Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Status Updates - November 2014 #12

Forget me not. Twitter launched just eight years ago with this tweet from company co-founder, Jack Dorsey: (Please see photo below.) (Not nearly as dramatic as “Mr. Watson—come here—I want to see you”— but I digress.) ...more

Heartbleed Virus Causes Heartburn: Information Security Implications

News reports regarding the so-called Heartbleed computer virus sparked concerns regarding cyber security and digitally-stored personal information. The Canada Revenue Agency announced that the virus caused a security breach...more

Bring Your Own Challenges

From reliable surveys and less dependable anecdotes in most major markets, including the UK and the US, opinions point to the almost inevitable expansion of BYOD – Bring Your Own Device – as a cost-saving model for employers....more

Lawmakers Seek Details On Consumer Data Breaches From Financial Institutions

On November 18, 2014, several major financial institutions received requests from lawmakers for detailed information about recent data breaches and for briefings from their corporate data security officials. The lawmakers...more

Did You Know…Cybersecurity Made More Complicated by the NLRB

The National Labor Relations Board has recently inserted itself into the world of cybersecurity after the United States Postal Service suffered a security breach involving the personal data of several hundred thousand of its...more

Cybersecurity Litigation Monthly Newsletter

In August, Paytime, Inc., a payroll services company, moved to dismiss a putative class action filed in the wake of a data breach in which the personal and financial information of more than 230,000 people was compromised. ...more

Privacy Tuesday - November 2014 #2

Here are three privacy stories to start your week - 1. Dear “financial institution” : how is your data security?! Senator Elizabeth Warren (D-Mass) announced (press release) that on November 18 the Senator...more

‘Going Postal’ Over Data Breach Response: Union Files Failure-to-Bargain Charge With NLRB Against USPS

As recent high-profile cyberattacks have demonstrated, employers have a duty to protect their employees’ electronically stored personal information from being accessed by hackers, and to promptly remedy any breach in security...more

NY Financial Regulators Push Institutions to Tighten Cybersecurity

Following a string of publicly disclosed cyberattacks against both retailers and financial institutions, New York's top financial regulator called on the financial sector to be more proactive in its cybersecurity efforts. A...more

FFIEC: Financial Institutions Need to Share Cyberthreat Information

Why it matters: Financial institutions of all sizes need to share cyberthreat information with each other, the Federal Financial Institutions Examination Council (FFIEC) urged based upon an assessment performed of the...more

This Week In Securities Litigation

The Commission filed another settled FCPA action this week. The proceeding named two U.S. citizens living abroad as Respondents. The DOJ issued an Opinion discussing successor liability....more

NIST Draft Guide Advances the Debate on Cybersecurity Issues

Private sector entities looking to comment on the draft should focus on its recommendations surrounding sharing communities, standardized transfer mechanisms, and the handling of corporate legal considerations....more

Hackers Don’t Care About the Terms of Your Insurance Policy - The Importance of Retroactive Dates and Extended Reporting Periods...

A recent study reports that the median amount of time between an intrusion into a company’s computer network and the discovery of the incident is 229 days. The difficulty and length of time in detecting cyber infiltrations...more

New FDA Cybersecurity Guidance for Medical Device Manufacturers

Last month, the U.S. Food and Drug Administration issued its final guidance, “Content of Premarket Submissions for Management of Cybersecurity in Medical Devices.” Those guidelines make non-binding recommendations on the...more

Boards Should Put Time and Resources into Cybersecurity Issues – It Is Good for Business and Works as a Defense Strategy

We have previously blogged about Commissioner Aguilar’s recommendations at a NYSE conference, “Cyber Risks and the Boardroom” on what boards of directors should do to ensure that their companies are appropriately considering...more

Proposed FRCP Changes: Effect on eDiscovery, RIM & IG (CLE) [Video]

he Supreme Court is expected to approve a proposed set of revisions to the Federal Rules of Civil Procedure (FRCP), which would go into effect by December of 2015. Are you ready for those changes? In this program, Rimon...more

Cybersecurity Policy in the Lame Duck and Beyond

There are two categories of cybersecurity legislation awaiting Congressional consideration during the lame duck. First, there are a number of non-controversial, narrowly focused bills that are likely to be adopted as part of...more

Practice Makes Perfect

Amber Dolman and Robert Bishop came to Goodwin Procter in much the same way: Both started at the firm right out of law school, after having worked there as summer associates. While Bishop began in the REIT practice, he soon...more

Maximum Cybersecurity: FFIEC Releases Cybersecurity Assessment

On November 3, 2014, the Federal Financial Institutions Examination Council (“FFIEC”), an interagency body that prescribes principles and standards for the federal examination of financial institutions, released a set of...more

Baker Botts Year-End Perspectives: Bart Showalter

This is the second in a series of six Q&As with Baker Botts partners addressing the most significant developments in their practice areas this year, as well as their outlook for 2015. The Q&As will be posted throughout the...more

Cyber Security Top Priority in Today’s Tech-Savvy World

While 2014 Has Seen Miami Emerge as a Growing Technology Hub, the Year Has Also Highlighted Significant Risks that Technology Poses for Businesses of all Types....more

The Enemy Within: How To Better Protect Yourself From Technological Evils

Trekkies and modest Star Trek fans may recall the plot in an episode known as “The Enemy Within” where a malfunction in a transporter causes Captain Kirk to be split into two - a good Captain Kirk and an evil Captain Kirk....more

Internet of Things – Top 10 privacy and data protection concerns

As we discussed in our previous posts, there are a number of positive trends that make the Internet of Things a long lasting evolution. Hardware is improving, there is an increasing understanding from the industry of the...more

Five Cyber Security Takeaways from the Mid-Term Elections

While not a much-discussed topic during campaign season, federal policy on cyber-security will likely see some material changes as a result of a Republican-controlled Senate. Just how significant those changes will be has yet...more

Client Alert: Florida Information Protection Act of 2014 - One Of The Strictest Data Breach Statutes in the Nation

If your business stores personal information of Florida Residents, you must be aware of a new Florida statute that has created specific reporting requirements in the case of a data breach. Failure to comply can result in...more

1,190 Results
|
View per page
Page: of 48