Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Indiana Governor announces formation of Indiana Executive Council on Cybersecurity

Indiana Governor Mike Pence announced last week the formation of the Indiana Executive Council on Cybersecurity through an Executive Order. The Council, comprised of 23 members from public and private organizations, is...more

Senator Tom Carper Questions Office Of Management And Budget Regarding Emerging Cybersecurity Technologies

On April 8, 2016, U.S. Senator Tom Carper, the ranking Democratic member of the Senate Homeland Security and Governmental Affairs Committee, sent a letter to Shaun Donovan, Director of the Office of Management and Budget...more

Fourth Circuit Upholds Coverage Under CGL Policy for Data Breach Claims

The United States Court of Appeals for the Fourth Circuit (“Fourth Circuit”) recently concluded that an insurer had a duty to defend a health care company that was sued by individuals whose personal health information was...more

Privacy & Cybersecurity Newsletter: April 2016

What seems like a long time ago now, in 2011 PricewaterhouseCoopers (PwC) warned that “there is no question that law firms are among the companies being targeted by cyber criminals.” Despite this, many law firms believed (or...more

Cybersecurity and Employee Benefit Plan Fiduciary Duties: Going Beyond HIPAA

It seems as though we hear about new cybersecurity issues every day — from traditional hacking incidents to the increasingly sophisticated phishing, malicious apps and websites, social engineering, and ransomware attacks. ...more

Survey says… New trends from corporate in-house counsel

Recently, Kroll and Kroll Ontrack surveyed over 170 corporate in-house counsel to share their perspectives on modern legal challenges facing organizations. We asked about some of the most pressing issues – from big data and...more

The Financial Report - Volume 5, No. 8 - April 2016 (Global)

There are currently only three SEC Commissioners, rather than the normal five. A recent New York Times article discussed what appears to be a logjam in the approval of two apparently highly qualified nominees for the open...more

Phishing and Spoofing Scams — A Few Tips to Protect Yourself and Your Business

The phone rings. The caller ID says it’s your attorney’s office. When you answer, you are told you owe your attorney additional money and are directed to call a toll-free number. When you call the number, you are told how...more

Venture Capital Coast to Coast – April 2016

VC WATCH - The Venture Capital “Reset” – We Were Expecting You - Venture capital fundraising declined in 2015, with total money raised down more than 9 percent and a 13 percent decrease in the number of fund...more

UK Financial Regulatory Developments - April 2016 #16

Payments UK launches Standards Collaboration Framework - Payments UK has launched a new Standards Collaboration Framework to help the industry better access and implement the standards it relies on. Payments UK also...more

US Senate Passes Bipartisan Energy Bill

The first broad energy bill passed in nearly a decade was passed by the Senate on April 20, 2016 with an 85-12 vote margin. The Energy Policy Modernization Act of 2016, S. 2012, responds to major changes to the energy...more

The Vendor Governance Wake-Up Call

The “Panama Papers” leak and other breaches at major law firms in the past year bear out the findings from the American Bar Association’s 2015 Legal Technology Survey Report. Earlier this month, 11.5 million documents were...more

Insurance News, Spring 2016

Hackers interfere with a GPS signal, causing a vessel’s onboard navigation systems to falsely interpret position and heading. Somali pirates employ hackers to infiltrate a shipping company’s network to identify vessels in the...more

New report warns health care industry to expect more ransomware attacks

A new report of a survey of around 30 mid-sized hospitals by the Health Information Trust Alliance (HITRUST) concludes that health care entities should be prepared for an increase in ransomware attacks in the near future....more

Cybersecurity Advice to CEOs and Boards “Take more responsibility”!

The White House and its top security advisors are regularly advised about cyberintrusions and as a result the “time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security”...more

Negotiating Cybersecurity Contractual Protections for Retirement Plans

The ERISA Advisory Council1 recently announced that, as part of its goals for 2016, it will be focusing on cybersecurity issues affecting retirement plans and, in particular, the extent to which such issues relate to...more

Alert on Ransomware Attacks and Prevention

Imagine entering your office, sitting down with a cup of coffee, and going through the routine task of logging on to your computer to review your emails and schedule for the day. Except this time, there is a problem. A...more

Tennessee Gives Businesses 45 Days for Data Breach Notice

Recent amendments to the State’s data breach statute give a hard deadline for a business to provide consumer notice, removes encryption safe harbor, exempts entities that are subject to the Health Insurance Portability and...more

Ransomware Cuts Deep, in Life & in Coverage

1. Beyond Breaches - With ransomware, cybersecurity in healthcare has gone far beyond HIPAA compliance, breaches of PHI or identity theft. For the unprepared healthcare provider not able to prevent ransomware or...more

DOD Expands Cyber Security Rules for Defense Contractors

Action Item: Through a new version of its Cyber Security Clause, the Department of Defense (“DOD”) is directing defense contractors to extend their cyber defense and reporting requirements beyond their recognizable supply...more

Cybersecurity Compliance Just Got Tougher

Companies need specific, well-executed plans to meet growing demands of federal and state agencies. While cybersecurity risks have increased, government regulation has traditionally lagged behind. Recently, some...more

Investment Management Update - April 2016

Below is a summary of recent investment management developments that affect registered investment companies, private equity funds, hedge funds, investment advisers, and others in the investment management...more

O’ Really, Canada? Data Breach Log Rules Underway

In June 2015, Canada made significant amendments to its data privacy law, the Personal Information Protection and Electronic Documents Act (PIPEDA).  These amendments to PIPEDA will require businesses to inform the Canadian...more

Technological and Information Concerns Highlight NAIC Spring 2016 National Meeting

The National Association of Insurance Commissioners (NAIC) Spring 2016 National Meeting, which was held from April 3 – 6 in New Orleans, offered insight into numerous issues being considered by state commissioners nationwide....more

Think You Have Insurance Against Claims for Disclosure of Confidential Information? You May Want to Check Again

Are you relying on your insurance policy to cover unauthorized or unintended electronic disclosure of confidential information? If so, you may want to take a closer look at your policy with an eye towards objections to...more

3,017 Results
|
View per page
Page: of 121
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×