Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

GPEN Publishes Privacy Sweep Results

On 10 September 2014, the Global Privacy Enforcement Network (GPEN) published the results of its privacy enforcement survey or “sweep” carried out earlier in 2014 with respect to popular mobile apps. The results of the sweep...more

“LoProCo”, 12,915 Complaints, and Other Lessons from OCR/NIST

12,915 complaints were reported in 2013 to the Department of Health and Human Services Office of Civil Rights (“OCR”) according to Illiana L. Peters, Senior Adviser for HIPAA Compliance and Enforcement. Cozen O’Connor...more

FFIEC Announces Cybersecurity Preparedness Efforts

The Federal Financial Institutions Examination Council (FFIEC) recently announced a series of initiatives aimed at promoting cybersecurity preparedness for community financial institutions throughout the country....more

Your Client is Hacked and Personal Information is Leaked Online – Now What?

You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

The Human Element of Information Security, Continued - In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the...more

Five Basic Steps for Dealing with Cybersecurity Threats

Recent legal headlines have been filled with news about data breaches and lapses of information security across all sectors of the economy. Hospitals, colleges, and even major international retailers such as Target and Home...more

Internet of Things reviewed by data protection regulators

The growth of the Internet of Things brought the attention of the European data protection regulators that through the European data protection advisory body, the Article 29 Working Party, issued an opinion on the Internet of...more

Bipartisan LEADS Act Aims to Protect Data Stored Abroad

On September 18, 2014, Senators Orrin Hatch, Dean Heller and Chris Coons introduced "The Law Enforcement Access to Data Stored Abroad Act" (LEADS), a bill that would amend provisions in the Electronic Communications Privacy...more

Today's special - fraud, hammers and nails

"... the company was slow to respond to early threats and only belatedly took action." By now we've all heard about the latest credit card breach within Home Depot - that account information of 56 million cardholders...more

Italian Data Protection Authority: analysis of the first half 2014 and action plan

The Italian Data Protection Authority (Garante) has recently made available the results of the first half 2014 activities: 196 inspections, fines issued in the range of 2,5M Euro (already collected). ...more

So You Think You Have a Point of Sale Terminal Problem?

If your company has a Point of Sale (POS) terminal anywhere in its infrastructure, you are no doubt aware from the active media coverage that malware attacks have been plaguing POS systems across the country....more

Privacy Tuesday – September 2014

Happy autumnal equinox Home Depot Breach – By the Numbers: - 56 million cards at risk (compare to Target = 40 million) - $62 million in estimated costs (compare to Target =$146 million and...more

The Home Depot Data Breach: There’s No Time Like the Present for Cybersecurity

As Home Depot’s recent cybersecurity breach emphasizes, there is no time like the present to institute controls designed to prevent an attack. In the latest data security breach, Home Depot’s servers were broken into,...more

Redaction: Protecting Your Private Digital Data

In today’s digital age, no person’s private information is considered off limits by hackers. Recently, several celebrities, including Jennifer Lawrence and Kate Upton, had their iCloud storage accounts hacked and their...more

Post navigation Cyber Insurance Primer – An Overview of Coverages

Insurance coverage for cyber risk – both first-party and third-party loss – is a burgeoning type of insurance many major carriers are now offering to their policyholders. In view of this significant growth, this blog will –...more

Intellectual Property and Technology News (Asia)

Welcome to the most recent Asia Pacific edition of Intellectual Property and Technology News, our biannual publication designed to report on worldwide developments in IP and technology law, offering perspectives, analysis and...more

QATAR: Promulgating the Cybercrime Prevention Law

On 15 September 2014, Qatar’s Emir approved Law No. 14 of 2014, The Cybercrime Prevention Law (“Cybercrime Law”). Although it has not yet been published in Qatar’s Official Gazette, the text of the law was published in the...more

Retailer - Fall 2014

Counting the Cost of Payroll Cards: Are they Worth it for Employers? Retailers, as well as other employers, have grown to rely on payroll cards to compensate employees who may not have bank accounts. What are the legal risks...more

The Celebrity Hacking Scandal and You: 3 Takeaways for Everyone

By now we all know a hacker accessed the personal iCloud accounts of dozens of A-list celebrities and leaked nude photos of stars such as Jennifer Lawrence, Kate Upton, Kirsten Dunst, and Victoria Justice. The anonymous...more

Back -to- School 2014

In mid-August Jewel-Osco announced that its computers, containing credit and debit card information, had suffered an “unlawful intrusion”. They are but the latest retailer to do so with the list that now includes CVS, Home...more

Corporate Insurance Trends 2014

Although we are seeing the tail end of many of the claims which arose from the Global Financial Crisis, the sophisticated plaintiff’s bar and ever-developing class action landscape means that companies and their officers will...more

Information Security Training Master Class: Winning the Battle Against Data Breaches, Malicious and Negligent Employees, and...

Disclaimer: I am a crazy person. I read over 50 articles before I wrote this (WHO DOES THAT) and I’m not even sure how I got so sucked in. In short, information security is a big deal right now – and there are tons of ways to...more

CIOs Spur Revenue Generation Through Smart Cybersecurity

Today as companies increasingly realize the value of strong cybersecurity, those CIOs who successfully implement an effective cybersecurity system should be viewed as a critical part of the revenue generation effort. An...more

Credit Unions Continue to Demand New Data Security Standards for Retailers and Right to Recover Losses After a Breach

On September 3, 2014, following the news of a possible breach at Home Depot (which was confirmed on September 8), the National Association of Federal Credit Unions (NAFCU) called on Congress to enact new legislation to hold...more

The Trend of Stricter State Data Breach Laws Continues with Florida

Florida’s new Florida Information Protection Act, Fl. Stat. § 501.171, became effective July 1, 2014. The new law repeals and replaces Florida’s existing data breach notification requirements (Fl. Stat. § 817.5681) with more...more

1,089 Results
|
View per page
Page: of 44