Cybersecurity Data Breach

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Government Contractors Brace For Continuing Changes in Cybersecurity Regulations

The federal government has responded to recent data breaches by making cybersecurity a top priority, and it continues to consider and implement a number of regulations that affect government contractors. Over the past...more

New Bill Would Require Cybersecurity Disclosures by Publicly Traded Companies

Why it matters - In the continuing efforts to enact cybersecurity legislation and advise the public about cybersecurity preparedness, a new bill introduced in the Senate would mandate that publicly traded companies...more

Cybersecurity: What is on the horizon for 2016

JD Supra recently published an attorney perspective piece on defining cybersecurity issues for 2016. It should come as no surprise that resolution of insurance coverage issues made the list. Despite a plethora of data...more

New Rhode Island Law Protects Victims of Businesses’ Data Breaches in 2016

Cyber data breaches affect individuals, businesses, and the government. Tens of millions of Americans are affected by data breaches every year. In 2014, CNN estimated that 47% of U.S. adults in the U.S. had their personal...more

Privacy & Data Security Advisory: The Importance of Strategic Vendors in Breach Response

Cybercrime and data security incidents are on the rise. Publicized cyber incidents have become so prevalent that it would be difficult to find someone who has not received at least one breach notification letter in the mail....more

Cybersecurity and Data Privacy: Belated Holiday Gift - The IRS Doubles Down on Tax Free Identity Protection Services (1/16)

Following several high-profile breaches of business and government databases affecting the personal information of millions of Americans (including the IRS’s "Get Transcript" app) many businesses, governmental agencies and...more

Uber Enters Into Settlement Regarding May 2014 Data Breach, Halting New York Attorney General’s Investigation Into Uber’s...

On Wednesday, January 6, 2016, New York’s Attorney General announced a settlement with Uber Technologies, Inc. (“Uber”), which requires the company to institute a number of practices intended to increase the data privacy of...more

The Problem With Data Security is not the Hardware or the Software, It’s the Wetware

Remember this? - “Wetware” – coder slang for biological life forms (i.e., people) – is the weak link in most companies’ data security protections, according to a new data security report issued by the Association of...more

New Cybersecurity Law – Are You Prepared?

On December 18, 2015, President Obama signed into law the Cybersecurity Act of 2015. Beginning at Division N, Public Law 114-113 deals with cyber threats and includes the means and methods by which the private sector may...more

Lessons Learned from LabMD's Successful Challenge to the FTC's Cyber Authority and Wyndham's Monumental Settlement with the FTC

On the shifting sands of cyber security regulation, it is important to understand the outcome of two recent enforcement cases brought by the Federal Trade Commission (FTC) – one against clinical lab services company LabMD,...more

The Digital Download - Privacy & Data Security Monthly Newsletter - January 2016

Senior Counsel Peter Swire to Debate European Privacy Activist Max Schrems. The debate, set to take place on January 26 in Brussels, will highlight key differences between certain European and U.S. attitudes towards U.S....more

Look for additional data breach class action cases, standing decisions and shareholders’ derivative suits in 2016

2015 was a banner year for data breaches and associated class action litigation. Toward the end of the year, class action cases were filed the same day as the notification. Based upon the data breach fallout in 2015, there is...more

2015: The Year of Healthcare Data Breaches

The healthcare industry suffered its worst year to date for data breaches in 2015. The Department of Health and Human Services Office for Civil Rights (“OCR”), which tracks healthcare breaches that affect 500 or more...more

Protect Your Wine Business Against Data Security Breaches and Other Cyber Risks

When asked who should buy cyber insurance, one expert responded, “more companies than realize it.” The truth is, almost every company in the country collects its customers’ or its employees’ Personally Identifiable...more

“We’ve Been Hacked!”—New Developments in Cyber-Security Litigation

February’s Business Litigation Report advised clients that they could prepare for potential data breaches by conducting readiness audits and preparing cyber incident response plans. (See Traversing the Breach, February 2015.)...more

Appropriations Bill Has a Few Surprises

On December 18, the President signed into law H.R. 2029, the Consolidated Appropriations Act Of 2016, (the “Act”), the 887 page bill which avoided a closure of federal government functions. Beyond the massive funding of the...more

Legal Trends: Cybersecurity

New privacy torts have recently emerged in certain Canadian jurisdictions, including intrusion upon seclusion and publicity given to private life. Intrusion upon seclusion allows a plaintiff to sue if (1) a person has...more

Privacy & Cybersecurity Update - December 2015

In this edition of our Privacy & Cybersecurity Update, we provide a detailed summary of the sweeping changes to be imposed by the European Union’s new data protection regulation, which will require many companies to begin...more

What’s on the Cybersecurity Horizon for 2016?

The last twelve months saw many high-profile and innovative cyber-threats, costly and embarrassing breaches, and several cybersecurity trends. Many executives and boards have been reactive rather than proactive, catalyzing...more

Cybersecurity Legislation Stalks Bank Directors

To avoid potential personal liability for cybersecurity breaches, bank directors should take proactive steps to make sure their institution complies with all applicable regulations. In the wake of recent well-publicized...more

Omnibus funding bill creates healthcare cybersecurity task force

The $1.1 trillion spending and tax extender bill that is on President Obama’s desk awaiting signature creates a healthcare industry cybersecurity task force, which must be established within 90 days of enactment. This is...more

A Primer on the GDPR: What You Need to Know

Now that it’s been approved by the EU Parliament’s Civil Liberties Committee, Europe’s General Data Protection Regulation (the “GDPR” or the “Regulation”) is well on its way to replacing the 20-year-old Data Protection...more

New EU Data Protection and Cybersecurity Laws Finalised

The General Data Protection Regulation places new obligations on businesses to protect personal data with high financial penalties for noncompliance. The European Commission has confirmed that the new General Data...more

What the FTC’s Settlement With Wyndham Means for Your Company

The recent settlement entered into between the Federal Trade Commission (FTC) Wyndham Hotels and Resorts and related companies (Wyndham) provides an important roadmap for companies seeking to avoid running afoul of the FTC’s...more

FTC and Wyndham Call a Truce

Following the Third Circuit’s ruling upholding the FTC’s authority to regulate unfair and deceptive cybersecurity practices under Section 5 of the FTC Act, Wyndham Worldwide Corporation and the FTC have agreed to settle. ...more

907 Results
|
View per page
Page: of 37

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×