News & Analysis as of

Data Protection

Unusual IoT Hacking Shows Creativity of Hackers

Everything connected to the Internet is hackable and at risk. But there are some things connected to the Internet that you just don’t think of as risks to an organization. That is, until now. Darktrace has issued its report...more

Draft Regulation Expands Critical Information Infrastructure Definition and Requirements

by Faegre Baker Daniels on

Another draft rule, “Regulation on the Security Protection of Critical Information Infrastructure” (Draft Regulation), was released for public comments on July 10, 2017, by the Cyberspace Administration of China (CAC). The...more

Retailers: Review Those Checkout Practices – Again

If you are a retailer with locations in New Jersey, you will need to review your procedures in anticipation of a new law effective October 1, 2017....more

Does GDPR Apply to You?

The EU’s General Data Protection Regulation goes into effect on May 25, 2018. GDPR replaces the EU Data Protection Directive. GDPR can apply to US-based businesses even if they do not have offices or employees in the EU. It...more

Ashley Madison Data Breach Results in $11.2 Million Settlement

by Fisher Phillips on

On Friday, July 21, users of the “married dating” website, ashleymadison.com, received preliminary approval of an $11.2 million class action settlement. This settlement seeks to resolve a number of consolidated lawsuits...more

The Top Eight Things You Should Be Doing to Protect Your Business from Cyber Threats

by Burr & Forman on

Cyber threats take many forms. The wide-spread WannaCry ransomware attack in May of 2017 highlighted how computer files could be held hostage in return for payment, while the Dyn denial of service in October of 2016...more

The Chinese Government Issued Draft Cybersecurity Regulations to Protect Critical Information Infrastructure

by Davis Wright Tremaine LLP on

On June 10, 2017, the Cyberspace Administration of China (the “CAC”) released the Draft Regulations on the Security Protection of Critical Information Infrastructure. The CAC is seeking public comments with a deadline of...more

Washington’s New Biometric Privacy Law: What Businesses Need to Know

by Davis Wright Tremaine LLP on

With the rise in hackings and data breaches, companies and government agencies are looking for ways to protect their data that offer more security than passwords. Because passwords are easily lost, stolen, guessed, and...more

Article 29 Working Party Releases Detailed Opinion on Data Processing in the Workplace

by Reed Smith on

The Article 29 Working Party (“WP29”) recently published an opinion on data processing at work (“Opinion”). The Opinion restates the position and conclusions in WP29’s 2001 Opinion on processing personal data in the...more

Ten Tips For Actions By A Covered Entity After A HIPAA Breach By A Business Associate

by Fox Rothschild LLP on

This blog recently discussed tips for a covered entity (CE) in dealing with a HIPAA business associate (BA). Now, even though you have adopted all of the tips and more, in this dangerous and ever more complex data security...more

Nevada Enacts Online Privacy Policy Law; Illinois ‘Right to Know’ Bill Dies

by BakerHostetler on

Effective July 1, 2017, Nevada joined California as the second state to require operators of websites and online services to post a public notice regarding their privacy practices. Like California’s law, the new Nevada...more

Privacy Tip #97 – Send Your Kid to Cyber Camp This Summer

I have lamented repeatedly that we have a dearth of cyber talent in the U.S. to meet the needs of employers. Many of our clients recruit talent from other countries in order to meet their cyber needs. The need continues to...more

COPPA Guidance Released to Help Businesses Keep Pace With Evolving Internet

by BakerHostetler on

The Children’s Online Privacy Protection Act (COPPA), enacted in 1998, created guidelines limiting the collection of personal information from children online. But 1998 was eons ago in Internet time; the online landscape has...more

SEC Chairman Clayton Talks Cyber Threats And Responses

by King & Spalding on

On July 12, 2017, U.S. Securities and Exchange Commission Chairman Jay Clayton made his first public speech as head of the Commission, emphasizing the need for coordination between companies and regulators to thwart cyber...more

New Guidance Issued by EU Data Protection Regulators – Does Your Organization Use Social Media During Recruitment?

by McGuireWoods LLP on

The Article 29 Data Protection Working Party (comprising representatives from the data protection regulators in each EU Member State, the European Data Protection Supervisor and the European Commission) has issued an opinion...more

Cyber Law Tracker: New Connecticut Cybersecurity Strategy

by Pullman & Comley, LLC on

As its next step in the creation and implementation of a cybersecurity plan, the State of Connecticut has created a Cybersecurity Strategy document. This strategy specifically highlights the roles and vulnerabilities of state...more

National Association of Corporate Directors Updates Cyber-Risk Oversight Handbook

by Hogan Lovells on

Earlier this year, the National Association of Corporate Directors (NACD) released an updated version of its Director’s Handbook on Cyber-Risk Oversight (Handbook). The updates add 16 pages of content to the previously...more

GDPR Update: Rights of the data subjects (Dutch)

by Dentons on

Monthly update AVGB: Rights of the parties involved: (erasure, limitation, objection and automated decision making) Introduction - Following our previous updates regarding the rights of those involved, we treat the...more

GDPR Update: Rights of the data subjects (erasure, restriction, object and automated individual decision-making)

by Dentons on

Following up on our previous updates with respect to the rights of the data subjects, in this seventh newsletter we discuss the remaining rights of the data subjects: erasure, restriction, object and automated individual...more

Data Protection Laws Could Increase After Jio Data Break

Reliance Jio, an Indian telecom upstart, compromised the personal data of over 100 million customers. This has prompted a call for increased data protection laws in India. At present, companies in India do not have to...more

The Impact of the General Data Protection Regulation on Responses to Data Breaches Involving EU Personal Data

by McDermott Will & Emery on

The forthcoming General Data Protection Regulation will expand the legal obligations of companies that process EU personal data when they suffer a data breach. Every company faces the risk of a data breach that might trigger...more

The Protection of Biometric Information

by Saul Ewing LLP on

As states develop new laws directed at the security of biometric identifiers, such as fingerprints and retina scans, institutions of higher education are likely to face a host of new compliance requirements and increased...more

Hurricane Cyber? Insurers Confront Unpredictable Data Breach Costs

by Fox Rothschild LLP on

Venerable insurer Lloyd’s of London says a global cyber attack on a major provider of cloud services could carry costs of up to $53 billion, reports Data Breach Today. That’s a hefty price tag that explains the rising...more

Defending Novel Theories In Data-Breach Litigation

by Ellis & Winters LLP on

The success of a data-breach lawsuit often turns on whether the plaintiff has standing to sue. Showing actual injury can be especially hard when the only alleged damage consists of a risk of future identity theft....more

NYDFS Updates FAQs to Clarify Cybersecurity Regulations

by Ballard Spahr LLP on

The New York Department of Financial Services (NYDFS) recently updated frequently asked questions (FAQs) about its cybersecurity regulations, 23 NYCRR 500, to address four new issues. NYDFS published its initial set of FAQs...more

3,463 Results
|
View per page
Page: of 139
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.