Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Popular Cybersecurity Reads on JD Supra

From latest data breach laws to cyber liability insurance to the FTC's consumer data safety guidance ... a recap of popular Cybersecurity reads on JD Supra during the second half of July, 2015....more

Understanding Cyber Liability Insurance Coverage

The last two years of headline news about cyber-breaches and computer system malfunctions have led a rapidly-growing number of companies to purchase insurance coverage to protect themselves from technology and cyber privacy...more

Purchasing Credit Monitoring May Not Protect Companies from Data Breach Class Actions

2014 set a record for data incidents, with nearly 30% of the 783 data incidents reported by companies caused by hacking. At least 97 incidents are reported to have occurred from hacking during 2015, affecting approximately 7...more

U.S. Senators Introduce Automobile-Focused Cybersecurity Legislation

On July 21, Senators Blumenthal (D-CT) and Markey (D-MA) introduced legislation, the Security and Privacy in Your Car Act (“SPY Car”Act), that would protect drivers’ privacy while allowing them to remain connected to the...more

Getting More Personal: California Amends Data Security Law

California’s data security statute will get a little more “personal” as of January 1, thanks to a recently-passed amendment revising the definition of covered personal information. On July 14 California expanded the...more

Data Breach Plaintiffs Bag a Win on Standing - Seventh Circuit Finds Against Neiman Marcus

In what is sure to be a widely cited data breach standing decision, the U.S. Court of Appeals for the Seventh Circuit found that increased risk of future harms from a data breach are sufficient to confer standing to sue upon...more

The Internet of Things and the Inevitable Collision with Products Liability PART 3: Initial Contact

This is the third in a series of blogs examining the rapid development of the Internet of Things (IoT) and its consequential impact on product liability risk. The development of the IoT has been so rapid and the applications...more

“Everything Old is New Again” – Issues in Recent Cyber Insurance Litigation

Early days still for coverage litigation about cyber risks – whether under cyber insurance policies or other types of policies. This is not surprising given the relatively short history of cyber risks and even shorter history...more

Ashley Madison Reveals Even More: Hacking May Be An Inside Job

In recent years, hacking has infiltrated the retail industry. Hacking has infiltrated the healthcare industry. Hacking has infiltrated the sports industry. And now, hacking has now infiltrated the most personal (some would...more

Cyber Risk Governance in the Digital Age

It has taken a while for companies to realize the value of digital assets, and it is also taking a while for companies to digest the significance of digital risks. In the digital economy, virtually all aspects of business...more

Higher Education Institutions Increasingly Falling Victim to Cyberattacks

Higher education institutions are treasure troves for hackers. Colleges and universities are huge repositories of research data, sensitive information for large populations of applicants and enrolled students (personal,...more

The Connected Car and Keeping YOU in the Driver’s Seat

Remember KITT? KITT (the Knight Industries Two Thousand) was the self-directed, self-driving, supercomputer hero of the popular 1980s television show Knight Rider. Knight Rider was a science fiction fantasy profiling the “car...more

Jeep Hack Drives Cyber, Crisis, Liability and Supply Chain Coverage Issues

A recall notice to fix critical control software on 1.4 million vehicles should raise concerns for companies, brokers and insurers across several business lines. The vulnerability of vital control systems to a remote hacking...more

FERC, NERC and Business Blackout: New CIP Standards and Fictional Cyber Attacks

The Federal Energy Regulatory Commission (FERC) issued a Notice of Proposed Rulemaking (NOPR) July 16, 2015, proposing to approve various Critical Infrastructure Protection (CIP) reliability standards proposed by the North...more

Federal Data Breach Bill Stalled in Congress

A key distinguishing feature of U.S. data privacy laws is their patchwork nature. There are industry-specific data privacy laws at the federal level (think HIPAA or the GLBA), yet there are no comprehensive federal standards...more

Treasury Deputy Secretary Raskin Delivers Remarks on Cybersecurity in the Financial Sector

On July 14, Deputy Secretary of the Treasury Sarah Bloom Raskin delivered remarks at the American Bankers Association Summer Leadership meeting in Baltimore. Speaking on cybersecurity and cyber-resiliency in banking and the...more

The SEC's Investment Management Division Has Some Things to Tell You about Cybersecurity

Lots of agencies and organizations want to boss you around about cybersecurity. In April, the SEC and the Justice Department published more directions on the issue. We’ll cover the very brief guidance issued by the SEC’s...more

Brokers Beware: Will the SEC Extend New Cyber Guidance to Brokers and Investment Advisers?

Against the backdrop of a steady stream of cyber-attacks and data breaches, Securities and Exchange Commissioner Luis A. Aguilar recently spoke about his hope to expand upcoming SEC cyber security guidance, known as...more

That is SO last week - July 2015 #4

Last week, the Equality Act was introduced in Congress. If enacted, this historic legislation will prohibit discrimination in employment and other life activities on the basis of sexual orientation and gender identity. It’s...more

Russian Government Considering Delaying Data Localization Law

A controversial data localization law in Russia that would require businesses to perform data storage and processing with servers located on Russian soil is set to go into effect on September 1, 2015, after an amendment...more

The SEC’s Investment Management Division Has Some Things to Tell You about Cybersecurity

Lots of agencies and organizations want to boss you around about cybersecurity. In April, the SEC and the Justice Department published more directions on the issue. We’ll cover the very brief guidance issued by the SEC’s...more

Connecticut Legislation Establishes Strategic Partnerships in Cybersecurity

On July 10, 2015, Governor Malloy signed into law Special Act No. 15-21 – An Act Establishing Strategic Partnerships in Cybersecurity. The Connecticut legislation directs the Department of Labor, in conjunction with the...more

Government Contracts Quarterly Update - July 2015

The Government Contracts Quarterly Update is published by BakerHostetler’s Government Contracts Practice team to inform our clients and friends of the latest developments in federal government contracting. Please see...more

DOJ Cracks Down on Cyber Criminals

The Department of Justice (DOJ) recently announced the largest coordinated international law enforcement effort ever directed at an online cyber-criminal forum. Financial institutions and other companies should consider...more

This Is Not Your Father's Oldsmobile: Car Hacking and the SPY Car Act

Not coincidentally, on July 21, 2015, Wired Magazine published an article with groundbreaking evidence of hacking a car wirelessly, and Senators Edward Markey (D-Mass.) and Richard Blumenthal (D-Conn.) introduced legislation...more

1,978 Results
|
View per page
Page: of 80

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×