News & Analysis as of

Data Protection

The EC New Alert Mechanism to Detect Cartels: A Teaser Before a European General Framework for Whistleblowing

Whistleblowing has been part of the U.S. legal tradition, if not since the resolution passed by the Continental Congress in 1778, at least since the adoption of the 1863 False Claims Act. With regard to the disclosure of...more

Target Reaches $18.5 Million Dollar Settlement in Data Breach with States

It seems as though we have been writing about this case for a lifetime. Target Corporation’s data breach saga came one step closer to a conclusion this week. On Tuesday, Target reached an $18.5 million settlement with 47...more

Great Employee or Insider Threat?

by Seyfarth Shaw LLP on

As a special feature of our blog—special guest postings by experts, clients, and other professionals—please enjoy this blog entry from Charlie Platt, a director at iDiscovery Solutions and a Certified Ethical Hacker. He...more

Deeper Dive: Security Is a Big Deal for Big Data

by BakerHostetler on

In the rapidly expanding landscape of Internet-based data analytic services, companies across all industries with a significant online presence have faced or will face a data breach resulting from their collection and use of...more

Ransomware Attack Hits Dallas Senior Living Community

No industry is immune from ransomware attacks—including senior living communities. Senior living communities have exploded now that baby boomers are selling homes, down-sizing and getting ready for that stage of life....more

Fallout from Target’s 2013 Data Breach includes an $18 Million Multistate AG Settlement

by Kelley Drye & Warren LLP on

Target Corporation agreed to an $18.5 million settlement with 46 State Attorneys General and the Attorney General of the District of Columbia this week, resolving allegations that the company failed to provide reasonable data...more

China's Cybersecurity Law and Draft Implementation Rules

by Morgan Lewis on

The law applies to all “network operators” and introduces cybersecurity mechanisms. On November 7, 2016, the Chinese government released a draft version of the Cybersecurity Law (CSL) that will govern China’s cyberspace...more

China's revised draft data localisation measures

by Hogan Lovells on

On 19 May 2017, the Cyberspace Administration of China (the “CAC“) released a revised draft of its Security Assessment for Personal Information and Important Data Transmitted Outside of the People’s Republic of China Measures...more

Actions You Can Take to Protect Your Systems and Data from a Cyber Attack

by Miles & Stockbridge P.C. on

As a follow up to our cyber security alert from last week, preparing to protect against an event like the recent “WannaCry” global ransomware attack can include a range of IT, business operations and legal steps....more

Still No Clarity on Data Protection on Websites: EU ePrivacy Regulation Will Not Come Into Force by May 2018

by Reed Smith on

The Council of the European Union (“Council”) has predicted that the ePrivacy Regulation will not come into force by 25 May 2018. The ePrivacy Directive (Directive 2002/58/EC) will, therefore, continue to apply. The...more

Colorado Division of Securities Publishes Final Cybersecurity Rules

by Ballard Spahr LLP on

The Colorado Division of Securities (Division) has published final cybersecurity rules applicable to broker-dealers and investment advisers. The Colorado Attorney General's office has 20 days to write an opinion on the rules,...more

Weapons in the Cyber Defense Arsenal

by Wilson Elser on

In May 2017, the world experienced an unprecedented global cyberattack that targeted the public and private sectors, including an auto factory in France, dozens of hospitals and health care facilities in the United Kingdom,...more

Facebook Sentenced to a €110 Million Fine at the Intersection of Competition Law and Data Protection Law

by McGuireWoods LLP on

On May 18, 2017, the EU Commission sentenced Facebook to a “proportionate and deterrent” fine of €110 million for providing misleading information during the investigation of Facebook’s acquisition of WhatsApp. This decision...more

Potential HIPAA Pitfalls for Developers of Healthcare Apps

by Perkins Coie on

As federal and state governments struggle to address future healthcare regulation, demand for healthcare that is cheaper, better and faster continues to surge. Every day, new healthcare apps are being developed to respond...more

When “WannaCry” Strikes: Preparing for and Responding to the Largest Ransomware Attack in History

As many around the world were preparing for the Mother’s Day weekend, the WannaCry ransomware attack hit over 70,000 organizations in nearly 100 countries in just one day, Friday, May 12th. After the weekend, the attack had...more

Helping To Protect Your Company From A Cyber-Attack: Eight Tips For Human Resources Professionals And In-House Employment Counsel

by Littler on

Recent, highly publicized data security incidents highlight the continued vulnerability of corporate information systems. Notably, employees who fall prey to sophisticated phishing e-mails and other scams often contribute to...more

Cross-border Data Flows: FAQs Released for Swiss-U.S. Privacy Shield

by Reed Smith on

For organisations with data flows between the United States and Switzerland, it is now possible to self-certify into the Swiss-U.S. Privacy Shield Framework. This process became available on 12 April 2017. The Swiss-U.S....more

[Webinar] Consumer protection enforcement is #trending: How to avoid FTC and state investigations, and what to do when you get the...

by Hogan Lovells on

Join us for a discussion of hot topics in Federal Trade Commission (FTC) and state consumer protection enforcement. Partners Bret Cohen, Meghan Rissmiller, and Steven Steinborn will cover recent developments and enforcement...more

Take-Aways from WannaCry

We have read multiple reports on WannaCry and if you are reading this and don’t know what WannaCry is, Google it for the background story. The clear message is this is not the last major attack we will see, and future attacks...more

Smart Buildings - not all just bricks and mortar

by DLA Piper on

Imagine a day where any part of a building can report its own state of health, when a machine can tell you if its feeling unwell and 'needs a service', when you can track and prevent, before it happens, a water or gas leakage...more

#MLWashingtonCyberWatch: The Cybersecurity Executive Order (at last)

Amid the flurry following former FBI Director James Comey’s firing last week, President Trump marked his 111th day in office on Thursday, May 11th by signing an executive order targeting national cybersecurity....more

Cybersecurity, A-Z: C is for CFAA

The Computer Fraud and Abuse Act, or CFAA, is the federal “anti-hacking” statute (or sometimes referred to as a “computer trespass” statute). In essence, the CFAA prohibits intentional unauthorized access into another...more

Cyber Insurance: A Necessary Shield Against Digital Infiltration

The threat of a cyber-attack is hardly virtual. From covertly installing malware that holds a victim company’s data hostage, to soliciting confidential information via email under the false pretense that they are privy to...more

White House Issues New Cybersecurity Executive Order

by Ballard Spahr LLP on

President Trump recently signed the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. The Order sets forth the Trump Administration's policy for cybersecurity of...more

HHS OCR Resumes HIPAA Enforcement Action Announcements: Four New Settlements and Penalties Totaling More than $5 million in a One...

by Arnall Golden Gregory LLP on

After a pause of nearly two months, the Department of Health and Human Services Office of Civil Rights (HHS OCR) has resumed its announcement of settlements for alleged HIPAA violations, with four new settlement agreements...more

3,295 Results
|
View per page
Page: of 132
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!