Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

New Mandatory Exclusions in Standard CGL Policies Limit Coverage for Data Breaches

The insurance industry continues to respond to the growing threat of data breaches by directing businesses facing that risk towards new, risk-specific cyber insurance products, while attempting to restrict coverage for data...more

Third Circuit to Consider FTC’s Authority Over Data Security Standards in FTC v. Wyndham

We have written previously about the FTC’s action arising out of the data breach suffered by the Wyndham hotel group, and the company’s petition for permission to pursue an interlocutory appeal regarding the FTC’s use of its...more

Capital Thinking: Cybersecurity

Legislative Branch Activity - House Cybersecurity Legislation - This week, the House will consider four pieces of cybersecurity legislation on the floor including the National Cybersecurity and Critical...more

An Emboldened FTC: What Does It Mean for a Company’s Cybersecurity Team?

In April, Edith Ramirez, Chairwoman of the FTC, and Julie Brill, FTC Commissioner, tweeted: “Pleased the court recognized @FTC’s authority to hold biz accountable for safeguarding consumer data & look forward to trying this...more

OCR to Begin Phase 2 of HIPAA Audit Program

The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) will soon begin a second phase of audits (Phase 2 Audits) of compliance with Health Insurance Portability and Accountability Act of 1996 (HIPAA)...more

House of Representatives Passes SAFETY Act Amendment

The U.S. House of Representatives took a major positive step towards increasing the nation’s cyber security posture today when, on a voice vote, it passed H.R. 3696, the “National Cybersecurity and Critical Infrastructure...more

Capital Thinking: General Legislative

Senate Legislative Activity - The Senate will convene on Monday, July 28, at 2:00 pm. After any leader remarks, the Senate will proceed to Executive Session to resume consideration of Executive Calendar #929—Pamela...more

Privacy Tuesday: July 2014 #4

The last Tuesday in July — the summer of 2014 is rapidly slipping away! Here are some privacy and security bits and bytes for this last week of July...more

It’s No Surprise: Health Care Data Breaches Are on the Rise and So Is Government Enforcement

In This Issue: - The Take-Aways for Covered Entities and Business Associates - For More Information - Excerpt from The Take-Aways for Covered Entities and Business Associates: As a majority of the...more

Mobile Application: Security Best Practices

The industry for mobile applications is growing rapidly. As companies and independent developers look to gain—or strengthen—footholds in this competitive space, the Federal Trade Commission (FTC) asks, “… is security keeping...more

Sourcing Reference Guide: A reference tool for customers and service providers explaining current best practice and thinking from...

Outsourcing and the New Australian Privacy Law: In a nutshell - In Australia all APP Entities which collect, use or disclose Personal Information must, under the Privacy Act 1988 (Cth) (“Act”), take reasonable steps...more

SEC Charges ECN Operator For Failing To Protect Customer Data

Fragmented markets, alternative trading systems and dark pools are increasingly a focus of discussion in the wake of repeated market outages. Interest in these venues has been intensified by the publication of Flash Boys and...more

New York Proposes First Virtual Currency Licensing Framework

On July 17, the New York DFS announced a proposal to establish a licensing regime for virtual currency businesses, the first by any state. In January, the DFS held a two-day hearing on developing a regulatory framework for...more

Congress Putting Microscope on FTC Enforcement

On July 24, 2014, the House Committee on Oversight and Government Reform held a hearing entitled, "The Federal Trade Commission and Its Section 5 Authority: Prosecutor, Judge and Jury." The purpose of the hearing was to...more

Washington Insight - July 2014

In This Issue: - Progress Toward Comprehensive Patent Reform Stalls - As Attention Turns to a Border Supplemental, a Twelve Bill Omnibus Seems Certain - Highways, Taxes, and Partisanship: The Next...more

Cyber Security: Forewarned is Fair-Warned

When Wei Wong, owner of Sushi Mushi, a popular Japanese food bistro in Texas, installed a phone add-on to take credit and debit card payments straight from his employees’ phones, his revenues skyrocketed. Yesterday the Feds...more

Think Beyond Social Media Training: There’s More than One Way to Manage Social Media Risk

I have to admit that since I’ve thrown myself into the deep end of the compliance field, I may have gotten a bit narrow-minded, especially when it comes social media. When social media came up in my MBA Information Technology...more

New York AG Reports that Data Breaches Cost New York Businesses over $1B Last Year

The current headline in data security is a just-released report from the New York Attorney General's Office (the "AG Report") announcing that the number of reported data breaches more than tripled between 2006 and 2013,...more

They are coming for your client’s data. What will you do if they succeed?

Data security breaches—no industry is immune. These hackers can phish, spoof, skim, packet sniff, and key log their way into your system. Once a hacker successfully hacks into a corporation’s server, the breach will go...more

The Google Tornado: Just How Ground-Breaking Is The "Right To Be Forgotten"

The recent decision of the European Court of Justice relating to Google and the "right to be forgotten", enabling citizens from the European Union to request search engines operating in Europe to delete, or not to show,...more

PCAOB Focuses on Cybersecurity at Standing Advisory Group Meeting

Panelists at the PCAOB’s June 25 Standing Advisory Group Meeting discussed cybersecurity and the potential implications for financial reporting and auditing. Some of the highlights from the panel include the following...more

Secretary of the Treasury Lew Urges Financial Institutions to Enhance Their Cybersecurity Defenses

Secretary of the Treasury Jacob J. Lew presented remarks at a conference hosted by CNBC and Institutional Investor in which he urged financial institutions to increase their cybersecurity defense efforts because cyber...more

The Admiral Sets A Good Course

Admiral Mike Rogers, the new leader of the National Security Agency and Cyber Command at the Defense Department, certainly has taken a different approach from his predecessor, General Keith Alexander. Right out of the gate,...more

Several States Aggressively Address Data Security

Legislative action abound! The nation’s several states have been busy this year attempting to protect the citizenry’s protected personal and private information....more

Private Fund Update - July 2014 #2

In this issue: - The 113th Congress - The Administration - Securities and Exchange Commission - Association for Corporate Growth (ACG) - Small Business Investor Alliance (SBIA) -...more

1,026 Results
|
View per page
Page: of 42