Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

A New Cyber World Framework to Strengthen Agency Information Security

Manufacturers, defense suppliers and other federal contractors may benefit from a new cybersecurity law intended to safeguard agency information and help bolster defenses to future cyber threats. The Federal Information...more

Cyber Law Tracker: Protecting Cyber Networks Act Introduced by House Intelligence Committee

On March 24, 2015, members of the House Permanent Select Committee on Intelligence, including Connecticut Congressman Jim Himes, the Ranking Member of the Cybersecurity Subcommittee, issued statements commenting on the...more

FISMA II: A New Cyber World Framework to Strengthen Agency Information Security

As part of the Obama administration’s legislative efforts to safeguard government agency information, the Federal Information Security Modernization Act of 2014 (FISMA II) was recently enacted to fortify and update its 2002...more

The $10 Million Target Settlement

In the past two years, there have been a number of lawsuits filed against major corporations as a result of data breaches, including the class action filed against Target following the data breach it suffered in late 2013. ...more

EUROPE: EU-US data flows at risk? European Court of Justice today heard Facebook case.

Yesterday, the Schrems v. Irish Data Protection Commission case was brought before the Court of Justice of the European Union (‘CJEU’) for an oral hearing, following referral by the Irish High Court. While the final ruling by...more

Alert: Cybersecurity Risk Management for Communications Companies

An industry-led committee advising the Federal Communications Commission ("FCC") on cybersecurity released its final report on best risk management practices tailored to each of five main industry segments—broadcasting,...more

Cyberspy thriller with an unclear ending

It reads more like a spy thriller than a news story. Employees of the U.S. subsidiary of a global technology and media company log on to their computers one Monday morning and are greeted with the menacing figure of a neon...more

New Tools for Companies Against Cybercrime

Obama administration proposal would reduce legal ambiguities and allow civil RICO claims. On January 2015, the Obama administration announced a series of proposals to strength­en the country’s response to...more

FFIEC Provides Overview of Cybersecurity Priorities

On March 17, the FFIEC released a summary of its cybersecurity priorities for the remainder of 2015. The FFIEC intends to enhance its cybersecurity preparedness in seven main ways: (i) issuing a cybersecurity self-assessment...more

FINRA Issues Report on Cybersecurity Practices

Following up on our post from last week on the SEC’s cybersecurity exam sweep, you should also know about FINRA’s recent report on this area. Last month, FINRA published a Report on Cybersecurity Practices that really could...more

FCC Communications Security, Reliability, and Interoperability Council Working Group Issues Final Report on Cybersecurity Best...

A Federal Communications Commission (FCC) working group, Cybersecurity Risk Management and Best Practices Working Group 4 (WG4), of the Communications, Security, Reliability, and Interoperability Council (CSRIC) advisory...more

When is Data Security “Unfair”?

Data security is big news. And so is the Federal Trade Commission (“FTC”). Put the two together in a crucible of litigation, and it is sure to be a blockbuster. That is what the closely-watched case FTC v. Wyndham, now...more

Large Retailer Agrees to Pay $10 Million Related to Data Breach Incident

On March 19, a district court granted preliminary approval in which a large retailer agreed to pay $10 million to settle a class-action action suit related to a 2013 data breach, which resulted in the compromise of at least...more

Corporate & Financial Weekly Digest - Volume X, Issue 11

In This Issue: - Delaware Proposal Banning Fee-Shifting and Permitting Exclusive Forum Provisions - SEC Charges Insiders for Failure to Update Schedule 13D Disclosures - CBOE Proposes Amendments to...more

California Eyes Groundbreaking Privacy and Cybersecurity Legislation

In California, home to Silicon Valley, Biotech Beach, drones and some of the nation’s strongest laws protecting personal and consumer privacy, legislators are grappling with how to balance popular innovations in technology...more

OCR’s Enforcement of HIPAA’s Privacy and Security Rules Continues with Robust 2014

With the news of the recent cyber-attack and resulting data breach at health insurance giant Anthem Inc., the buzz around data security and privacy is again high. The Anthem breach serves as a reminder to those entities...more

Too Small to be Hacked?

We are not the size of Target or Home Depot, we won’t be a target of cyber-attack. This is a dangerous assumption. Recently reported in the news was that ISIL (a terrorist organization) had hacked and taken over certain...more

Five Minutes With … National Security and Cybercrime Professor Ahmed Ghappour

This marks the inaugural “Five Minutes With” feature that Trade Secrets Watch will run occasionally.  These will be question-and-answers with notable figures in the trade secrets world. TSW got a chance to sit down with UC...more

Cybersecurity: Mitigating the Legal Risks of On-Line Banking With Business Customers

On-line or electronic banking (“e-banking”) offers many well-known advantages to financial institutions engaged in banking and to their business customers. A significant risk of on-line bank accounts for both financial...more

Update on State Attorneys General: Connecticut Creates a Permanent Privacy Department; NAAG Covers Big Data, Cybersecurity, and...

The federal government may be pushing a cybersecurity and data privacy agenda, but that doesn’t mean that the states are taking a back seat. The state attorneys general are maintaining their focus on issues relating to...more

The Auto Industry: The Next "Big" Target for Hackers?

Given the exponential rise in security breaches and hacking activity in past few years and the almost constant headlines in the press of yet another major security breach, information security should be a front burner issue...more

Communications Industry Advisory Committee to FCC Issues Major Cybersecurity Report

Wednesday the advisory committee charged by the Federal Communications Commission (FCC) with providing critical assistance to the communications industry with a sector-specific implementation of cybersecurity risk management...more

NAIC Amps Up Cybersecurity Oversight

The NAIC has begun its efforts to amp up state insurance department oversight of cybersecurity practices with the release of two documents for public comment. The first, entitled Principles for Effective Cybersecurity...more

Scope of FTC’s Authority to Enforce Cybersecurity is Questioned

authoOn March 3, the Third Circuit heard oral argument in FTC v. Wyndham, a case that is being closely followed by the privacy and data security community. Wyndham is challenging the Federal Trade Commission’s (“FTC”)...more

Federal and State Governments Respond to Recent Data Breaches and Propose New Cybersecurity Laws

Over the past few months, major retailers and Internet content providers, like Target and Sony, have been victims of massive cyber-attacks resulting in the release of customer credit card data, private corporate e-mails, and...more

1,611 Results
|
View per page
Page: of 65