News & Analysis as of

Cybertheft

Enlisting Government Help to Protect Your Trade Secrets

by Seyfarth Shaw LLP on

“I’m from the government and I’m here to help.” Yeah, right. Most businesses think protecting their intellectual property is their own responsibility, and it is. But what about when your intellectual property rights are...more

Cybersecurity 2017: The Year in Preview

by Foley Hoag LLP on

Introduction - Cybersecurity was a prominent factor in 2016 in all aspects of government, business and personal affairs. Russian and other foreign national hacking has the potential to spark a new form of cold...more

Intellectual Property Law - December 2016

Design Patents—Supreme Court Decides Samsung v. Apple - Why it matters: On December 6, 2016, the Supreme Court decided Samsung v. Apple, holding that, for purposes of a "total profits" damages award for infringement of a...more

SWIFT CEO announces customer security programme

Following a series of thefts from international banks utilizing the Society for World Interbank Financial Telecommunication (SWIFT) communication system, the Chief Executive Officer of SWIFT announced a sweeping five part...more

Trade & Manufacturing - October 2015

by King & Spalding on

Ending the Crude Oil Export Ban - On September 17, the House Energy and Commerce Committee passed a bill to end the 40-year-old ban on the export of domestic crude oil. The Committee vote was passed by a Republican...more

Trans-Pacific Partnership Agreement Features Key Developments in Intellectual Property and Information Technology

by King & Spalding on

On October 5, the 12 Trans-Pacific Partnership (“TPP”) countries announced that they had resolved all remaining issues and reached a final agreement on the long-anticipated regional free-trade agreement. As King & Spalding...more

Strike Suit Offers Conjectures, And Little More, About Scottrade Data Breach

As reported on Friday in the Krebs on Security blog, online broker Scottrade had sent an e-mail to customers earlier that day stating that it recently had learned from law enforcement officials that Scottrade was one of a...more

U.S., China Announce Cybersecurity Agreement During Xi Jiping’s Visit

by King & Spalding on

Chinese President Xi Jinping made his first state visit to the United States last week, and his itinerary included meetings with U.S. technology company leaders as well as President Barack Obama. Not surprisingly, his hosts...more

Project CAMERASHY Details Cyberespionage By China’s Military

by King & Spalding on

In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more

Keep Your Frenemies Close: Proposed China Sanctions and the Price of Escalation

On August 30, 2015, the Washington Post broke a story that the Obama administration is developing a package of economic sanctions that will target Chinese companies and individuals who have benefitted from cybertheft. The new...more

China Promulgates Tougher Criminal Provisions Governing Data Privacy

by Morrison & Foerster LLP on

One of the more dramatic privacy law developments in China in 2014 was the August criminal conviction of foreign nationals Peter Humphrey and Yu Yingzeng for their violation of Article 253 of the Criminal Law (??) associated...more

Privacy Monday – July 2015

Welcome to the dog days of summer 2015. Three privacy & security bits and bytes to start your week (if you are reading this on vacation … good for you!) 1. ICYMI: Massive Data Breach at OPM Claims Victim — The Director...more

New York Regulator Finds Substantial Cyber Vulnerabilities in Banking System

by Davis Wright Tremaine LLP on

Earlier this month, Benjamin Lawsky, Superintendent of Financial Services for the New York State Department of Financial Services (NYDFS), released a report finding “significant potential” vulnerabilities for cyber theft of...more

Guard Your Sheep, The Dyre Wolf is Coming

by Butler Snow LLP on

IBM announced this week that it had uncovered a highly-sophisticated scheme to steal funds from medium to large U.S.-based companies. The scheme dubbed “The Dyre Wolf” only targets companies, unlike past schemes which also...more

Cyber Security: Forewarned is Fair-Warned

by Gray Reed & McGraw on

When Wei Wong, owner of Sushi Mushi, a popular Japanese food bistro in Texas, installed a phone add-on to take credit and debit card payments straight from his employees’ phones, his revenues skyrocketed. Yesterday the Feds...more

FINRA Issues Investor Alert Concerning Bitcoin Trading and Speculation

Bitcoin remains fixed on the front pages of the business and technology news for both the salacious and the positive. Much attention has been paid to the collapse of the former top bitcoin exchange, Mt. Gox, stemming from the...more

Target and Neiman Marcus Face Government Probes and Litigation as a Result of Holiday-season Cyberattacks

by King & Spalding on

The massive holiday hacking of consumer information belonging to Target and Neiman Marcus customers has the impacted retailers under a microscope. State Attorneys General across the country have banded together to launch a...more

Hackers' Withdrawal Of Funds Not Covered Under Property "All Risks" Policy

by Carlton Fields on

In Metro Brokers, Inc. v. Transportation Insurance Company, Inc. Civil Action no. 1:12-cv-3010-ODE, (2013), the United States District Court for the Northern District of Georgia applied Georgia contract law to find no...more

Dermatology Practice Agrees to Settlement in Connection with HIPAA Breach

by Tucker Arensberg, P.C. on

A Massachusetts-based dermatology practice recently agreed to pay $150,000 to settle claims that it failed to have sufficient policies and procedures in place to address a breach notification requirement under the HITECH Act....more

Accretive Health Data Breach Leads To Twenty-Year Settlement With The FTC

On December 31, 2013, the Federal Trade Commission ("FTC") announced that Accretive Health, Inc., ("Accretive") agreed to settle charges that the company's inadequate data security measures exposed sensitive consumer...more

The Number of The Day: 70 Million (at least)

The Target data breach story keeps getting worse. The December pre-Christmas disclosure was the theft of up to 40 million Target shoppers’ credit and debit card information in what appeared to have been a hack of the Target...more

Act Now Advisory: Court's Ruling That Employees Have No Blanket Entitlement to Take Employer's Confidential Documents for...

by Epstein Becker & Green on

In a case that may have a broad impact, the New Jersey Appellate Division issued a decision on December 24, 2013, upholding criminal charges against a former school board clerk who took hundreds of confidential documents for...more

On the 11th Day of Privacy, class counsel served on me……

. . . a data breach class action. Hackers and plaintiffs’ lawyers could combine to make 2014 the year when class actions concerning theft of sensitive information proliferate. On this 11th Day of Privacy, we look...more

CIS Legal Update - September 2013: Russia Joins the Fight Against Online Piracy

by Dechert LLP on

In response to mounting global pressure to implement effective legislation to curb Russia’s rampant online piracy, the President of Russia on July 2, 2013 signed Federal Law No. 187-FZ “On Amendments to Certain Legislative...more

UPDATE: Sur-Sur-Sur Reply Highlights The Short Arm Of U.S. Law In Trade Secret Theft

A few months ago, we discussed the federal government’s difficulties prosecuting foreign companies and individuals for theft of U.S. trade secrets. We highlighted three cases in which foreign defendants effectively stalled...more

39 Results
|
View per page
Page: of 2
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.