Cybersecurity Data Protection

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Privacy Tuesday – April 14, 2014: Heartbleed Headaches

Last week was certainly the “week of the Heartbleed.” Unless you have been on vacation on a remote island (and if so, good for you!), you have heard and read much about the latest mass bug to infect the Internet....more

With OpenSSL Compromised by Heartbleed, an Opportunity for Companies to Diversify Cyber Security Efforts

The recent discovery of the “Heartbleed” online bug has sent shockwaves through the internet, causing companies and individuals alike to question very basic assumptions about cyber security. The bug has allegedly existed for...more

FTC Data Security Authority Confirmed, For Now: Wyndham’s Motion to Dismiss Denied

The FTC’s Claim - A New Jersey federal judge has confirmed the Federal Trade Commission’s (“FTC”) authority to regulate data security and bring claims against companies suffering data breaches due to inadequate...more

Aggressive Liability Theory Does Not Eliminate Obstacles To Banks’ Claims In Target Data Breach Class Action

The latest salvo in the Target data breach litigation is a class action brought by credit card issuing banks advancing a creative and somewhat misleading construction of the Minnesota’s Plastic Card Security Act. The banks...more

DOJ & FTC Release Cybersecurity Threat Information Exchange Policy

The US DOJ Antitrust Division and the FTC yesterday released a joint policy statement on the sharing of information between private parties, including competitors, to counter cybersecurity threats. The agencies acknowledge...more

“Heartbleed” Bug – Antibiotics Won’t Help, Changing Passwords Might

After recovering from high-profile data breaches at Target and Neiman Marcus, signing up for free credit monitoring and analyzing our credit reports, a new Internet villain recently emerged: the “Heartbleed Bug.” The...more

Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers [Video]

With data breaches, cyberterrorism and governmental enforcement of the protection of privacy on the rise, corporations are facing an increased likelihood of claims, legal proceedings and costs. Without a proper understanding...more

Trade Secrets? Tips For Keeping Data Safe

The leak of National Security Agency (NSA) data by computer contractor Edward Snowden ignited a global discussion about secrets of all kinds. For business owners, the increased odds of high tech theft are good reason to...more

Federal Court Upholds FTC’s Authority To Bring Enforcement Actions Over Data-Security Standards; Will Class Actions Follow?

Already, 2014 has been an eventful year in the world of data breaches and cybersecurity. In addition to a flurry of litigation over high-profile breaches at the start of the year, the National Institute for Standards and...more

U.S. District Court Confirms FTC Authority To Regulate Corporate Data Security Practices

On April 7, 2014, Judge Esther Salas of the U.S. District Court for the District of New Jersey denied the first ever motion to dismiss filed in Federal court that challenged the authority of the Federal Trade Commission (“the...more

Internet of Things at the Salone, but what legal issues for furnitures?

The Internet of Things will generate 9 billion devices by 2018 according to estimates, but the recent hacker attack that caused a fridge to send over 750,000 spam and phishing messages over the Christmas break create concerns...more

Part I: The Elephant Emerges From the Mousehole: The Wyndham Worldwide Case and the Expanding Power of the FTC to Police Data...

In support of its motion to dismiss the FTC’s complaint alleging data security deficiencies in violation of Section 5 of the FTC Act, Wyndham Worldwide Corporation cited the Supreme Court’s opinion in Whitman v. American...more

First Glance: Legal Implications of the Heartbleed OpenSSL Bug?

The vulnerability caused by the Heartbleed bug circumvents the purpose of OpenSSL: encryption. Therefore, the conclusion would appear to be that any data breach during the time of OpenSSL vulnerability would be reportable...more

EU – International data transfers from processors to processors made easier, good news for cloud providers and outsourcers

Working Party 29 issued a working document on model clauses for personal data transfers from EU data processors to non-EU sub-processors. This is an important step towards creating a more comprehensive framework for...more

Court Rejects Wyndham’s Challenge to FTC’s Data-Security Enforcement Authority

In June 2012, the Federal Trade Commission (FTC) filed suit under Section 5 of the FTC Act (Section 5) against the Wyndham hotel chain (Wyndham) following a security breach that led to the theft of payment card data for...more

Court Sides with FTC on Sweeping Data Security Role

Executive Summary: Federal Trade Commission v. Wyndham Worldwide Corp. A U.S. District Court has ruled this week that the Federal Trade Commission (FTC) has authority under Section 5 of the FTC Act to bring enforcement...more

CNIL Expanded Investigative Powers

The new French Act on consumer protection enacted on March 18, 2014 broadens the investigative powers of the CNIL (the French Data Protection Authority) by enabling its members and empowered agents to carry out online...more

M&A Technology Due Diligence Update 2014

Technology Risks Have Changed: Know What To Look For - The perfect storm created by the intersection of (on the one hand) the dramatic increase in the business use of cloud computing, open source software, prolific...more

SEC Hosts Roundtable on Cybersecurity Issues and Challenges

Participants recognize the importance of board oversight and risk disclosures. On March 26, the U.S. Securities and Exchange Commission (SEC) hosted a roundtable to discuss cybersecurity and the issues and challenges...more

SEC Roundtable Discusses Cybersecurity Threats and Protections Against Cyberattacks

On March 26, the Securities and Exchange Commission hosted a roundtable discussion on various cybersecurity topics. Participants at the roundtable included representatives from the federal government, self-regulatory...more

You're Not Immune: Hackers Target Health Care Providers Of All Shapes & Sizes

For health care providers, exposure to cyberattacks is becoming a stark reality. Findings in a recently released Health Care Cyberthreat Report by cybersecurity leaders confirmed the health care industry's vulnerabilities for...more

HHS's New Security Risk Tool for HIPAA Compliance

On March 28, 2014, the HHS Office of the National Coordinator for Health Information Technology (ONC), in conjunction with the HHS Office for Civil Rights (OCR), released a Security Risk Assessment tool (SRA tool) to assist...more

SEC Holds Cybersecurity Roundtable

On Wednesday, March 26, 2014, the Securities and Exchange Commission conducted a roundtable discussion on cybersecurity and the issues and challenges cyber-threats present for public companies, exchanges, and market...more

Corporate and Financial Weekly Digest - Volume IX, Issue 13

In this issue: - SEC Roundtable Discusses Cybersecurity Threats and Protections Against Cyberattacks - Proposed Changes to FINRA Classification of Hybrid Securities for Trade Reporting Purposes - FINRA...more

Windows XP Use May Violate HIPAA Starting April 8, 2014

If you use Windows XP on April 8, you will be easily susceptible to cyber-attacks and violations of the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”)....more

408 Results
|
View per page
Page: of 17