Cybersecurity Data Breach

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Safeguarding Your Information Assets: Are You Prepared?

In view of the well-publicized data breaches in 2014 and the current renewed federal legislative focus on privacy and data security issues, we are highlighting some action items to safeguard your company’s information assets,...more

Looking At Angles Of Liability After A Cyberattack

All employers have personnel data on their information technology systems and devices. This data includes personally identifiable information such as names, addresses, birth dates and Social Security numbers of employees and...more

Congress Begins Discussing Cybersecurity – For Real This Time

Legislators from the House of Representatives will begin work today on figuring out how to protect American companies from cybersecurity breaches.  The panel will host comments from the retail, tech, and marketing industry...more

"Insights Conversations: Cybersecurity"

This past year has been called the "year of the massive data breach," with many high-profile attacks on well-known companies. Skadden partners Cyrus Amir-Mokri, Patrick Fitzgerald, Marc S. Gerber, Stuart D. Levi and Timothy...more

2014 Mobile Privacy and Security Trends and What to Look for in 2015

Most analysts and commentators agree that 2014 was the year mobile reached a tipping point. With over 1 billion mobile smartphones in circulation, 2014 marked the first year that mobile Internet usage surpassed desktop use in...more

Dealing with High Risk Data

When people think of high risk data, most think of Personal Health Information and Personally Identifiable Information as it relates to HIPAA and the health care industry, but Steve Shebest’s very informative article “High...more

Navigating the Cyber Liability Storm - Part II

Franchisors are facing a precarious three-way intersection of increased accountability and regulation over consumer privacy, the growing volume and sophistication of cyber-attacks on consumer data, and the expanding...more

Navigating the Cyber Liability Storm Part I

Franchisors are facing a precarious three-way intersection of increased accountability and regulation over consumer privacy, the growing volume and sophistication of cyber-attacks on consumer data, and the expanding...more

Five 2015 Corporate Compliance / Litigation Issues Manufacturers Need To Keep An Eye On

It is our annual tradition at the beginning of each year to report on significant issues that face manufacturers/distributors in the year ahead.  Two weeks ago, Matt reported on significant issues in the labor/employment...more

The Road Ahead: Privacy and Cybersecurity in 2015

2014 has been called the “Year of the Data Breach.”  In the wake of many high-profile data breaches, including the recent Sony breach, 2015 promises a continued focus on privacy and cybersecurity issues. This week, President...more

White House Takes Action on Data Breach, Cybersecurity and Privacy; Calls on Congress to Follow Its Lead

2014 has been described as the "Year of the Data Breach." With data breaches, cyber attacks and privacy issues regularly in the news, the White House orchestrated a series of events this week to highlight administration...more

Privacy Tuesday – January 6, 2015

Welcome to the first Privacy Tuesday of 2015! We hope that you enjoyed our 12 Days of Privacy series (and if you missed it, they are all linked in the right column of the blog…). Three things that you should...more

Privacy & Cybersecurity Update - December 2014

In This Issue: - The Critical Takeaway for Every Company From the Sony Cyber Attack - Sony Data Breach Class Action Complaint Provides Insight Into Cybersecurity Issues - Reminder: New California Data...more

Cybersecurity Litigation Monthly Newsletter

Symantec Corporation, the data security software provider, filed a motion to quash the plaintiffs’ third-party subpoena in the consolidated class action over Target Corporation’s massive customer data breach in late 2013. ...more

The New York State Department Of Financial Services (“DFS”) Issues Industry Guidance Letter To DFS-Regulated Banks

On December 10, the DFS issued an industry guidance letter to all New York DFS-regulated banks announcing new targeted DFS cyber security preparedness assessments. The new cyber security assessments will become part of all...more

New California Privacy Laws

California continues to lead the way in passing new or updating existing data protection legislation. The weekly disclosure of new data breaches that involve retail and other corporations has focused the general public...more

Cybersecurity Lessons Learned From the FTC’s Enforcement History

In 2014, cybersecurity and data breach incidents regularly made the headlines, with the reported breaches becoming increasingly large and complex. As in the past, these data breaches have inevitably been followed by a flurry...more

What Can You Expect in 2015 Regarding HIPAA Enforcement?

As of earlier this month, 1, 170 breaches involving 31 million records have been reported to the Department of Health and Human Services (HHS) since mandated reporting of breaches began in September 2009.  An increase in the...more

What Do Employers Need to Know in the Wake of the Latest Data Breach?

Sony Pictures Entertainment, Inc. is the latest high-profile business victim of data theft. The consequences have been significant. In response to threats of violence, Sony has reconsidered its range of options for the...more

Did Sony Let the Terrorists Win?

Unless you’ve been living under a rock recently, you’ve probably heard about the hoopla caused by the new Seth Rogen and James Franco movie called the interview. The movie follows a plot to assassinate North Korean dictator...more

Lessons For Corporate Directors From The Wyndham Data Breach Derivative Action

On October 20, 2014, Wyndham Worldwide Corporation won dismissal of a shareholder derivative suit seeking damages arising out of three data breaches that occurred between 2008 and 2010. Dennis Palkon, et al. v. Stephen P....more

Cybersecurity Monday: Who Is Shopping for Your Data?

At this time of year, everyone is shopping for a good bargain. And with “Cyber Monday,” the internet has become the place to go for the best deals. The shift to online and cloud-based information systems and data storage has...more

Alert: Congress Ramps Up Cyber Legislation Activity: Four Bills Await President Obama's Signature

After years of pundits saying "oh, major cyber legislation will pass this year," it may finally be happening. Last week Congress hammered out details on four different cyber bills that are intended to help the country move...more

New York Establishes New Cyber Security Examination Process for Financial Institutions

New York’s Department of Financial Services released a letter on December 10, 2014, announcing the details of its plan to focus more attention on cyber security matters in conducting examinations. Directed at New...more

On the Fifth Day of Privacy, California (and Delaware) gave to me

sing it with me now…. Five Golden Rules…….(well, five new privacy laws/requirements) There are five significant new privacy laws/amendments that will be effective as of New Year’s Day — January 1, 2015 — and...more

401 Results
|
View per page
Page: of 17