News & Analysis as of

Data Breach Plans

Guidebook: Cybersecurity in the Pharma, Biotech, and Medical Devices Industries

by Foley & Lardner LLP on

As a life sciences or medical device company, it is mission critical to protect lab books, drug and clinical test data, product formulas and production processes that underlie your patents, trade secrets and know-how from...more

Identifying and Managing Corporate Risk from Internal and External Stressors

by Tucker Arensberg, P.C. on

I’ve been asked the same simple question time and time again by clients who are faced with litigation – How did this happen? Sometimes they are referring to a looming dispute over large accounts receivable, employee...more

What DFS Cybersecurity Regulation Portends for the Compliance Practitioner

by Thomas Fox on

The state of New York’s Department of Financial Services (DFS) issued the first state-level regulations on cybersecurity for financial institutions with its Cybersecurity Requirements for Financial Services Companies release,...more

New Mexico, One of the Last Holdouts, Sends Data Breach Notification Law to Governor

New Mexico is one of the few remaining states to not have a law requiring companies to notify consumers when their information is part of a data breach. This, however, might change very soon. Last Wednesday, the New Mexico...more

Sounding the Call for a Federal Data Breach Notification Law

by Robins Kaplan LLP on

For a retailer experiencing a data breach, the realization that the sensitive personal information of hundreds, thousands, or even millions of individuals has been compromised is the scenario every executive hopes to avoid....more

Friend or Foe? State Attorneys General Start to Change Their Tune on Industry & Cybersecurity

Should businesses be thought of as victims or bad actors when it comes to data breaches? State attorneys general are embracing the idea that businesses are not necessarily adversaries in the struggle to protect sensitive...more

Federal Agencies Given New Breach Response and Preparation Guidelines

by BakerHostetler on

The White House has made a step toward implementing in federal agencies some breach response best practices currently used in the private sector. On Jan. 3, the White House issued a memorandum (Memo) updating for the first...more

The White House’s Revisions to its Breach Response Policy For Federal Agencies and Departments Also Affect Contractors

by Jackson Lewis P.C. on

On January 3, 2017, the Obama Administration issued a memorandum to all executive departments and agencies setting for a comprehensive policy for handling breaches of personally identifiable information (the “Memorandum”),...more

May Old Memoranda Be Forgot: White House Issues New Memorandum on Breach Response Plan

by Kelley Drye & Warren LLP on

The White House Office of Management and Budget (“OMB”) marked the beginning of the 2017 Federal calendar year by issuing a memorandum to all agency and department heads with new guidance on breach preparation and response....more

5 Information Governance Predictions for 2017

Information is every organization’s greatest asset. It makes up intellectual property, trade secrets and many other vital corporate assets. It’s how we in corporate America conduct business. With that said, governing and...more

"Privacy & Cybersecurity Update - October 2016"

In this edition of our Privacy & Cybersecurity Update, we take a look at the FCC's new rules for broadband privacy, the FTC's new playbook for data breach response and notification, the NHTSA's voluntary guidance for...more

Data Breach Decision Points: Part 4

by Bryan Cave on

The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more

Industry Insight: Information Governance – Leverage Your Business Intelligence and Reduce Risk

by McGuireWoods LLP on

“The goal is to turn data into information, and information into insight.” – Carly Fiorina, former CEO, Hewlett-Packard Co. The most valuable asset of every organization is information. Organizing, analyzing and...more

Cybersecurity News & Notes – July 2016 #2

In Case You Missed It: The EU/US Privacy Shield is set to go into effect this Tuesday, July 13, pending a decision today by the EU’s College of Commissioners. On Friday, July 8, the Privacy Shield agreement (entered into in...more

Cyber Security Takes Centre Stage in UK Government’s Strategy

by Reed Smith on

The UK Department for Culture, Media and Sport recently released a statement on cyber security, in which it urged businesses to take better care to protect against cyber criminals. This statement follows publication of its...more

Employment Law Reporter - May 2016

by Ervin Cohen & Jessup LLP on

The Age of The Data Breach : The Top 5 Best Practices - What will you do? We live in The Information Age. Increasingly, business success depends on the ability to obtain, maintain and intelligently utilize increasing...more

How to Draft an Effective Data Breach Incident Response Plan

by Bryan Cave on

The best way to handle any emergency is to be prepared. When it comes to data breaches, incident response plans are the first step organizations take to prepare. Furthermore, many organizations are required to maintain one....more

Recommendations for Evaluating Your Organization’s Use of Social Media

by Bryan Cave on

The majority of organizations utilize social media to market their products and services, interact with consumers, and manage their brand identity. Many mobile applications and websites even permit users to sign-in with their...more

Most Frequently Hacked Industries Now Includes Manufacturing

by Foley & Lardner LLP on

Second only to health care, the manufacturing industry is now one of the most frequently hacked industries (according to IBM’s 2016 Cyber Security Intelligence Index). And more importantly, automotive manufacturing was the...more

Tennessee Amends Its Data Breach Notification Laws

by Butler Snow LLP on

Removes the Encryption Safe Harbor, Limits the Timing of Notice, and Expands “Unauthorized Persons” - Effective July 1, 2016, Tennessee becomes the first state to remove the encryption safe harbor from its data breach...more

Privacy Shield – Rejected. GDPR – Accepted: What This Means to Your Organization and What You Should Consider Doing Now

by Foley & Lardner LLP on

The European Union Article 29 Working Party (Article 29) issued an opinion on the proposed EU-U.S. Privacy Shield framework agreement (Privacy Shield) last week, stating that although the Privacy Shield was a “great step...more

Preparing Your Organization Today to Win Its Future (Possibly Inevitable) Cyber Lawsuit: Making Crown Jewels Out of Paper

One day in the not too distant future, your organization may be fighting to protect its balance sheet against high-stakes claims in a cyber tort trial. Arrayed against you will be the best of the class action plaintiff’s...more

How to Draft an Effective Incident Response Plan

by Bryan Cave on

The best way to handle any emergency is to be prepared. When it comes to data breaches, incident response plans are the first step organizations take to prepare. Furthermore, many organizations are required to maintain one....more

Q&A with Matt Field on Cyber Liability Insurance

by Sullivan & Worcester on

In January, we hosted an event with the Northeast Chapter of the Association of Corporate Counsel (ACC) on cyber security. Matt Field, an a cyber insurance expert, participated on the panel, and we are thrilled to offer you a...more

CFTC Intermediaries to Adopt and Implement Cybersecurity Programs by March 1, 2016

Commencing March 1, 2016, all commodity pool operators, commodity trading advisors, futures commission merchants, retail foreign exchange dealers, investment brokers, major swap participants and swap dealers that are National...more

81 Results
|
View per page
Page: of 4
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!