill Aims to Patch Holes in Main Street

by Morgan Lewis on

The US Senate Commerce Committee recently advanced a bill, titled the MAIN STREET Cybersecurity Act of 2017 (the Bill), under which the National Institute of Standards and Technology (NIST) would disseminate “clear and...more

Real Answers to Common Questions on Cybersecurity

by NAVEX Global on

Q: In my company, the IT directors see cybersecurity as an IT and software issue to be solved with software and hardware. How do I convince the team that employees need to also be trained on risky behavior – something that...more

Be Compromise Ready: Go Back to the Basics

by BakerHostetler on

We are excited to release our third annual BakerHostetler Data Security Incident Response Report. This report analyzes the more than 450 data security incidents we led clients through in 2016. Companies continued to...more

Top international trade and export control developments in 2017 for ADG companies

by Hogan Lovells on

Aerospace, defense, and government services (ADG) companies increasingly rely on international customers and global supply chains to stay competitive in today’s global market. In the United States, ADG companies rely heavily...more

Data Breach Risks for 401(k) and Retirement Plans

by Jones Day on

There has been a recent spike in attacks on 401(k) and retirement plans by cyber criminals. Some have been reported publicly, and we are aware of several nonpublic incidents as well....more

Federal Contractors Beware - DHS Proposes Robust Cybersecurity Procurement Regulation to Safeguard Controlled Unclassified...

First and foremost, the proposed Department of Homeland Security (DHS) regulation to safeguard CUI is internally inconsistent or at the very least ambiguous. It appears to conflate the protection of CUI on a federal...more

April Showers Bring Mass Mods: New GSA Schedule Refresh and Mass Modification

by Bass, Berry & Sims PLC on

Later this month, the GSA will issue a refresh to all GSA Multiple Award Schedules (MAS) to incorporate new provisions and clause updates. Even if you are already a GSA Schedule holder, keep reading – a bilateral modification...more

FBI Warning on Cybercriminals Targeting FTP Servers to Compromise Protected Health Information

by Roetzel & Andress on

In March 2017, the Federal Bureau of Investigation (FBI) issued a Private Industry Notice (Notice) advising that the FBI is aware that cybercriminals are actively targeting File Transfer Protocol (FTP) servers in “anonymous”...more

Gone Phishin’: Hack Leads to HIPAA Settlement

While your business may indeed be a “victim” when hit by a phishing attack, your enterprise can also be responsible for violations of law associated with the incident. Earlier this week, the HHS Office for Civil Rights...more

4,247 Results
|
View per page
Page: of 170
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!