Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.
Cybersecurity Lobbying Booming: How Law Firms Can Profit
Safeguards against Data Security Breaches (Part One)
How to Protect Your Company From Hackers
Christopher Garcia on Cyber Security
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
At Intersection of Cloud Storage/Transfer & Instant Messaging, Instacom’s a Unique Tool
“The Cloud” No Longer a Hot Topic Because It’s Common Knowledge at This Point
How to Respond to President Obama's Cybersecurity Executive Order
Where Does the Cybersecurity Executive Order Hit and Miss the Mark?
Glenn Ware on Threat Management
Law Firms Need to Be Aware of Data Security Blind Spots—Stuart McClure
Corporate Law Report: Managing Cyber Risks, BYOD, Obama's NLRB Crisis, Iran Sanctions, and More
Corporate Law Report: Cybersecurity, CEO Social Media, New Workplace Laws, Healthcare Reform in 2013
Top 3 Concerns in Data Security
Christopher Garcia on Cyber Threats
Stewart Baker, Former GC of NSA, on Why the Cybersecurity Act Failed & Threat of Tomorrow’s Terrorism
Cybersecurity and Data Privacy: Big Data and the Law
Vague Definitions in CISPA Raise Concerns of SOPA 2.0
Following up on clues earlier this year that the SEC may increase its scrutiny of cybersecurity disclosures, SEC Chairman Mary Jo White has asked the Commission to evaluate current guidance for cybersecurity disclosures and...more
There’s been a lot of news lately about the Chinese military allegedly launching cyber attacks to steal U.S. trade secrets. This has gotten people riled up, including the President of the United States, who issued a 5-point...more
Many small and medium business owners are overwhelmed by the social media choices available to them, and unsure of which might best fit their target clients and markets. Twitter, being a relative new kid on the block, can be...more
In a recent panel discussion, one of the speakers was a so-called "ethical hacker" - a hacker-turned-protector of employers' confidential information. As someone at the forefront of cyberattacks, the ethical hacker's opinion...more
March 8 (Bloomberg Law) -- With reports of corporate espionage and hacking on the rise, the US government and private companies need to take steps to prevent
the loss of trade secrets and threats to national security says...more
If you are the CEO of Google, Facebook, Verizon, Comcast, Exxon or Boeing, don’t read this. You have a team of lawyers working for you who have already spent hours analyzing President Obama’s Cybersecurity executive order...more
The Obama Administration issued a Report earlier this month, entitled "Administration Strategy on Mitigating the Theft of U.S. Trade Secrets," that sets forth its efforts to prevent trade secret misappropriation. The Report...more
Every day the headlines report another Fortune 500 company suffering a hacking incident. For companies, the hack itself creates substantial risks of economic devastation caused by the theft of valuable trade secrets. Add to...more
News broke this week about significant cybersecurity breaches at many U.S. corporations that raises the possibility of a new wave of SEC enforcement actions, class actions, and derivative lawsuits. A front page New York Times...more
The White House warned yesterday that hackers and “hacktivist” groups have the intent and capability to target U.S. companies and steal confidential data. A new executive strategy explains that the threat of corporate...more
President Obama’s February 12 State of the Union address included the announcement of an executive order intended to permit greater sharing of information about possible threats to the nation’s cyber security among private...more
On January 24, 2013, the UK Data Protection Watchdog — the UK Information Commissioner's Office (ICO) — fined Sony Computer Entertainment Europe Limited £250,000 (about $400,000) for its alleged failure to implement...more
Today’s cars are computers on wheels, open to hackers who can infect cars with malware and take control of a car’s speed, braking, and other vital systems. Whether today’s laws are applicable to these cyber-threats was the...more
On December 21, the OCC issued Alert 2012-16, which provides a general description of recent distributed denial of service (DDoS) attacks directed at national banks and federal savings associations, along with risk mitigation...more
As our reliance on technology grows, companies face increasing risk of exposure to cyber breaches. The following outlines some of the risks your business faces and explains why you should implement strategies to manage your...more
This Wall Street Journal Article features Bernstein Shur Attorney Dan Mitchell.
Banks typically are responsible for losses when personal accounts are hacked. But commercial clients that fall victim to cyber theft have...more
This BDN Maine article features Bernstein Shur Attorney Dan Mitchell.
SANFORD, Maine — A recent court ruling involving a Sanford construction company and its bank could have nationwide implications as attorneys and...more
Whether referred to as electronic medical records, electronic health records, or electronic patient records, there is no doubting the tremendous potential benefits that the digitization of medical data holds for the health...more
As the New York Times reports, Barnes & Noble disclosed this week that it learned over one month ago – on September 14 – that hackers broke into point of sale PIN pad devices at 63 Barnes & Noble stores around the country and...more
Originally published in Privacy & Security Law Report, 11 PVLR 1430, 09/24/2012.
Companies, organizations, and individuals throughout the world reap significant benefits of having access to the internet. Since the 1990s,...more
AntiSec – the hacker group that is the “merger” of Anonymous and Lulzsec – claims to have obtained the unique device identifiers (UDIDs) from 12 million Apple iPhone and iPad users by breaching an FBI computer, and have...more
Medical-data blackmail is becoming more common as more health care providers adopt electronic health records systems and store patient data digitally. This Bloomberg technology blog story describes some of the larger...more
JD Supra gets your content noticed, increases your visibility and makes your marketing efforts hassle free...
Learn More or Schedule a demo