Cybersecurity Data Breach

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Hackers seek to access intellectual property assets of higher educational institutions

College and universities, like many other businesses and organizations, defend against millions of cyberattacks each day. Most recently, Penn State’s College of Engineering discovered a multi-year long cyberattack seeking...more

CareFirst Suffers Cyberattack, Data Breach of 1.1 Million Customers’ Information

BREAKING NEWS: Health insurer CareFirst BlueCross BlueShield disclosed today that hackers gained access to one of its databases, exposing personally identifiable information for approximately 1.1 million people....more

Insurance Recovery Law - May 2015 #2

Recent Lawsuit Underscores Critical Lessons for Purchasers of Cyber Insurance - Why it matters: Columbia Casualty Company v. Cottage Health Systems was filed on May 7, 2015, in the Central District of California. Cottage...more

Nevada Broadens Definition of Personal Information for Purpose of Encryption and Breach Notices

On May 13, Nevada passed a new law (A.B. 179) expanding the definition of “personal information” to include a natural person’s first name or initial and last name in combination with: 1) medical and health insurance...more

Recent Lawsuit Underscores Critical Lessons for Purchasers of Cyber Insurance

Columbia Casualty Company v. Cottage Health Systems, No. 2:15-cv-03432, was filed on May 7, 2015 in the Central District of California. Cottage Health is one of the first cases nationwide—if not the first case—in which the...more

Privacy Laws in Asia - May 2015

Privacy legislation in Asia has been extremely active in the past few years, and the level of activity and enforcement does not show any signs of slowing down. Eleven jurisdictions in Asia now have comprehensive privacy laws:...more

CNA Denies Cyber Insurance Claim

Key takeaway: The insurance applications and underwriting questionnaires prepared in connection with cyber insurance do matter. Cyber security, and cyber insurance, have dominated the industry headlines for several...more

To Err Is Human; to Indemnify, Divine?: Human Foibles in the Cloud

BakerHostetler’s inaugural Data Security Incident Response Report (the “Report”) concluded that employee negligence and theft were two of the top five causes of data security incidents for the more than 200 incidents that we...more

Florida Enacts Law Providing for Civil Remedy Against Cyber Fraud and Abuse

On May 14, Florida Governor Rick Scott signed the Computer Abuse and Data Recovery Act (CADRA) into law. CADRA is intended to provide a remedy to businesses for harm or loss caused by unauthorized access to protected...more

The DOJ’s New Cyber Security Best Practices — Creating a Standard of Care?

On April 29, 2015, the U.S. Department of Justice Computer Crime and Intellectual Property Section (“DOJ”) issued version 1.0 of its “Best Practices for Victim Response and Reporting of Cyber Incidents.” It draws on “lessons...more

Cybersecurity: Integral to Overall Risk Management for Insurers and TPAs

Recent data breaches have brought cybersecurity to the attention of insurance companies, and serve as a reminder to third party administrators ("TPAs") that cybersecurity issues are a serious compliance and regulatory...more

Cybersecurity Oversight: What is a Board of Directors to Do?

Cybersecurity and the risks of data breaches figured prominently at the 35th Annual Ray Garrett Corporate and Securities Law Institute held April 30, 2015, at Northwestern Law School in Chicago. Participating in a panel...more

Nevada Expands Definition of PI for Purposes of the State’s Breach and Safeguards Laws

Nevada’s recently amended law will, among other things, create the first state mandate to encrypt online account credentials. Specifically, on May 13, 2015, Nevada Governor Sandoval approved a bill (“AB 179”) to expand the...more

State AGs’ Interest in Privacy and Cybersecurity – No End in Sight – REDUX (or, if you prefer, we told you so…)

Reed Smith has been closely following the interest and activities of State AGs in the areas of privacy and cybersecurity, and recently blogged on a major NAAG (National Association of Attorneys General) conference in April on...more

Court Dismisses Data Breach Class Complaint For Lack Of Standing - May 2015

On May 4, 2015, the U.S. District Court for the Eastern District of Louisiana held that a putative class plaintiff lacked standing to pursue claims against eBay Inc. (“eBay”) arising out of a data breach that occurred in...more

The Data Breach Notification That Cried Wolf: How Connecticut’s Overbroad Data Breach Notification Statute Undermines the...

Connecticut’s data breach statute is a wolf in sheep’s clothing. That statute’s definition of “breach of security” is overbroad, encourages over-notification, and undermines the goal of protecting consumers from identity...more

New Study Finds That Criminal Attacks Are The Number One Cause Of Health Sector Data Breaches

On May 7, 2015, the Ponemon Institute released its Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data (the “Study”), which surveyed 90 HIPAA covered entities and 88 business associates regarding their...more

eBay Lawsuit Dismissed

On May 4, 2015, a US District Court judge in the Eastern District of Louisiana dismissed a class action lawsuit that sought damages from eBay based on the “threat of future harm” stemming from the online retailer’s 2014 data...more

The BakerHostetler Data Security Incident Response Report 2015

The rate of disclosures of security incidents in 2015 continues at a pace that caused many to call 2013 and then 2014 “the year of the breach.” Most incidents are described publicly with attention-grabbing terms such as...more

The GC’s 30-Minute Breach Drill

A data breach requires you, the general counsel, to quickly assess the situation and be able to give a coherent initial report to your CEO. If you are well organized you should be able to prepare an effective CEO initial...more

Guidance for Incident Response Plans

Organizations are preparing for data incidents and breaches by developing, updating, implementing, and testing incident response plans. This article provides a checklist of key components of an incident response...more

Justice Department Provides Cybersecurity Guidance

In late April, the Department of Justice’s Cybersecurity Unit provided a set of voluntary best practices for companies faced with the prospect of data breaches. The DOJ’s best practices were expressly developed with smaller...more

King & Spalding Lawyers Attend DOJ Cybersecurity Industry Roundtable On Data Breaches

On Wednesday, April 29, King & Spalding Partner Phyllis Sumner and Counsel Nick Oldham participated in DOJ’s first Cybersecurity Industry Roundtable regarding data breaches. The Roundtable included several notable DOJ and law...more

Partners HealthCare Hit with Phishing Expedition Exposing 3,300 Patient Records

Late last week, Partners HealthCare announced that it notified approximately 3,300 patients of a security breach involving a hacking incident where intruders accessed medical and personal information of patients....more

Advertising Law - May 2015 #2

Data Breach Notification, Cyber Sharing Bills Move Forward - As multiple privacy and data security bills wend their way through the legislative process, three proposals have made significant steps forward. ...more

506 Results
|
View per page
Page: of 21

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×