News & Analysis as of

Data Protection Cybersecurity

China Data Protection Enforcement Update – A Focus on Platform Content

by McDermott Will & Emery on

Following the first enforcement actions by local authorities in Shantou and Chongqing for violations of the new Network Security Law that came into effect this year, authorities in China have recently shown a clear initial...more

House of Lords Publishes Briefing on Data Protection Bill

by Reed Smith on

The House of Lords Library, which provides research and information services to Members of the House of Lords, has published a briefing on the Data Protection Bill (“Bill”) which sets out an overview of and reactions to the...more

GDPR Goes into Effect Next Year; Is Your Privacy Program Ready?

by Baker Donelson on

You and your company may be located in the United States, but if any of your employees or customers are citizens of European Union (EU) member states, the EU will soon have a say in the collection, processing, storage,...more

An English-Language Primer on Germany’s GDPR Implementation Statute: Part 4 of 5

by Alston & Bird on

Over the past year, the German government has been working on legislation to implement the EU’s General Data Protection Regulation (GDPR). On July 6, 2017, Germany did so by passing a statute titled the Data Protection...more

FTC’s “Stick With Security” #7: Apply Sound Security Practices When Developing New Products

by Snell & Wilmer on

On September 8, 2017, the FTC released its seventh “Stick with Security” principle, which offered guidance regarding how companies incorporate security by design to prevent or minimize threats in the following ways...more

FTC’s “Stick With Security” #6: Protect Remote Access To Your Network

by Snell & Wilmer on

On September 1, 2017, the FTC released its sixth “Stick with Security” principle, which highlighted the steps businesses can take to ensure that “outside entryways” into network systems are secure. Securing remote access to a...more

Cybersecurity 2018 – The Year in Preview: HIPAA Compliance

Like many things in Washington, the HIPAA landscape in 2018 will be shaped by the shifting priorities of President Trump’s new administration. Early signs point to less funding for the Office of Civil Rights (“OCR”) within...more

Data Privacy + Cybersecurity Insider - October 2017 #2

by Robinson & Cole LLP on

FBI Issues Flash Alert on Apache Struts Vulnerability - The Apache Struts vulnerability has been mentioned frequently in the media over the past month, as it is believed to have been involved in one of the largest and most...more

FTC Provides Guidance on Reasonable Data Security Practices (Part II of III)

by Patrick Law Group, LLC on

This is the second in a series of three articles on the FTC’s Stick with Security blog... Over the past 15 years, the Federal Trade Commission (FTC) has brought more than 60 cases against companies for unfair or deceptive...more

Happy Cybersecurity Awareness Month! Are you Safe?

by Snell & Wilmer on

Since it was first announced by Presidential Proclamation in 2013, we mark each October as National Cybersecurity Awareness Month. The Department of Homeland Security explains that, in 2017, designation is “designed to engage...more

EDPS Releases Recommendations on ePrivacy Regulation – Still a Long Way to Go

by Reed Smith on

We are only eight months away from the new EU data protection regime entering into force. In addition to the General Data Protection Regulation (“GDPR”), which includes the general data protection provisions, the ePrivacy...more

Significant WiFi vulnerability exposed

What is the problem? Belgian researchers have published information about a vulnerability in the most popular WiFi encryption protocol that makes monitoring of all communications possible, except those communications that...more

The Government Can Sue For A Privacy Or Data-Security Violation. What Are The Limits Of That Government Power?

by Ellis & Winters LLP on

Consumers and businesses aren’t the only sources of potential privacy and data-security litigation. Today’s post looks at another important source: the Federal Trade Commission and state consumer-protection regulators....more

FTC’s “Stick With Security” #4: Store Sensitive Information Securely & Protect It During Transmission

by Snell & Wilmer on

On August 18, 2017, the FTC released its fourth “Stick with Security” principle, which explained the importance of keeping confidential data only when needed, and securely storing the data when it must be kept. To that end,...more

Vermont AG Settles with SAManage for $264,000 for Delayed Breach Notification

The Vermont Attorney General (AG) recently announced that it has settled with SAManage USA, a business support services company, for failing to timely notify 660 Vermont residents that their names and Social Security numbers...more

Plaintiffs’ Lawyer Predicts $1 Billion Settlement in Data Breach Case – But Where’s the “Harm”?

by Orrick - Trust Anchor on

This week, a high profile plaintiffs’ firm (Edelson) stated that “if done right,” the data breach class actions against Equifax should yield more than $1 billion in cash going directly to more than 143 million consumers...more

Privacy Perils: Reality Check - Your Information is Not Secure

by Bass, Berry & Sims PLC on

As we all know, over the past few years there have been a host of data breaches by entities that most of us expected would safeguard that information. The latest loss of roughly 150 million Americans' personal information is...more

Cybersecurity Guidance on the Way for Small Businesses

by Reed Smith on

On October 11, 2017, the House passed a bill that would provide guidance to small business on how to deal with cybersecurity issues. This legislation passed on the heels of a similar Senate bill that passed just weeks before...more

FTC’s “Stick With Security” #2: Control Access to Data Sensibly

by Snell & Wilmer on

On August 4, 2017, the FTC released its second “Stick with Security” principle, which addressed the next step a company should take after it has identified confidential data in its possession and determined what information...more

Privacy Tip #109 – Cybersecurity Tips for Small (and all) Businesses

I travel around helping businesses, both large and small, work on assessing their cybersecurity risks and implement measures to protect data, reduce risk and comply with applicable state and federal laws. In doing so, it is...more

Getting to data nirvana: Mapping connected car data usage scenarios and creating a holistic data governance plan

by Hogan Lovells on

In this hoganlovells.com interview, partner Winston Maxwell discusses how Hogan Lovells helps connected car manufacturers to develop simplified frameworks that internal stakeholders can use to understand business and...more

Financial crime and investigations update for UK corporates

by Allen & Overy LLP on

The law and practice relating to financial crime and investigations is evolving fast. In the past 18 months we have seen two new Acts aimed at combatting financial crime (including the creation of two new corporate criminal...more

Delaware Strengthens Cybersecurity Law

by McGuireWoods LLP on

On August 17, 2017, Delaware became the latest state to strengthen its cybersecurity laws. Under the newly enacted House Substitute 1 for House Bill 180, businesses who suffer cybersecurity breaches will face far more...more

Cyber-insurance and Employee Data Breaches: Part 1

by Bryan Cave on

A large portion of the hundreds of data breaches and thousands of data security incidents that occur each year involve human resource related issues. This includes situations in which HR data was lost, employees were...more

SEC and States Are Upping Their Cyber Game, Are You Doing the Same?

September 2017 saw no respite from the relentless pace of cyber developments, not only from the perspective of rapidly evolving attacks, but also from the perspective of dynamic federal and state regulatory moves. In...more

1,709 Results
|
View per page
Page: of 69
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.