Cybersecurity Data Security

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

When “Shhh” turns to “Oh $%*#!” – No Pseudonyms for Ashley Madison Plaintiffs

Nothing good has come from the Ashley Madison hacking incident, except hopefully some well-deserved apologies to loved ones. Now the E.D. Mo. Court hearing the In Re Ashley Madison Customer Security Breach Litigation, MDL No....more

Fourth Circuit Upholds Coverage Under CGL Policy for Data Breach Claims

The United States Court of Appeals for the Fourth Circuit (“Fourth Circuit”) recently concluded that an insurer had a duty to defend a health care company that was sued by individuals whose personal health information was...more

Survey says… New trends from corporate in-house counsel

Recently, Kroll and Kroll Ontrack surveyed over 170 corporate in-house counsel to share their perspectives on modern legal challenges facing organizations. We asked about some of the most pressing issues – from big data and...more

Phishing and Spoofing Scams — A Few Tips to Protect Yourself and Your Business

The phone rings. The caller ID says it’s your attorney’s office. When you answer, you are told you owe your attorney additional money and are directed to call a toll-free number. When you call the number, you are told how...more

The Vendor Governance Wake-Up Call

The “Panama Papers” leak and other breaches at major law firms in the past year bear out the findings from the American Bar Association’s 2015 Legal Technology Survey Report. Earlier this month, 11.5 million documents were...more

Alert on Ransomware Attacks and Prevention

Imagine entering your office, sitting down with a cup of coffee, and going through the routine task of logging on to your computer to review your emails and schedule for the day. Except this time, there is a problem. A...more

Ransomware Cuts Deep, in Life & in Coverage

1. Beyond Breaches - With ransomware, cybersecurity in healthcare has gone far beyond HIPAA compliance, breaches of PHI or identity theft. For the unprepared healthcare provider not able to prevent ransomware or...more

Cybersecurity Claim Under CGL Policy Prevails Against Strong Insurance Industry Pushback, As Fourth Circuit Upholds Policyholder’s...

On April 11, 2016, the United States Court of Appeals for the Fourth Circuit made headlines by holding that a commercial general liability (“CGL”) policy covers the defense of a data breach-related class action lawsuit. In...more

Privacy Tip #30 – Protect yourself and your co-workers: please don’t sell your company credentials

I am on a lot of privacy and security list-serves and keep up with surveys relating to data privacy and security. I was most distressed this week to download SailPoint’s 2016 Market Pulse Survey. Not that it isn’t well...more

Cyber Attacks Continue to Grow and Evolve

Cyber criminals continue to prey on websites with unpatched vulnerabilities and ill-protected point of sale (POS) systems to steal credentials such as personal data, credit card numbers and bank account details. Common...more

Why and How Your Business Should Protect Sensitive Customer Data

With the battle over data privacy between Apple and the Department of Justice at the forefront of the news cycle, business owners across the country are likely asking themselves: what responsibilities do I have in protecting...more

They Can Be Heroes: The FCC Proposes Expansive and Detailed Privacy & Cybersecurity Regulations for Broadband ISP

On April 1, 2016, the FCC released a Notice of Proposed Rulemaking (“NPRM”) that would impose new regulatory burdens on broadband Internet service providers’ use of customer data. The wide-ranging NPRM also proposes rules...more

[Webinar] Is Your Organization Compromise Ready? - April 20th, 9:00 am PDT

Please join BakerHostetler’s Privacy and Data Protection team for a webinar to cover the results of the 2016 BakerHostetler Data Security Incident Response Report. Trends, top causes for a security breach, and steps you can...more

BakerHostetler Data Security Incident Response Report: Being “Compromise Ready” Better Positions Companies to Respond to Incidents...

On March 30, 2016, we released our second annual Data Security Incident Response Report. The report analyzes data from more than 300 incidents on which the firm advised in 2015. The report looks at causes of incidents,...more

State Data Security Breach Notification Laws - April 2016

The general definition of “personal information” used in the majority of statutes is: An individual’s first name or first initial and last name plus one or more of the following data elements: (i) Social Security number, (ii)...more

Privacy & Cybersecurity Update - March 2016

In this edition of our Privacy & Cybersecurity Update, we examine the FCC's proposed privacy rules for broadband providers; new developments relating to the Privacy Shield, which was created to replace the U.S.-EU Safe Harbor...more

Alert: The FCC Proposes New Internet Privacy and Data Security Rules

At its March 31, 2016 open meeting, the FCC adopted a notice seeking comment on privacy rules for Internet service providers (ISPs). The rules would govern how ISPs can collect and use information about their customers'...more

How to Draft an Effective Incident Response Plan

The best way to handle any emergency is to be prepared. When it comes to data breaches, incident response plans are the first step organizations take to prepare. Furthermore, many organizations are required to maintain one....more

NAIC Preliminary Draft Insurance Data Security Model Law Draws Praise and Criticism

Early this month, the NAIC Cybersecurity (EX) Task Force released a preliminary working and discussion draft of an Insurance Data Security Model Law. While praise worthy in its effort to provide uniformity for data security...more

House Subcommittee Examines the Role of Cyber Insurance

On March 22, the House Homeland Security Committee’s Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies held a hearing on The Role of Cyber Insurance in Risk Management. The witnesses were...more

HHS Announces Health Care Industry Cybersecurity Task Force

On March 16, 2016, via an online blog announcement, Department of Health & Human Services (“HHS”) Acting Deputy Secretary Mary Wakefield announced the formation of a Health Care Industry Cybersecurity Task Force (“Task...more

Feds Push for Better Cybersecurity

President Obama has long discussed the importance of improving governmental cybersecurity, but the issue gained significant traction last year after two massive breaches at the Office of Personnel Management (OPM). In...more

FDIC Issues Customer Cybersecurity Guidance

On March 8, 2016, the Federal Deposit Insurance Corporation (“FDIC”) released a special edition of its FDIC Consumer News publication series covering cybersecurity issues impacting banking customers (“Cybersecurity Release”)....more

Cybersecurity: What You Must Know and What You Must Do

On February 1, 2016, the Federal Deposit Insurance Corporation (“FDIC”) published the Winter 2015 issue of Supervisory Insights. Not surprisingly, the first article dealt with the most important issue facing the financial...more

Cybersecurity and Data Privacy: CFPB Takes Unprecedented Action Against Company (3/16)

A new regulatory authority has entered the field of data security: the relatively new Consumer Financial Protection Board (CFPB). On March 2, the CFPB announced that it had reached a consent order with an Iowa-based company...more

394 Results
|
View per page
Page: of 16
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×