Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Advertising Law - July 2016 #4

Sen. Franken Hits Pause on Pokémon GO - After the Pokémon GO app was downloaded approximately 7.5 million times in the United States alone in its first week of release, Sen. Al Franken (D-Minn.), the chairman of the...more

Nutter Bank Report, July 2016

FinCEN has released guidance in the form of answers to frequently asked questions (“FAQs”) about new customer due diligence (“CDD”) requirements that became effective this month. The CDD FAQs issued on July 19 clarify new...more

Regulators' IM Crackdown May Increase Cyber Risk

In April, the Office of the Comptroller of the Currency issued a bulletin specifically aimed at banks' use of internal messaging software. The bulletin was issued to "remind" banks of their obligations related to the...more

Cybersecurity News & Notes – July 2016 #4

In Case You Missed It: U.S. Major party platforms address cybersecurity. The two major parties have released their 2016 election platforms, both of which include cybersecurity planks. The Republican platform’s perspective...more

Popular Cybersecurity Reads - Trending Right Now

Cybersecurity issues transcend numerous sectors, marketplaces, industries - as evidenced by this list of recent popular reads on the topic....more

In Case You Missed It: Launch Links - July, 2016 #2

Some interesting links we found across the web this week: Why You Don’t Need to Found Your Startup in Silicon Valley - Startups have the potential to thrive in places less "trendy" than California....more

Is encryption the key to your data security?

With the increased rate of data breaches targeting personal information, an increased public awareness of online privacy, and an increasingly demanding regulatory landscape, large and small businesses are looking to...more

Potential Risks and Rewards of Cybersecurity Information Sharing Under CISA

When President Obama signed into law the Cybersecurity Act of 2015, which was designed to facilitate information sharing on cybersecurity threats between the public and private sectors, proponents hailed it as “our best...more

Password sharing and “head-slap hacks”: What employers can do

If you have ever wondered why your company’s data is not as secure as it should be, take a look in the mirror. A study by the Ponemon Institute, commissioned by Experian and released in May, found that the majority of...more

Cybersecurity and Data Privacy: Confidential Data Breach - Escaping Potential Liability (7/16)

The first question asked by many companies after a data breach is – What is our potential liability? On July 12, 2016 a Missouri Federal Court issued a ruling that companies should be aware of when defending customers’ claims...more

ITAR For Government Contractors: Revised For Recent Amendments

One of the most important areas of regulation for defense contractors is the International Traffic In Arms Regulations (“ITAR”). ITAR are the State Department controls that regulate the defense industry. Companies regulated...more

Member Of The Federal Reserve’s Board Of Governors Notes Benefits Of Consistent Cybersecurity Exam Approaches

On June 24, 2016, in a response letter to Senator Dean Heller (R-NV), Daniel Tarullo, a member of the Board of Governors of the Federal Reserve System, highlighted the benefits of consistent cybersecurity supervisory...more

Learning from Venmo’s Compliance Issues: How to Avoid Inadequate Privacy Disclosures

PayPal, the company responsible for the popular mobile payments app, Venmo, recently agreed to voluntarily bolster its privacy and security disclosures—and pay a $175,000 penalty—in response to an enforcement action brought...more

Black Hat Reports Increase in Cybersecurity Concerns

The 2016 Black Hat Attendee Survey was published in advance of the 2016 Black Hat Conference. Not surprisingly, the respondents to the survey conveyed an increased concern regarding security breaches versus 2015. An alarming...more

European Commission Publishes Communication on Cybersecurity

On 5 July, the European Commission (“EC”) published a communication outlining measures to improve resilience to cyber incidents, improve cooperation and information sharing, and promote innovation and competition in the...more

FinTech Companies Face Big Privacy Challenges in 2016

According to the FBI, “there are only two types of companies: those that have been hacked and those that will be.” It does not take an actual data breach, however, for a company to be liable for its data security practices. ...more

Emerging Trends Newsletter - Q2

We are thrilled to bring you the 2nd installment of Stinson Leonard Street's Emerging Trends newsletter. Recent Delaware Supreme Court Opinion Limits General Personal Jurisdiction for Foreign Corporation - Recent...more

Securities Enforcement: 2016 Mid-Year Review

The Securities and Exchange Commission (the SEC or the Commission) brought over 400 enforcement actions in the first half of 2016 and is on pace to surpass its record of 807 enforcements actions in a single fiscal year, which...more

Yet Another Congressional Proposed Corporate Reform: Proxy Advisory Firms in the Crosshairs.

Over the past six months, U.S. legislators have engaged in an unusual burst of energy to introduce three separate bills regulating various areas affecting U.S. public company corporate governance: - The Cybersecurity...more

Cybersecurity News & Notes – July 2016 #3

In Case You Missed It: Court certifies class in suit against Apple. On July 15, 2016, U.S. District Judge Jon S. Tigar certified a class of users of the mobile app Path, who allege that Apple facilitated the app’s access...more

First EU-wide cybersecurity regime set to enter force in August 2016 after final approval by European Parliament

The European Parliament gave final approval to the Network and Information Security Directive (“Directive”), the first-ever EU-wide cybersecurity standards, on July 6, 2016. The Directive seeks to improve the cybersecurity...more

The Blockchain: Beyond Bitcoin

Blockchain - While many people in the U.S. are still skeptical that bitcoin will become a mainstream currency, both private and public sectors are gaining interest in the idea that the underlying blockchain technology...more

Practical Cybersecurity Guidance from TheCityUK and Marsh

TheCityUK and Marsh have jointly published a report urging UK financial and related professional services sectors to step up their efforts to address cyber risk. The report (headed “Cyber and the City”) suggests that...more

The European Union Approves First-Ever Cybersecurity Rules

On July 6, 2016, after more than three years of debate, the European Parliament gave final approval to the Network and Information Security Directive. It establishes the first set of fundamental cybersecurity and breach...more

5 Useful Resources on the New EU General Data Protection Regulation (GDPR)

Data privacy lawyers and officers around the world are working to assess the implications of and implement (before May 25, 2018) the requirements contained within the recently passed General Data Protection Regulation (GDPR)....more

3,129 Results
|
View per page
Page: of 126
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×