Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

2015 Proskauer Annual Review and Outlook for Hedge, Private Equity and Other Private Funds

Proskauer has released the 2015 Proskauer Annual Review and Outlook for Hedge, Private Equity and Other Private Funds. The 88-page report is a summary of significant legal changes and developments in the private funds space...more

Tips for Protecting Your Company Against Cyberattacks

Cybersecurity has become, as it should, an extremely important topic on company boards’ agendas. The main question on everyone’s mind is: “How can we eliminate this problem?” The answer, unfortunately, is that you can’t....more

Following a Regulatory Trend, CFTC Inches towards Cybersecurity Testing Requirement

Commodity Futures Trading Commission (CFTC) Chairman Timothy Massad has recently stated that the CFTC may soon issue principles based standards that would require certain CFTC-regulated entities to conduct penetration,...more

Financial Regulatory Developments Focus - November 2015 #4

In this week's newsletter, we provide a snapshot of the principal US, European and global financial regulatory developments of interest to banks, investment firms, broker-dealers, market infrastructure providers, asset...more

A Veritable Feast: E-Discovery Tools and Resources for the Holiday Season

Thanksgiving is a time of reflection, for looking back on the challenges of the previous year and recognizing all those who supported us through them. It’s also a time of preparedness. Yes, most people see Thanksgiving as the...more

Upping the Ante: Cybersecurity, the SEC and the Perils of Being Unprepared

The U.S. Securities and Exchange Commission is finally getting serious about cybersecurity – and for good reason. If the ever-growing business and headline risks aren’t enough to scare investment advisers and broker-dealers...more

It’s (Not) Academic: Cybersecurity Is a Must for Universities and Academic Medical Centers

Cutting-edge research institutions need cutting-edge cybersecurity to protect their IP and critical personal and financial data. Universities hold vast repositories of valuable information, including student healthcare...more

Employment Law Navigator – Week in Review: November 24, 2015

Last week, the EEOC released its Fiscal Year 2015 Report, in which it describes 12 months of positive results. According to the report, monetary relief obtained for individuals was up, and the number of systemic charges of...more

Data Security Breaches: Are you covered?

Data security breaches can have a significant impact a company’s bottom line. While larger corporations may be able to sustain the financial hit, small to mid-size corporations can be significantly impacted from the financial...more

UK and US carry out cyber-testing exercise

The UK and US Governments have carried out a joint exercise with leading global financial firms to enhance cooperation...more

New Bank Examination Procedures for Cybersecurity

There is no more pressing problem facing business organizations today, of all types, than cybersecurity threats. For a highly regulated industry like banking, regulators are watching closely to see how the IT governance...more

NYDFS Letter: “Potential” Cybersecurity Regulations for Insurers

On November 9, 2015, the New York Department of Financial Services (NYDFS) issued a letter that describes what insurers can expect from the Department’s ongoing assessment of cybersecurity measures. The letter parallels...more

The WSGR Data Advisor - November 2015

The last two months certainly have been eventful in the world of privacy. In this issue of The WSGR Data Advisor, we examine the Court of Justice of the European Union’s recent and highly significant Schrems decision that...more

Securities Litigation and Enforcement Newsletter

In this our second edition of Fenwick’s Securities Litigation and Enforcement Newsletter, we continue to provide you with short insights about timely securities litigation and enforcement developments. This edition’s topics...more

Tackling Cybersecurity in the Boardroom: Special M&A Considerations

During Akin Gump Strauss Hauer & Feld LLP’s most recent cybersecurity event, “Tackling Cybersecurity in the Boardroom,” hosted on November 12, 2015, our panels discussed a number of issues facing directors....more

Massachusetts develops a remote controlled contraceptive chip

Ladies and gentlemen, introducing the remote controlled contraceptive computer chip. Releasing measured doses of the levonorgestrel hormone, these computer chips can be implanted under a woman’s skin as a new form of birth...more

Social Engineering Losses—Embarrassing Scam or Insured Loss?

The term Social Engineering keeps cropping up recently in the new world of cybersecurity—to what does this term refer? To a scam as old as the hills. You know the con: an innocuous person asks you to accept a cashier’s...more

Cybersecurity & Nonprofits: A Matter of Time?

The ever increasing cyber-attacks and data breaches targeting the private sector and government agencies, and the increased focus on cybersecurity plans and preparedness, may seem like remote risks for nonprofit...more

NFA Adopts Cybersecurity Guidance for NFA Members

On October 23, 2015, the National Futures Association (NFA) adopted its Interpretive Notice Regarding Information Systems Security Programs (the Notice). As noted in our prior Password Protected update, the Notice requires...more

Expect New Cybersecurity Regs from New York DFS

DFS identified several areas that would be the subject of specific requirements in the potential regulations. These include requirements for (i) cyber security policies and procedures, (ii) third-party service provider...more

FFIEC Releases Revised Management Booklet with Emphasis on Sound IT Governance

On November 10, the FFIEC issued a revised Management booklet, which outlines the principles of overall sound governance and, more specifically, IT governance. The booklet is one of 11 that makes up the FFIEC’s Information...more

Financial Services Weekly News - November 2015 #3

Regulatory Developments - MSRB Publishes Compliance Advisory for Municipal Advisors: On Nov. 12 the Municipal Securities Rulemaking Board (MSRB) published its first municipal advisor compliance advisory, developed...more

The LabMD Case: Further Defining the FTC’s Enforcement Powers

The scaffolding of the FTC’s powers in the realm of cybersecurity continues to be built. On Monday, the FTC’s Chief Administrative Law Judge D. Michael Chappell issued an initial decision in the FTC’s closely watched...more

China Regulatory Enforcement Quarterly - Q3 2015

On August 12, a series of explosions in the northern port-city of Tianjin killed over one hundred people and injured hundreds of others. The explosions were allegedly caused by hazardous chemical materials in shipping...more

Investment Management Legal + Regulatory Update - November 2015

Regulation - OCIE Cautions Advisers on Outsourcing Compliance Activities: In a Risk Alert dated November 9, 2015, the SEC’s Office of Compliance Inspections and Examinations (OCIE) said it found that outsourced...more

2,567 Results
View per page
Page: of 103

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.