Cybersecurity Data Protection

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Corporate E-Note - April 2016

In an article published by the Birmingham Business Journal in the April 1 print edition, India Vincent provides insights on a series of questions related to cybersecurity, including some best practices to help monitor for and...more

Employers Face Exposure for Cyberbreaches

A newly filed lawsuit in California and a recent decision from the U.S. Court of Appeals for the Seventh Circuit serve as reminders to employers that the protection of sensitive employee information from cyberthreats remains...more

When “Shhh” turns to “Oh $%*#!” – No Pseudonyms for Ashley Madison Plaintiffs

Nothing good has come from the Ashley Madison hacking incident, except hopefully some well-deserved apologies to loved ones. Now the E.D. Mo. Court hearing the In Re Ashley Madison Customer Security Breach Litigation, MDL No....more

Indiana Governor announces formation of Indiana Executive Council on Cybersecurity

Indiana Governor Mike Pence announced last week the formation of the Indiana Executive Council on Cybersecurity through an Executive Order. The Council, comprised of 23 members from public and private organizations, is...more

Privacy & Cybersecurity Newsletter: April 2016

What seems like a long time ago now, in 2011 PricewaterhouseCoopers (PwC) warned that “there is no question that law firms are among the companies being targeted by cyber criminals.” Despite this, many law firms believed (or...more

New report warns health care industry to expect more ransomware attacks

A new report of a survey of around 30 mid-sized hospitals by the Health Information Trust Alliance (HITRUST) concludes that health care entities should be prepared for an increase in ransomware attacks in the near future....more

Negotiating Cybersecurity Contractual Protections for Retirement Plans

The ERISA Advisory Council1 recently announced that, as part of its goals for 2016, it will be focusing on cybersecurity issues affecting retirement plans and, in particular, the extent to which such issues relate to...more

Cybersecurity Compliance Just Got Tougher

Companies need specific, well-executed plans to meet growing demands of federal and state agencies. While cybersecurity risks have increased, government regulation has traditionally lagged behind. Recently, some...more

Think You Have Insurance Against Claims for Disclosure of Confidential Information? You May Want to Check Again

Are you relying on your insurance policy to cover unauthorized or unintended electronic disclosure of confidential information? If so, you may want to take a closer look at your policy with an eye towards objections to...more

DHS Warns of New Ransomware Threats

The Department of Homeland Security (“DHS”) recently issued a joint alert with the Canadian Cyber Incident Response Centre warning of two new ransomware threats behind recent well-publicized attacks against healthcare...more

New report finds executives “placing their heads in the sand” on cybersecurity

A new report commissioned by Tanium and Nasdaq finds that 90% of corporate executives admit that they can’t read a cybersecurity report and up to 40% of corporate executives do not feel personally responsible for...more

General Liability Coverage for Cyber Risks Arising from "Publication" of Private Data

Cyber liability issues present constant concerns to individuals and to companies who are custodians of private data. The “hot button” issues presented range from questions regarding data theft, including identity and credit...more

Why and How Your Business Should Protect Sensitive Customer Data

With the battle over data privacy between Apple and the Department of Justice at the forefront of the news cycle, business owners across the country are likely asking themselves: what responsibilities do I have in protecting...more

Cyber Security IMPOSSIBLE: California AG Decides a Ceiling is a Floor

We all know why selecting appropriate data security standards is difficult. No two business are the same. Different businesses have different assets to protect and different bank accounts to tap. Different sized businesses...more

[Webinar] Is Your Organization Compromise Ready? - April 20th, 9:00 am PDT

Please join BakerHostetler’s Privacy and Data Protection team for a webinar to cover the results of the 2016 BakerHostetler Data Security Incident Response Report. Trends, top causes for a security breach, and steps you can...more

BakerHostetler Data Security Incident Response Report: Being “Compromise Ready” Better Positions Companies to Respond to Incidents...

On March 30, 2016, we released our second annual Data Security Incident Response Report. The report analyzes data from more than 300 incidents on which the firm advised in 2015. The report looks at causes of incidents,...more

[Webinar] Got Data? Analytics to the Rescue - April 19th, 12:00pm CDT

Within an enterprise, data is a dual-edged sword – it’s both the lifeblood powering critical business operations and the kryptonite preventing the business from flexing its muscle. When investigations, litigation or...more

Is Cyberinsurance the Chicken or the Egg?

The insurance industry has been making the case to Congress that cyberinsurance can be a path to good security practices, encouraging different groups inside an organization to better communicate with one another. The process...more

On the Front Lines of Cybersecurity: The Corporate Challenge

Are corporate boards suffering from cyber fatigue? Hardly. Recent surveys tell us that cybersecurity is the top risk faced by corporate America. The Bank Director’s 2016 Risk Practices survey – out yesterday –...more

Cyber Insurance: Make Sure You Understand Your Coverage

Today, businesses are increasingly purchasing cyber-specific insurance in an effort to mitigate the financial impact of a breach or other cybercrime. In terms of what might be covered in a cyber insurance policy, there are...more

Digital Insights & Trends: Potential Regulatory Pitfalls of the Mobile Payments Revolution

The mobile payments revolution has provided consumers with unprecedented options at the checkout counter. In addition to cash, consumers have myriad payment options, including prepaid cards, debit cards, credit cards, virtual...more

Privacy Tip #25 – This week is National Consumer Protection Week: know your consumer rights

The Federal Trade Commission (FTC), in collaboration with over 100 governmental, not for profit and private entities, is spearheading National Consumer Protection week, March 6-12, in an effort to educate consumers about...more

A Closer Look at Cybersecurity Legislation and Regulations in the US and Abroad - United States

Legal Framework - Summarise the main statutes and regulations that promote cybersecurity. Does your jurisdiction have dedicated cybersecurity laws? The United States generally addresses cybersecurity...more

A Closer Look at Cybersecurity Legislation and Regulations in the US and Abroad - Global Overview

With interconnectivity and use of digital storage expanding, cyberthreats posed by nation states, commercial competitors, company insiders, transnational organised crime and ‘hacktivists’ are growing on a global basis. Recent...more

Hacking Gains New Heights with Threat to Big Pharma

Cyber attacks have broken free from their initial molds of carting off with consumer credit card numbers or stealing someone’s identity. The act of digitally digging into cyberspace has hit the U.S. Department of Health &...more

1,150 Results
|
View per page
Page: of 46
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×