Cybersecurity Data Breach

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Alert: FTC Releases New Data Security Guide: 50 Mistakes to Avoid in 10 Lessons

The Federal Trade Commission (FTC) has brought over 50 cases against companies that put consumer data at unreasonable risk. On June 30, 2015, the FTC released a guide titled Start with Security that summarizes 10 lessons the...more

Federal Employees’ Personal Information Compromised by Data Breach

In recent headlines, the Office of Personnel Management (“OPM”) has begun notifying millions of federal employees that it may have lost their personal information earlier this month in a data breach. The data breach...more

Privacy & Cybersecurity Update - June 2015

In This Issue: - USA Freedom Act Brings Changes to Surveillance Program - Connecticut Enacts Bill Imposing Tighter Data Security Obligations - Pennsylvania Court Dismisses Data Breach Negligence...more

Password Management Company LastPass Discloses Security Breach

We know it’s hard to keep track of passwords. A good security practice is to use different and complex passwords across different platforms, but it is so hard to keep track of all of them. That’s why password management...more

Cybersecurity Standards Apply to Thee, Not Me

“If there is anyone to blame, it is the perpetrators,” said Katherine Archuleta, Director of the federal Office of Personnel Management (“OPM”), to a Senate panel investigating the causes of the recent OPM cyberattack. ...more

How to Protect Your Company’s Bottom Line Against Data Breach Losses Through Insurance

In the wake of what seems to be daily announcements of new data security breaches and increased regulatory oversight over company information security and privacy practices, companies are looking for ways to minimize risks...more

State Breach Notification Laws Continue To Change

State breach notification laws continue to be amended to (1) provide for notification of a state attorney general or regulator about a breach in addition to affected individuals, (2) cover breaches involving personal...more

IRS Data Breach Highlights the Growing Threat of Cybercrime

On May 26, 2015, the IRS announced that hackers had gained access to over 100,000 tax accounts. The data breach involved the “Get Transcript” application, which allows individuals to request transcripts of their past tax...more

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

Laws Governing Data Security and Privacy – U.S. Jurisdictions at a Glance

The below chart constitutes a summary of the laws of various jurisdictions that govern data breach notifications...more

Internet Of Things, News Websites Fare Poorly In Security And Privacy Review

On June 16, the Online Trust Alliance, an industry group focused on developing and encouraging best practices in online security and privacy, announced that a recent audit of approximately 1,000 websites showed that 46%...more

Focus on China Compliance - June 2015

In This Issue: - Increased Scrutiny by Chinese Securities Regulators Will Have Global Implications - Effective Employee Suspension Agreements to Facilitate Compliance Investigations - Protecting Against...more

Even Small Businesses Need To Pay Attention To Data Security

When people think about data breaches, corporate giants like Target, Home Depot and Michael’s spring to mind. But even small businesses holding personal information can face costly consequences if a breach occurs. In the...more

How Businesses Can Reduce Cyber Risk: Pre and Post Incident: Businesses Need to Take a More Proactive Approach to Reducing What Is...

As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more

Cyber-Attacks: Threats, Regulatory Reaction and Practical Proactive Measures to Help Avoid Risks

I. Cybersecurity; Its Importance and Relevance – How We Got to Where We Are Today - In the past few months, the White House, Home Depot, JP Morgan, Hard Rock Hotels, Tesla, the St. Louis Federal Reserve, the Internal...more

Is Your Financial Institution the Next Target of a Cyber-Attack?

In This Presentation: - Regulatory expectations for financial institutions - Risks for financial institutions - Planning to reduce risks - The Breach - Duties and responsibilities -...more

Cyber Security - Risk Management and Mitigation

In This Issue: - Agenda - Current Threat Environment - Current Threat Environment - Strategic Importance - Asian Data Privacy Regimes At-A-Glance - Data Protection: Regional temp - Asia-Pacific...more

Privacy Tuesday – June 2015

It’s appropriate that the “boys of summer” feature prominently in today’s post. Strike three for the St. Louis Cardinals? On another summer Privacy Monday in 2014, we made note of a reported hack into the Houston...more

Cybersecurity: Where Does the Buck Stop?

Over the last few months, we’ve been talking about cybersecurity issues for employers. We’ve discussed the responsibilities and risks associated with personally identifiable information and the wave of lawsuits resulting...more

The Next Examination Enforcement Wave— Cybersecurity Assessments?

Why it matters - The member banking agencies of the Office of the Federal Financial Institutions Examination Council (FFIEC) will soon promulgate a “Cybersecurity Assessment Tool” for use by community banks after a pilot...more

Cybersecurity Coverage Litigation: Learning to Survive After the Second Wave Hits

It’s a familiar pattern. First, new risks inspire legislation and regulations that impose new penalties. Next, insurers and policyholders fight over whether the new liabilities are covered under traditional liability...more

Connecticut Legislature Passes Bill Mandating Identity Theft Protection Services Following Data Breach

Connecticut’s legislature has passed a bill that imposes strict new timing requirements for entities conducting business in the state that experience a data breach, which Governor Malloy reportedly intends to sign into law. ...more

How to Form an Effective CSIRT [Video]

Rana Nader presented a Cyber Security Seminar hosted by the Hotel Council of San Francisco at the San Francisco Marriott Union Square on May 28, 2015. Her discussion focused on how hospitality industry professionals can...more

Largest Breach in U.S. Government History Is a Wake-Up Call on Need for Encryption

Employees are reasonable in assuming that their employer is protecting their personal information from compromise. The obvious way to do that is to maintain appropriate encryption technology. Simply put: encryption,...more

Republican Senators Sought To Tie Cybersecurity Measure To Defense Bill

In the wake of the recent public disclosure of the massive breach into the Office of Personnel Management compromising the personal information of approximately 4 million individuals, Senators were hoping to tie a...more

570 Results
|
View per page
Page: of 23

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×