Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Legislation To Increase Sharing Of Cyber Data Introduced

On February 11, Senator Tom Carper (D-Del.), Ranking Member of the Senate Homeland Security and Governmental Affairs Committee, introduced legislation aimed at increasing the sharing of cyber threat data between the federal...more

President Obama Issues Executive Order Urging Companies to Share Cybersecurity Threat Data

Speaking at the White House’s Summit on Cybersecurity and Consumer Protection at Stanford University this month, President Obama announced that an Executive Order was signed on February 13, urging private sector companies to...more

Cybersecurity Issues Receiving Attention at Highest Level in the U.S.

The Obama Administration could not be more clear that cybersecurity issues will continue to receive priority attention at the highest levels of government. ...more

NIST, White House Continue Efforts to Enhance Cybersecurity Awareness and Protections

The National Institute of Standards and Technology (NIST) and the White House continue efforts to improve private sector security and increase sharing of information about potential cybersecurity threats. ...more

Boom or Bust? Cyber Security and Data Breach Loss in Latin America

Every day in the news we are assaulted by reports of cyber security and data breaches of industry giants, major retailers and financial conglomerates that compromise the privacy and security of millions. In the wake of such...more

Federal Court Decision Demonstrates Ongoing Challenges Faced by Plaintiffs in Data Breach Litigation

On February 11, 2015, the U.S. District Court for the Southern District of Texas dismissed a class action complaint against the St. Joseph Health System arising out of a data security breach that occurred after hackers...more

Office of Civil Rights Delays Phase 2 Audits

The Office of Civil RIghts (“OCR”) recently announced that Phase 2 of the HIPAA audits would be further delayed because the audit portals and project management tools that are needed to initiate the audit process are not...more

Target Data Breach Price Tag: $252 Million and Counting

In a recently-released Form 8-K filing announcing fourth quarter and year-end financial results, Target Corporation reported that expenses incurred in 2014 relating to its 2013 data breach totaled over $191 million. Those...more

Federal Trade Commission Guidance on the Internet of Things

On January 27, 2015, the FTC released its Staff Report on the so-called “Internet of Things” (IoT) – the ability of everyday objects (from refrigerators to wearable devices) to connect to the Internet and send and receive...more

Cybersecurity is Key Initiative for National Association of Insurance Commissioners

Even your grandmother is talking about cybersecurity, so you know it’s got to be important. In the world of insurance, the wheels are in motion at the NAIC – the National Association of Insurance Commissioners – to get a...more

Health Update - February 2015

Cyber Risk Insurance Policies: What You Need to Know - Editor’s Note: As data breach incidents and related cyber risks continue to increase and gain publicity—and government agencies become more actively involved in...more

Solving the Legal Challenges of Trustworthy Online Identity

In this age of phishing, hacking, identity fraud, and other forms of cybercrime, answering two simple questions – “Who are you?” and “How can you prove it?” – is fast becoming a critical requirement for online business...more

FINRA Issues its Cybersecurity Report, Providing Tools and Encouragement to Broker-Dealers

FINRA recently issued a Report on Cybersecurity Practices (“Report”), growing out of its targeted examination of firms last year. To issue the Report, FINRA gave careful consideration to the needs of many broker-dealers for...more

Standing in Data Breach Cases – Still a Moving Target

Where do we stand on standing in data breach cases? It depends on which court you ask. In December 2014, two courts considered whether plaintiffs alleged sufficient injury in their complaints involving well-known data...more

Ethical Issues Implicated by Lawyers’ Use of Third-Party Cloud Services

Law firms increasingly turn to “cloud services” for processing and storing confidential client information because of their greater flexibility and efficiency. Use of “the cloud,” however, outsources the administration,...more

The Employment Law Authority - January/February 2015

In This Issue: - High Tech, High Risk: Protecting Health Plan Data: Recent Cyber Attack Reminds Employers to Take Swift Action - EEOC FY 2014 Statistics Are Here: What Do They Mean for Employers? - State...more

Also In the News - Data, Privacy, & Security Practice Report - February 2015 #3

White House Holds Summit On Cybersecurity And Consumer Protection — On February 13, 2015, leaders from throughout the country representing sectors with a stake in cybersecurity and consumer protection issues convened at...more

More Than Employers Bargained For? Do Union Employees Have a Right to Bargain Over Company Data Breaches?

These days most employers manage a vast amount of electronic information about their employees, including the employees’ personal identifying information. But, what obligations do employers have to unionized employees with...more

HIPAA Compliant Technology and the Importance of Encryption

We welcome this guest blog by Gene Fry, Compliance Officer, Scrypt, Inc. The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for protecting sensitive patient data. This means that any...more

Eye on Privacy Newsletter - February 2015

In this issue: - Privacy and Data Security in Transactions: What's the Deal? - Consumer and Financial Institution Class Actions Survive Motions to Dismiss in Target Data Breach Litigation - California Amends...more

UDRP Panel Tells Snapchat to Check Itself Regarding Snapchatcheck.com

By now you’ve probably heard of Snapchat. But if you are not among its growing core base of users between 13 and 23 years of age (probably a good deal younger than you, constant reader) there’s a good chance you are not a...more

Industry Trade Groups Urge Congress to Pass Legislation to Protect Consumers from Data Breaches

On February 12, seven industry trade associations co-authored a letter to Congress regarding anticipated data breach legislation. The letter urges Congress to protect its constituents from the impact of identity theft and...more

New Data Protection Laws in Africa

In recent years, the number of African countries which have enacted privacy frameworks or are planning data protection laws has vastly increased....more

EU Art. 29 Working Party Letter on Health Data and Apps

The EU Article 29 Working Party (“WP29”) has published a letter to the European Commission (“EC”) on the scope of health data in relation to lifestyle and well-being apps, following the EC’s Working Document on mHealth and...more

Brazil Bill Implements New Provisions for International Data Transfers

The Bill’s provisions on international data transfers are most relevant to foreign companies that do business in Brazil. The Brazilian government has issued a Bill for the Protection of Personal Data (Bill) for public...more

1,521 Results
|
View per page
Page: of 61