News & Analysis as of

Data Protection Best Management Practices

Felicello Law PC

You Bargained for Confidential Arbitration but Your Adversary Sues in Public Court—Now What?

Felicello Law PC on

From secret formulas to priceless client lists, sensitive information is critical to the continued success of businesses large and small. In business dealings, trade secrets and competitive information are sometimes exchanged...more

Payne & Fears

Don’t Let Technology Run Away With Your Customer Information

Payne & Fears on

For many companies, customer information ranks among its most important assets. Yet these days, employees often keep this sensitive customer information in electronic locations that are not readily accessible to or controlled...more

Bennett Jones LLP

Top 10 Tips for Cybersecurity Employee Training

Bennett Jones LLP on

Any system is only as strong as its weakest link. If your employees aren’t up to date on their cybersecurity hygiene, then it doesn’t matter how much money you spend on technological defences—there’s a gap in your protection....more

Robinson+Cole Data Privacy + Security Insider

Survey Shows Employees Top Security Risk for Companies

A recent survey conducted by Arlington Research for OneLogin in May 2016 of 1,022 respondents found what most of us already know: employees continue to be a high risk for employers when it comes to security risk. The...more

Ervin Cohen & Jessup LLP

The Top 10 Priorities For Your Information Governance Program

The title, of course, begs the question: does your business even have an Information Governance Program? If not, you should get one—quick. An integrated Information Governance Program is considered a “best practice” to...more

Fisher Phillips

Top Ten Things to Do When an Employee Resigns to Join a Competitor

Fisher Phillips on

When an employee resigns to join a competitor, it is important to respond promptly. Odds are that the employee has been orchestrating his or her departure for weeks or months. The security of your trade secrets and/or...more

BakerHostetler

The BakerHostetler Data Security Incident Response Report 2015

BakerHostetler on

The rate of disclosures of security incidents in 2015 continues at a pace that caused many to call 2013 and then 2014 “the year of the breach.” Most incidents are described publicly with attention-grabbing terms such as...more

Foley & Lardner LLP

Tips for Protecting Your Data

Foley & Lardner LLP on

With the global economic cost of cybercrime totaling more than $400 billion per year and breaches affecting companies ranging from retailers (e.g. Target, Walmart and Staples) and restaurants (Dairy Queen and Jimmy John’s) to...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

Ten New Year’s Resolutions Retail Employers Should Consider Making in 2015

Now that the busy 2014 holiday shopping season is over and the new year has begun, it’s a good time for retail employers to take a breath and think about 2015—what’s coming, what issues they should be watching, and what...more

Mintz - Privacy & Cybersecurity Viewpoints

Privacy Monday – January 12, 2015

Three privacy/security stories that you should know as you start your week: President Obama to Offer Cybersecurity/Privacy Previews to State of the Union Proposals - In a series of speeches this week, President...more

BakerHostetler

Protecting A Family’s Most Valuable Asset – Privacy

BakerHostetler on

Each day, family offices receive, relay, and manage a family’s private information. Depending on the family and the role of the family office, the information managed can be voluminous and include financial information, tax...more

Obermayer Rebmann Maxwell & Hippel LLP

Top Five Resolutions for Covered Entities and Business Associates in 2015

The New Year is here. It is time to make those 2015 resolutions, and not just those for getting fit and healthy. Resolve now to improve your organization’s compliance with the Health Insurance Portability and Accountability...more

Davis Wright Tremaine LLP

California Attorney General Releases Breach Report with Key Findings and Recommendations for Retailers, Financial Institutions and...

California Attorney General Kamala D. Harris has released a “California Data Breach Report,” which presents a series of findings and recommendations based on a review of breaches reported to the Attorney General’s office in...more

Foley Hoag LLP - Security, Privacy and the...

Data Breach Prevention and Response: Avoiding Potential Pitfalls and Implementing Best Practices to Protect Your Company

In This Presentation: - Overview of data breach landscape - Data breach response ..Technical best practices ..Legal best practices - Data breach prevention ..Technical best practices ..Legal best...more

Robins Kaplan LLP

Protecting Trade Secrets During Business Collaboration

Robins Kaplan LLP on

Businesses are increasingly working together to develop new products and services. With that collaboration is the risk that precious trade secrets will be lost. Attorney Christopher Larus sits down with Seth Northrop to...more

Goodwin

How To Avoid Common Data Breach Pitfalls

Goodwin on

Cost of Data Breach in 2014: - $5.9 million U.S. average cost of a data breach - 15% Annual increase in the average cost of a data breach around the world - $201 Average cost paid for each exposed record ...more

Morrison & Foerster LLP

Employment Law Commentary -- Volume 26, Issue 7 July 2014 -- Building A Workforce Culture Of Data Security In The Post-Snowden Era

Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more

Gray Reed

Cyber Security: Forewarned is Fair-Warned

Gray Reed on

When Wei Wong, owner of Sushi Mushi, a popular Japanese food bistro in Texas, installed a phone add-on to take credit and debit card payments straight from his employees’ phones, his revenues skyrocketed. Yesterday the Feds...more

Robins Kaplan LLP

8 Best Practices to Help You Manage Risks Associated With Mobile “Big Data”

Robins Kaplan LLP on

The more than six billion mobile devices in use worldwide offer companies access to a possible treasure trove of customer information in almost every consumer segment. These devices now create a constant stream of data—from...more

Perkins Coie

Risk of Data Breaches Keeping You Up? Assess Data Security Before The Holiday Season

Perkins Coie on

Data security breaches marred the 2013 holiday season for many consumers and retailers. The most famous security breach, at Target Corporation (Target), involved the loss of information on 40 million payment cards and...more

Fisher Phillips

Blurring The Line Between Yours And Mine: Best Practices For Bring Your Own Device Policies

Fisher Phillips on

Let’s face it: bring-your-own-device (BYOD) situations are here to stay. With the ubiquity of employees having and using smartphones and tablets – devices that have more capacity and processing power than desktop computers...more

21 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide