News & Analysis as of

Data Protection Data Security

FTC Provides Guidance on Data Security in Its “Stick With Security” Blog

by McGuireWoods LLP on

Building on the FTC’s “Start with Security” guide for businesses, the agency launched the “Stick with Security” blog on July 21, 2017. The blog provides additional guidance on each of the 10 fundamental principles of data...more

Do You Need to Worry About a Data-Breach at ClearView Social?

by Adrian Dayton on

With the recent Equifax data-breach making headlines, we’d like to remind our users of ClearView Social’s data-storage policy and the minimal risk of a breach. When you connect your social media accounts to ClearView...more

Vendor Contracting for Privacy and Security

by Morris James LLP on

In an effort to continue to capture ongoing and new business, vendors may be opening themselves up to liability due to poorly drafted contracts with companies. In addition, in a rush by companies to have data shifted to the...more

Delaware Amends Personal Information Protection Law

by Moore & Van Allen PLLC on

On August 17, 2017, Delaware amended its personal information protection law, Delaware Code Title 6, Chapter 12B. The amendment becomes effective 240 days after enactment or March 14, 2018. The amended law significantly...more

Massachusetts Lawmakers Turn Attention to Cybersecurity

In the wake of growing concerns about data privacy and cyber threats, Massachusetts lawmakers are increasingly focused on evaluating and improving the state’s cybersecurity policies and information technology infrastructure....more

Delaware Updates Data Breach Notification Obligations

by Morgan Lewis on

On August 17, 2017, Delaware Governor John Carney signed into law an act to amend Title 6 of the Delaware Code relating to breaches of security involving personal information. The amended law and the new obligations it...more

Harvey And Irma – Reminders To Adopt/Reevaluate Your Disaster Recovery Plan

by Jackson Lewis P.C. on

The effects of hurricanes like Harvey and the approaching Irma should be a reminder to all businesses of the importance of disaster recovery planning. When a storm approaches, a business’s first concern is how to protect its...more

Data Security Law: Managing The Legal Risks Of Cloud And Collaboration Tools

by Ellis & Winters LLP on

As anyone with a Dropbox or Google Drive account knows, consumer-grade cloud storage and collaboration services are a convenient way to store and share personal photos, music, video and documents. Employees who use these...more

Recent Enforcement Developments and Trends Regarding China's Cybersecurity Law

by Faegre Baker Daniels on

Since the Cybersecurity Law of China took effect three months ago, various peripheral regulations have been published by the Cyberspace Administration of China (CAC) and other related agencies. These regulations have...more

High Security: How to Minimize Marijuana Data Risks

As we’ve blogged in the past, the cannabis industry is particularly susceptible to cyberattacks. With threats like a federal crackdown and workplace drug testing, customers have a vested interest in keeping their information...more

Passwords Remain Important for Data Security, FTC Reminds Businesses

For the most recent installment in the Federal Trade Commission’s “Stick with Security” series, the agency’s blog post focused on passwords....more

Delaware Updates its Data Breach Notification Law

Forty-eight states have enacted data breach notification laws, and they frequently are amended and updated. The most recent state to update its law is Delaware. ...more

NIST Updates Its Security and Privacy Guidance

by Reed Smith on

Earlier this month, the National Institute of Standards and Technology (“NIST”) issued its fifth and latest draft of its “Security and Privacy Controls for Information Systems and Organizations” guidance document. The NIST...more

OCIE Releases Results of Cybersecurity Examination Initiative

On August 7, 2017, the Office of Compliance Inspections and Examinations (OCIE) of the U.S. Securities and Exchange Commission (SEC) released a summary of its observations (the report) from cybersecurity examinations of 75...more

Maryland and Delaware to Roll Out Changes to Data Breach Laws in 2018

by Baker Donelson on

States continue to amend their Data Protection and Breach Notification Requirements. Maryland and Delaware are the most recent states to pass legislation designed to bring additional precision to an organization's...more

Cambios en la Transferencia de Datos Personales a Otros Países

by Holland & Knight LLP on

Mediante la Circular Externa 005 del 10 de agosto de 2017, la Superintendencia de Industria y Comercio (“SIC”) se pronunció acerca de los países que en opinión de esta entidad ofrecen un nivel adecuado de protección para...more

Changes in Transfer of Personal Data to Other Countries

by Holland & Knight LLP on

By means of External Circular Letter No. 005 of August 10, 2017, the Superintendence of Industry and Commerce (SIC) issued a pronouncement with regard to the countries that in opinion of this entity offer an adequate level of...more

Delaware Amends Data Breach Notification Law to Require Reasonable Data Security and Expand the Scope of Personal Information...

by Reed Smith on

On August 17, 2017, Delaware Governor John Carney signed into law House Substitute 1 for House Bill 180, making the first significant amendment to Delaware’s data breach notification law since 2005. The bill, scheduled to go...more

Worth Another Look: Fending Off Cyberattacks

In January of 2017, the National Conference of State Legislatures (NCSL) published a list of the top 10 issues that will be before state legislatures across the nation this year. While we’re just over a quarter of the way...more

Delaware Revamps Its State Data Breach Notification Statute

by BakerHostetler on

On Aug. 17, 2017, Delaware revamped its existing data breach notification statute. In doing so, Delaware became the second state (joining Connecticut) to mandate offering individuals affected by a breach of security involving...more

Los Angeles Launches America’s First City-Based Cyber Lab

by King & Spalding on

Los Angeles Mayor Eric Garcetti announced on August 15 an unprecedented initiative to launch the “LA Cyber Lab”—a public-private partnership that will freely share cyber threat intelligence with businesses in the city. Due to...more

FTC Continues Series With Collection, Retention Safety Tips

For the Federal Trade Commission’s second blog post in its “Stick with Security” series, the agency discussed how to maintain a focus on security, regardless of the size of a business or the type of data it handles....more

A Year in Review: FTC Data Privacy Actions and its Impacts on 2017 and Beyond

Whether it means taking a prominent role shaping data security for the Internet of Things, or addressing high profile breaches, the FTC has adopted an active position in policing data privacy and security. And, as data...more

Hackers Surveyed On Their Favorite Ways To Access Your Data

by Fox Rothschild LLP on

Cybercrooks’ preferred path to critical data is through privileged accounts, those held by users who have broad access and powers within the target’s network. That’s according to a recent survey conducted by the...more

SEC Cybersecurity Risk Alert Emphasizes Proactive Compliance and Ongoing Vigilance

by BakerHostetler on

On August 7, 2017, the Securities and Exchange Commission (SEC) released its latest cybersecurity risk alert, detailing findings from the examination of 75 broker-dealers, investment advisers and investment companies carried...more

556 Results
|
View per page
Page: of 23
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.