Cybersecurity Data Security

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Best in Law: Data Security and the Inside Job

If you are a business owner in the Inland Empire, what would you identify as the greatest threat to the security of your data? Is it hackers looking for credit-card numbers? Could it be foreign governments stealing industrial...more

The LabMD Case: Further Defining the FTC’s Enforcement Powers

The scaffolding of the FTC’s powers in the realm of cybersecurity continues to be built. On Monday, the FTC’s Chief Administrative Law Judge D. Michael Chappell issued an initial decision in the FTC’s closely watched...more

Cybersecurity and Data Privacy: Potential New Cybersecurity Regulations for Financial Institutions and Insurance Companies (11/15)

On the heels of recent high profile cyber-attacks against financial institutions and insurance companies, the New York State Department of Financial Services released a letter on November 9, 2015 that outlines proposed...more

Highlights from the FTC’s Second “Start With Security” Initiative

On November 5, the FTC hosted its second “Start With Security” event in Austin, Texas in an effort to provide companies with practical tips and strategies for implementing effective data security....more

FINRA’s Cancelled CARDS

A little over one year ago, the Financial Industry Regulatory Authority (FINRA) announced a proposal to increase substantially its collection of brokerage data. That proposal, named the Comprehensive Automated Risk Data...more

Expanding Cybersecurity Safeguarding Requirements, Reporting Obligations, and Cloud-Based Security: A Brief Guide to Understanding...

The United States Department of Defense promulgated an “interim” rule, effective August 26, 2015, which placed imposing and costly burdens on all DoD contractors and subcontractors (including small businesses and commercial...more

NAIC Cybersecurity Task Force Adopts Cybersecurity Bill of Rights

On October 14, 2015, the National Association of Insurance Commissioners’ (NAIC) Cybersecurity Task Force adopted the Cybersecurity Bill of Rights, a document meant to inform consumers of the services they can expect from...more

Challenging FTC Regulation of Cyber-security After FTC v. Wyndham

The Third Circuit interlocutory decision in Federal Trade Commission v. Wyndham Worldwide Corporation was widely reported as a big win for the Federal Trade Commission (“FTC”). But on closer examination, it was a split...more

Advanced Cyber Security Center Panel Explores Reasonableness in Cybersecurity

I had the pleasure of moderating an excellent panel at the Advanced Cyber Security Center’s annual conference on November 4. The panel’s topic for discussion was “What is Reasonable in Cybersecurity: Responsibility and...more

Recent Government Cyber Alert and Draft Guide for Financial Institutions: Lessons for All Organizations

All organizations, including financial institutions, continue to face significant security threats across their wide ranging IT systems. Such organizations are particularly vulnerable if they cannot track networked devices...more

BoE publishes Court of Directors minutes

BoE has published the minutes from the meeting of its Court of Directors. The minutes focus on cyber resilience and the banking and markets reports recently carried out. ...more

Recent Amendments to Security Breach Notification Laws Further Complicate Breach Notification for Employers

It is not a matter of "if" but "when" an employer will be required to notify employees of a security breach.  Forty-seven states require employers to notify employees when defined categories of personal information, including...more

Preview of NAVEX Global’s 2015 Ethics and Compliance Virtual Conference

As 2015 draws to a close (where did the time go?), the 2016 planning season is in full swing. You likely already have an idea of initiatives you’ll want to tackle, but taking your ethics and compliance program to the next...more

NAIC Adopts Cybersecurity Bill of Rights

The National Association of Insurance Commissioners (“NAIC”) continued its efforts to advance cybersecurity in the insurance industry when it recently adopted the Cybersecurity Bill of Rights. The Cybersecurity Bill of Rights...more

Data Breach Planning in 10 Easy Steps: How to Think Like A Litigator

For the first Tuesday in November, we have 10 easy steps to make sure that your data breach incident response planning is viewed from that pesky point of view of a litigator....more

HIPAA and Text Messaging

Text messaging is pervasive. Doctors and other health care providers, covered entities, and business associates currently use (and embrace) the technology. Texting is easy, fast and efficient. It doesn’t require a laptop...more

Uber class action case hits roadblock

A California federal judge has ruled that a former Uber driver who is suing Uber in a proposed class action case was unable to show that he suffers an immediate threat of identity theft and dismissed the driver’s first...more

California Updates Data Security Laws

Why it matters - The first state to enact data breach notification legislation, California has now updated Civil Code Section 1798.82 with three new bills signed into law by Governor Jerry Brown. Specifically, Senate...more

NIST seeks comments on Privacy-Enhanced Identity Brokers project document

The National Cybersecurity Center of Excellence, in partnership with the National Strategy for Trusted Identities in Cyberspace National Program Office, have launched a project designed to embed privacy and security measures...more

Consumer Trust should be at the heart of the Digital Economy

A recent report summary produced by the Organisation for Economic Cooperation and Development (‘OECD’) highlighted that many countries are placing too much emphasis on developing their digital economies and are neglecting the...more

Senate passes Cybersecurity Information Sharing Act

After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015. The bill has been touted as being controversial and is opposed by...more

NIST seeks comments on Guide to Help Financial Sector Manage IT Assets

The National Cybersecurity Center of Excellence is seeking comments on a draft practice guide, entitled “IT Asset Management (Special Publication 1800-5a)” which is “designed to help the financial services industry monitor...more

CFTC Approves NFA Interpretive Notice on Information Systems Security Programs, Including Cybersecurity Guidance

The CFTC recently approved the National Futures Association’s interpretive notice (the “Cybersecurity Notice”) on the general requirements that members should implement for their information systems security programs...more

Data-Harvesting Zombie Hackers, Blood-Thirsty Auditors, and Other Reasons to be Scared on Halloween

This Halloween, the scariest monsters might not be in your closet or under your bed. They may be overseas, orchestrating intrusions into your electronic medical record. Or they may be lurking in your own workforce, carrying...more

Colleges and Universities Are Prime Cyberattack Targets: What’s Behind the Threat?

When it comes to cyberattack targets, many think of retailers and associated credit card transactions or customer information, or perhaps healthcare providers with their ever-increasing storage and transmission of electronic...more

344 Results
View per page
Page: of 14

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.