News & Analysis as of

Cybersecurity Data Security

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -

The Data Report Episode 12: Malicious Tools

by Bilzin Sumberg on

Module Four: When It All Goes Wrong The fourth module of The Data Report discusses the nature of data breaches, who might be responsible, what typically happens, what should happen, and what you can do to prepare for a...more

Hackers Surveyed On Their Favorite Ways To Access Your Data

by Fox Rothschild LLP on

Cybercrooks’ preferred path to critical data is through privileged accounts, those held by users who have broad access and powers within the target’s network. That’s according to a recent survey conducted by the...more

SEC Cybersecurity Risk Alert Emphasizes Proactive Compliance and Ongoing Vigilance

by BakerHostetler on

On August 7, 2017, the Securities and Exchange Commission (SEC) released its latest cybersecurity risk alert, detailing findings from the examination of 75 broker-dealers, investment advisers and investment companies carried...more

SEC Watch: “Observations” from SEC’s Cybersecurity 2 Initiative

Last week, the U.S. Securities and Exchange Commission’s (“SEC”) Office of Compliance Inspections and Examinations (“OCIE”) released its “Observations from Cybersecurity Examinations” conducted pursuant to OCIE’s...more

The FTC and Industry Propose Best Practices for IoT Security Updates

by Hogan Lovells on

How do you ensure that an Internet-connected sensor or device—often inexpensive and designed for lifespans of up to 20 years or more—can be secured against not only the intrusions of today but also those of the future? This...more

Governors of 38 States Join a Cybersecurity Compact

by Wilson Elser on

On July 16, 2016, the chair of the National Governors Association (NGA), Governor Terry McAuliffe (D-VA), unveiled his 2016-2017 initiative, Meet the Threat: States Confront the Cyber Challenge. Over the past year, the...more

New Mexico’s Data Breach Law

by Snell & Wilmer on

Almost all U.S states have laws about data security and what to do when there’s a data breach. New Mexico recently added such a law for its state. Here is what’s in the New Mexico law....more

NAIC Cybersecurity Working Group Votes to Approve Insurance Data Security Model Law

by Carlton Fields on

The National Association of Insurance Commissioners (NAIC) Cybersecurity (EX) Working Group (Cybersecurity WG) approved Version 6 (Finalized) of its Insurance Data Security Model Law (Model) on August 7 at the NAIC Summer...more

Patching Up Your Information Security Review

by Morgan Lewis on

In light of recent significant ransomware cyberattacks such as the one that originated in Ukraine and quickly spread to affect hundreds of thousands of computers in more than 150 countries, we wanted to provide a few pointers...more

CPR Appoints New Cyber Panel Ahead of Anticipated Increase in Data Security Disputes

by Hogan Lovells on

The International Institute for Conflict Prevention and Resolution, a New York-based organisation offering Alternative Dispute Resolution (ADR) services, has recently announced the launch of a new specialised panel of...more

FTC Blog Posts Offer Security Guidance

In an effort to provide insight into the Federal Trade Commission’s data security principles, the agency pledged to each week share a new blog post with lessons for businesses....more

Connecticut Insurance Department Issues Bulletin on Data Security Requirements

We previously outlined the requirements of the Connecticut data breach law when it was amended in 2015, including the requirement to implement a comprehensive information security program (CISP)....more

New Connecticut Insurance Department Bulletin on Data Security Requirements

by Polsinelli on

Connecticut Bulletin MC-23. The Connecticut Insurance Department issued Bulletin MC-23 on June 13, 2017. The Bulletin addresses certification and notice requirements for data security requirements applicable to TPAs and PBMs...more

SEC Increases Focus on Cyber Incident Response

by Reed Smith on

In the past few years, we have seen an uptick in agencies beginning to focus on the cybersecurity readiness and response of organizations subject to their jurisdiction. The U.S. Securities and Exchange Commission (SEC),...more

DoD's Efforts to Secure Information on Contractor Systems Continues, But All Companies Are at Risk and Should Take Steps Now to...

by Bass, Berry & Sims PLC on

As recent malware, ransomware and distributed denial of service attacks have made clear, the cyber threats posed to governments and commercial entities are real and growing. Critical infrastructure such as power plants,...more

FTC Updates Data Security Guidance for Businesses

by Alston & Bird on

In June, the Federal Trade Commission released a new guide for businesses on implementing sound data security protections and procedures. In “Protecting Personal Information: A Guide For Business,” the FTC offers “10...more

FDA Establishes Electronic Privacy, Security, and Reliability Criteria for Clinical Trial Records

by Jones Day on

In March 1997, the Food and Drug Administration ("FDA") published a final rule, codified in 21 CFR Part 11 ("Part 11"), establishing the privacy, security, and reliability criteria for electronic records and electronic...more

If You SEC Something, Say Something

Just about every survey of General Counsels reveals the same #1 culprit of sleepless nights….. a cybersecurity hack. If you run a business in today’s global environment, it is hard to escape the fundamental reality that it is...more

The Data Report Episode 3: Legal Consequences of a Data Breach

by Bilzin Sumberg on

Litigation attorney Jay Ward discusses the negative monetary impact a data breach can have on both a business and the market as a whole in this episode of The Data Report. He highlights the importance of keeping up to date on...more

General Data Protection Regulation

by Revision Legal on

Ever since people have started putting information on social media, in the protection of companies, or on their own protected online server, there have been groups of people who attempt to hack this information and use it...more

China’s New Cybersecurity Law Is a Start

by Dorsey & Whitney LLP on

On June 1, China’s new Cybersecurity law took effect. The new law applies not only to domestic Chinese companies but has wide-ranging implications for U.S. and other foreign companies doing business in China....more

The Data Report Episode 1: Information Is Currency

by Bilzin Sumberg on

Safeguarding, managing, controlling, and understanding your information is both valuable and vital. Litigation attorney Jay Ward begins building the foundation for understanding more complicated aspects of information...more

Better KM in an Age of Need-to-Know Security

by Prosperoware on

Double-edged Sword: Protect & Deliver - 2016 was a banner year for cyber incidents as records breaches increased by 556% with more than four billion records leaked. The regulatory and client response has been...more

New Mexico’s Data Breach Notification Is in Effect: What You Need to Know

by Perkins Coie on

New Mexico became the 48th state to enact data breach notification legislation with the Data Breach Notification Act, signed in April and effective as of June 16, 2017. Following a round of revisions that removed some of its...more

An Ounce Of Data Breach Prevention…Address Attorney-Client Privilege In Your Breach Planning

by Jackson Lewis P.C. on

Data breach “horror” stories have become a new staple in today’s business environment. The frequency of attacks which threaten (or compromise) the security of business networks and information systems continually increases —...more

700 Results
|
View per page
Page: of 28
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.