Cybersecurity Data Breach

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

California Attorney General Releases Breach Report with Key Findings and Recommendations for Retailers, Financial Institutions and...

California Attorney General Kamala D. Harris has released a “California Data Breach Report,” which presents a series of findings and recommendations based on a review of breaches reported to the Attorney General’s office in...more

Improving Data Breach Security, from the Customer’s Wallet on Up: In Wake of Massive Breaches, It May be Time to Consider...

In early September, Home Depot announced that it had suffered a severe security incident, which resulted in a massive data breach that exposed the payment card information of Home Depot customers across the United States and...more

Alert: The "Chip-and-PIN" Executive Order

On Friday, October 17, Obama signed his second major cyber-related executive order in the past two years. This most recent EO, entitled "Improving the Security of Consumer Financial Transactions," focuses squarely on the...more

Consequences of a Data Breach: Lessons from Wyndham Worldwide

On October 20, 2014, Wyndham Worldwide Corporation won dismissal of a shareholder derivative suit seeking damages arising out of three data breaches that occurred between 2008 and 2010. Dennis Palkon, et al. v. Stephen P....more

Court Dismisses Shareholder Derivative Action Targeting Directors and Officers for Data Breaches

Earlier this week a federal district court in New Jersey dismissed with prejudice a shareholder derivative suit, Palkon v. Holmes, No. 14-CV-01234 (SRC) (D.N.J.), that tried to blame the directors and officers at hospitality...more

House Committee On Oversight And Government Reform Request Hearing Regarding Data Security Breach

On October 7, Elijah Cummings, the Ranking Member of the House Committee on Oversight and Government Reform, issued a letter asking committee Chairman Darrell Issa to hold a bipartisan hearing to examine a recent data...more

Cybersecurity Litigation Monthly Newsletter

As we described in July and September, P.F. Chang’s was hit with three putative class actions following its announcement of a point-of-sale data breach. On August 29, P.F. Chang’s moved for dismissal of the first two cases,...more

Data Privacy: The Next Frontier of Corporate Compliance [Video]

Companies are collecting more and more personal data. With that collection is an increased responsibility and the potential for more government regulation. Attorneys Rick Martinez and Seth Northrop discuss the changes that...more

Health Care E-Note - September 2014

In This Issue: - Doctors, Insurers Critical of Medicare Physician Fee Schedule - Health Spending Expected to Increase Modestly Over Next Decade - U.S. Hospitals Have Highest Administrative Costs...more

Cyber Voluntary Payment Defense Thwarted by Bank Fraud Regulation

Financial institutions are one of the entities most threatened by cyber crisis events. As data breaches and cyber threats become more inventive, the risks to financial institutions and their clients continue to grow. However,...more

Hacking Coverage Dispute Under Professional Liability Policy Gets the Go-Ahead from Federal Court

On October 6, 2014, a federal court denied a professional liability insurer’s motion to dismiss a coverage dispute over a $3.5 million payment the policyholder-bank made when a bank customer’s account was targeted by a...more

California Privacy Laws Change: Identity Theft Prevention and Mitigation Services

Continuing the trend of changes in state breach notification and related laws, Cal. A.B. 1710 amends California's breach notification, security procedures, and Social Security number (SSN) laws in the wake of significant data...more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

Information security has continued to play prominently in the news as this series has evolved. Just today AT&T announced a data breach. Home Depot and Jimmy John’s, also added to the list in the past month, are still...more

Third Quarter 2014: States Expanding Data Breach Notification Requirements

California, Florida, Kentucky, and Iowa have changed their security breach notification requirements in the past few months: California passed legislation effective January 1, 2015, that for the first time, addresses...more

Data Privacy and Cyber Security in Hong Kong: The New Enforcement Imperative

Introduction - Cyber security has gained increasing attention in recent years and cyber attacks have become more sophisticated and more frequent. Cyber attacks and other data breaches can affect millions of customers...more

The General Counsel’s Role Before and After a Data Breach Incident

“It is often said that there are two kinds of companies out there — those that have suffered a data breach and those that will have one,” said Latham & Watkins partner Kevin Boyle. “So it makes a lot of sense to be prepared...more

California Amends Data Breach Law

On September 30, 2014, California joined the trend and enacted amendments to its data security laws. First, the new law expands its scope to third-party service providers and businesses that do not just “own or license...more

The typical data breach lawsuit and how to protect your company

The typical data breach lawsuit and how to protect your company - Companies can ill afford to wait until they experience a data breach to implement protective measures - With more than 1,367 confirmed data...more

Liable for not Learning from Target Data Breach?

Has the standard of care for retailers handling consumer data shifted in the last 9 months? As analysts compare the recent Home Depot data breach to the data breach of the credit card processing system at Target last...more

NBC's The Blacklist or Real-Life Attack on JPMorgan?

Attack of the hackers - Whenever I watch one of those hacker movies, I always think, “There’s no way they could actually hack into [insert the name of a heavily protected government or financial institution database...more

6 Quick Lessons from Jimmy John’s POS Data Breach

According to public releases by Jimmy John’s (the sandwich shop franchisor) and Signature Systems (the point of sale (POS) system provider for 216 Jimmy John’s locations), malware was installed on those POS systems through...more

Federal Financial Regulators Issue Warning on ‘Shellshock’ Security Vulnerability

The Federal Financial Institutions Examination Council (FFIEC) recently issued an alert warning financial institutions of a security vulnerability nicknamed “Shellshock” in software commonly used in servers and other...more

Privacy & Cybersecurity Update - September 2014

In This Issue: - Home Depot Data Breach — Lawsuits, Calls to Action and Lessons Learned - Skadden Participates in FBI Cyber-Intelligence Workshop - FTC Explores Impact of ‘Big Data’ on American...more

Cyber Risk Insurance: Surging Demand and Evolving Coverage

Cyber risk insurers are doing a brisk business these days. Reports of data breaches abound, and risk managers are understandably looking to offload some of the risk through insurance. As a result, insurers are issuing new...more

Your Client is Hacked and Personal Information is Leaked Online – Now What?

You are general counsel to a company, and your CEO steps into your office, clutching his iPhone in one hand and wiping sweat from his brow with the other, and tells you that a compromising photograph of him was stolen from...more

352 Results
|
View per page
Page: of 15