News & Analysis as of

GPEN Publishes Privacy Sweep Results

On 10 September 2014, the Global Privacy Enforcement Network (GPEN) published the results of its privacy enforcement survey or “sweep” carried out earlier in 2014 with respect to popular mobile apps. The results of the sweep...more

“LoProCo”, 12,915 Complaints, and Other Lessons from OCR/NIST

12,915 complaints were reported in 2013 to the Department of Health and Human Services Office of Civil Rights (“OCR”) according to Illiana L. Peters, Senior Adviser for HIPAA Compliance and Enforcement. Cozen O’Connor...more

FFIEC Announces Cybersecurity Preparedness Efforts

The Federal Financial Institutions Examination Council (FFIEC) recently announced a series of initiatives aimed at promoting cybersecurity preparedness for community financial institutions throughout the country....more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

The Human Element of Information Security, Continued - In Part One of this series, I laid out data breach statistics that were at best startling, and at worst downright terrifying. Thankfully, a large percentage of the...more

Internet of Things reviewed by data protection regulators

The growth of the Internet of Things brought the attention of the European data protection regulators that through the European data protection advisory body, the Article 29 Working Party, issued an opinion on the Internet of...more

Bipartisan LEADS Act Aims to Protect Data Stored Abroad

On September 18, 2014, Senators Orrin Hatch, Dean Heller and Chris Coons introduced "The Law Enforcement Access to Data Stored Abroad Act" (LEADS), a bill that would amend provisions in the Electronic Communications Privacy...more

So You Think You Have a Point of Sale Terminal Problem?

If your company has a Point of Sale (POS) terminal anywhere in its infrastructure, you are no doubt aware from the active media coverage that malware attacks have been plaguing POS systems across the country....more

Redaction: Protecting Your Private Digital Data

In today’s digital age, no person’s private information is considered off limits by hackers. Recently, several celebrities, including Jennifer Lawrence and Kate Upton, had their iCloud storage accounts hacked and their...more

QATAR: Promulgating the Cybercrime Prevention Law

On 15 September 2014, Qatar’s Emir approved Law No. 14 of 2014, The Cybercrime Prevention Law (“Cybercrime Law”). Although it has not yet been published in Qatar’s Official Gazette, the text of the law was published in the...more

Back -to- School 2014

In mid-August Jewel-Osco announced that its computers, containing credit and debit card information, had suffered an “unlawful intrusion”. They are but the latest retailer to do so with the list that now includes CVS, Home...more

Information Security Training Master Class: Winning the Battle Against Data Breaches, Malicious and Negligent Employees, and...

Disclaimer: I am a crazy person. I read over 50 articles before I wrote this (WHO DOES THAT) and I’m not even sure how I got so sucked in. In short, information security is a big deal right now – and there are tons of ways to...more

Credit Unions Continue to Demand New Data Security Standards for Retailers and Right to Recover Losses After a Breach

On September 3, 2014, following the news of a possible breach at Home Depot (which was confirmed on September 8), the National Association of Federal Credit Unions (NAFCU) called on Congress to enact new legislation to hold...more

Cybersecurity Litigation Monthly Newsletter

As we discussed in July, Tiversa, a “cyber-intelligence” company, notified the FTC in 2009 that a file containing the personal information of about 9,300 LabMD patients was available on a peer-to-peer file sharing network....more

To Speak Or Not To Speak About A Data Breach

I recently posted about some companies making the decision to not announce when a data security breach has occurred, or at least they would think twice before announcing. According a couple crisis communication experts, that...more

Privacy Top Five: Issues And Concerns In The First Six Months Of The Apps

That is, on receiving the personal information from a third party, you must contact each individual whose personal information you have now “collected” and notify them of the mandatory matters specified in the APPs, if such...more

5 Ways to Protect your Business from a Cyber Attack

Global cyber-attack threats stand at the highest ever recorded level, jumping 14 percent from 2012 to 2013 (Cisco 2014 Annual Security Report). Furthermore, a recent Microsoft Security Intelligence Report found that operating...more

Cyber, Data-Security Liability Claims: Coverage Under Traditional Lines of Insurance

Recent, large-scale data breaches at several well-known companies underscore the substantial risk that businesses now face with respect to cyber, data-security liability. In this year alone, numerous companies – including...more

Cybersecurity Concerns Underpin Continued Push In The Regulatory And Legal Arenas

While Congress continues its aggressive push on cybersecurity legislation, regulatory oversight and legal efforts continue across the spectrum of industries effectively filling the gap in addressing now every day concerns...more

The Congress Ramps Up Action On Cybersecurity Legislation - Possibilities For Data Protection/Breach Legislation Still Exist

While not a day goes by without a new cybersecurity attack, the recent news of the Russian criminal gang who is alleged to have stolen over 1 billion user names and passwords as well as 500 million email addresses reinforces...more

Major Barrier to E-Commerce in Middle East and North Africa is Fear about Data Security

In a recent article published by Law 360, Proskauer litigation associate Courtney Bowman outlines how companies can make inroads in the e-commerce market in the Middle East and North Africa (MENA). Although often overlooked,...more

PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY [Video]

Rarely does a day pass without new news of a data breach of some company around the world. It has impacted virtually every industry from hospitality to retail. What should companies do to avoid being the next target of...more

Cloud Hacking Incidents May Prompt Congress and the Administration to Turn Attention Again to Mobile Privacy Issues

With the recent theft and release of several celebrities’ private photographs (many of which appear to have been taken with, and stored on, mobile devices), mobile privacy and the protection of sensitive data stored or...more

Privacy & Cybersecurity Update - August 2014

In This Issue: - NIST Announces October Workshop and Releases Framewok Update - Insurance Company Succeeds in Cybersecurity Litigation - Safe Harbor Under Attack — This Time From a US Group -...more

Learning from Target: Insurance Coverage for Data Breaches

Cyber liability is a clear and present danger. Target Corp. recently reported at least $235 million as gross expenses related to its 2013 data breach. Fortunately, Target was able to recover $90 million of that loss under...more

Massive Online Security Breach – Are You Reactive or Proactive?

A few weeks ago, a Russian cyber gang amassed around 1.2 billion user name and password credentials belonging to more than 500 million email addresses. This may be to date the largest cache of stolen data. The cyber gang...more

591 Results
|
View per page
Page: of 24