Cybersecurity Social Media

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

[Event] Nonprofits in the Digital Age - October 18th, Seattle, WA

Please join us for a complimentary seminar focused on the critical legal issues facing nonprofits as they increasingly engage supporters, raise funds, and create change online and through digital technology....more

Your daily dose of financial news - The Brief – 9.26.16

The Deal Professor weighs in on Yahoo’s announcement last week of the hack of roughly 500 million of its customers’ data and the specter of the MAC (material adverse change) that Verizon may choose to invoke to dance away...more

Are Your Social Media Fans Cybersecurity Savvy?

Today’s online world is all about engaging and staying connected with others via social media. For businesses, establishing a presence on various social media platforms is an enticing way to connect with current customers as...more

Social Links: Implications of Facebook’s algorithm change; branded emoji; free travel apps

The Internet is abuzz over the Facebook algorithm change. Here are the implications for marketers and publishers and for regular users. U.S. Customs wants to start collecting the social media accounts for foreign...more

Employment Law Navigator – Week in Review: June 2016 #3

Last week, cybersecurity was a big issue. Fortune reported that the average cost of a data breach is $4 million, and Inc. explained that even mom-and-pop shops can be victims of a hack. HR Examiner framed the discussion a...more

Cybersecurity News and Notes – June 2016

In Case You Missed It: US and EU officials signed on to the so-called “Privacy Umbrella” deal last week. The agreement is designed to protect the personal data of EU citizens when it is transferred to the US for law...more

Employment Law Navigator – Week in Review: June 2016

Last week, Kris Dunn of Fist Full of Talent offered some sage advice about sexual harassment training. He recommended using real world examples and creating debate about what is and isn’t sexual harassment. This advice was...more

Social Media’s Expanding Distribution of Internet Advertising Impacts Privacy and Security

Last week, social media giant Facebook announced an expansion of its online advertising business to include serving ads to users who are not members of Facebook. Under a press posting titled “Bringing People Better Ads,”...more

Our List of Lists

January is the month when lists—lists of predictions, lists of trends, lists of feats and lists of failures—pervade social media newsfeeds and publications’ headlines. Here at Socially Aware we’re making an annual tradition...more

Employment Law Navigator – Week in Review: November 24, 2015

Last week, the EEOC released its Fiscal Year 2015 Report, in which it describes 12 months of positive results. According to the report, monetary relief obtained for individuals was up, and the number of systemic charges of...more

A Compilation of Enforcement and Non-Enforcement Actions

Non-Enforcement - SEC Decides Against Mounting an Appeal in Koch Ruling - The July 2015 ruling by the D.C. Circuit Court in Koch v. SEC will apparently not be challenged by the SEC. The Court ruled in that...more

Coordinated Hackers Infiltrate 200 Targeted Employees’ LinkedIn Networks

Cybersecurity researchers at the Dell SecureWorks Counter Threat Unit (“Dell CTU”) uncovered a network of approximately 25 fake LinkedIn profiles that Dell CTU believes were used by an Iran-linked hacker group to establish at...more

Financial Services Quarterly Report - Third Quarter 2015: Developing and Maintaining a Modern U.S. Compliance Program

When the SEC adopted Rules 38a-1 under the Investment Company Act of 1940 (Investment Company Act) and 206(4)-7 under the Investment Advisers Act of 1940 (Advisers Act) in 2003 – which required registered funds and registered...more

Advertising Law - October 2015

Commercials Pulled After Endorser Admits 9/11 Lies - The revelation that an endorser lied about his whereabouts on September 11 led a national sports-themed restaurant chain to stop airing commercials where the actor...more

That is SO last week - October 2015

Last week saw a lot of media coverage about “Yelp for People.” The app, called Peeple, allows users to rate friends, co-workers, and romantic partners based on a five-star rating system. Recruiters could review the ratings...more

Advisory Committee on Small and Emerging Companies Makes Three Written Recommendations to SEC

It was a productive morning at the last meeting of its current term for the SEC Advisory Committee on Small and Emerging Companies. The Committee, which has been renewed for two more years, approved three recommendations to...more

Corporate Journalism: A catalyst for better story telling

I am continuously amused by all the hubbub around content marketing. Because while that phrase may be new, the truth is that marketing has always been about content. What’s changed, of course, is the delivery, as the digital...more

Cheaters, Divorce & Social Media

Files Leaked – Cheating Spouses Exposed - Target, Staples, and Home Depot customer’s credit card information was hacked into this past year. Recently the website that caters to spouses seeking to be unfaithful to their...more

Ashley Madison and Coming to “Terms” with Data Protection

A recent massive data hack of an online dating site Ashley Madison once again proves that what one publishes, says, or does online, even in seemingly private forums, is never completely private. It’s also a reminder that the...more

That is SO last week - July 2015 #4

Last week, the Equality Act was introduced in Congress. If enacted, this historic legislation will prohibit discrimination in employment and other life activities on the basis of sexual orientation and gender identity. It’s...more

That is SO last week - July 2015 #3

There’s just no rest for employment lawyers this summer. We had another exciting week. The biggest news was the EEOC’s ruling that Title VII prohibits discrimination on the basis of sexual orientation. The agency found that...more

Twitter Terrorism: Criminals Choose the Hack Attack

In what appears to be yet another brazen demonstration of capability following an earlier hijack of government social media sites, a group calling itself the Syrian Electronic Army (SEA) recently hacked into the U.S. Army’s...more

Internet Of Things, News Websites Fare Poorly In Security And Privacy Review

On June 16, the Online Trust Alliance, an industry group focused on developing and encouraging best practices in online security and privacy, announced that a recent audit of approximately 1,000 websites showed that 46%...more

And The Survey Says . . . GCs Need More Cybersecurity And Social Media Training

Becoming better versed in issues surrounding cybersecurity and social media risk would greatly benefit general counsel at publicly traded companies, according to a recent survey of executive leadership....more

Popular Reads on JD Supra: Cybersecurity, H-1B Visas, Social Media in Hiring, and More

To H-1B or not to H-1B, that was the big question this past month on JD Supra, but certainly not the only question on the minds of our readers. ...more

54 Results
|
View per page
Page: of 3
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×