News & Analysis as of

Data Protection Data Security

SEC Chairman Clayton Talks Cyber Threats And Responses

by King & Spalding on

On July 12, 2017, U.S. Securities and Exchange Commission Chairman Jay Clayton made his first public speech as head of the Commission, emphasizing the need for coordination between companies and regulators to thwart cyber...more

Defending Novel Theories In Data-Breach Litigation

by Ellis & Winters LLP on

The success of a data-breach lawsuit often turns on whether the plaintiff has standing to sue. Showing actual injury can be especially hard when the only alleged damage consists of a risk of future identity theft....more

McNees Advocate Alert - July 2017

In February 2016, a computer hacker sent an e-mail infected with a “ransomware virus” to an employee of the town of Medfield, Massachusetts. When the e-mail was opened, the virus spread throughout the town’s computer network,...more

Living in the Clouds: Is Your Business Data at Risk Because of a Disgruntled Employee?

by Baker Donelson on

TheCloud: Good Morning! TheCloud is a leading cloud-based provider, striving to secure your apps, email and confidential data in the cloud. How may we help you today? Mr. Techie: My name is Mr. TechieTechie, I’m the CEO...more

FTC Settles With Lead Generation Firm For Illegally Selling Consumer Data, False Data Security Promises

by Kelley Drye & Warren LLP on

The FTC announced last week a settlement with Blue Global Media, LLC and its CEO Christopher Kay. The company operated 38 Internet domains that solicited online loan applications from consumers. The applications collected...more

Technically Speaking, Cybersecurity Isn’t About Speaking Technically

by Seyfarth Shaw LLP on

These days cybersecurity seems to be all about technology. Pen testing, firewalls, port scanning, SIEM, zero-day, IPS, AES256, SHA, DMZ, NIDS, TLS, SS7 – I’ll stop. I could go on, but you get the idea. And I have a vested...more

Countdown Begins for Cybersecurity Compliance

by BakerHostetler on

This month marks an important waypoint for defense contractors subject to the new cybersecurity requirements imposed by the Department of Defense. For contractors subject to the requirements of Defense Federal Acquisition...more

Tick Tock Tick Tock, When a Breach Occurs, You’re on the Clock!

As a reminder that state attorneys general have enforcement authority over breach notifications, the New York Attorney General recently announced a $130,000 settlement for a failing to provide breach notification in a...more

Cybersecurity Steps Every Lawyer Should Consider

All lawyers face technology threats, ranging from the inconvenient to practice-threatening disasters. From unauthorized access, lawyers risk having confidential information stolen, destroyed or made inaccessible. Hackers...more

Ponemon Institute Study on Costs of Data Breaches Highlights Improvement and New Risks for U.S. and Global Companies

by Ballard Spahr LLP on

The average cost of a data breach, on both an aggregate and a per-record basis, has decreased slightly according to the Ponemon Institute's 2017 Cost of Data Breach Study: Global Overview. In addition to presenting recent...more

Draft Guidelines Released for Securing Cross-Border Data Transfers Out of China

by Faegre Baker Daniels on

With the Cybersecurity Law of China effective on June 1, 2017, and the draft data transmission measures pending finalization, Chinese regulators on May 27, 2017, published another draft rule as a piece of the newly formed...more

First Catalogue Published for Network Products Subject to Certification

by Faegre Baker Daniels on

On June 9, 2017, the Cyberspace Administration of China (CAC), jointly with Ministry of Industries and Information, Ministry of Public Security, and the Certification and Accreditation Administration of China, published the...more

Why Updating The Electronic Communications Privacy Act Poses Difficulties

by Revision Legal on

The privacy of electronic communications is provided for under the Electronic Communications Privacy Act. There are limited circumstances in which ISPs may disclose the contents of electronic and stored digital...more

Disgruntled Employees and Other Internal Threats to Your Cyber Security

by Baker Donelson on

Baker Donelson's Data Protection, Privacy and Cybersecurity attorneys are pleased to continue a series of client alerts that address significant cyber-threats to your business and discuss ways you can protect your business...more

Girl Scouts Issue Cybersecurity Badges for Girls in K-12

If you have a daughter in K-12 who is in the Girl Scouts, check out the fact that they can now earn cybersecurity badges if they demonstrate a mastery of Internet security. Brilliant! What a great way to get girls interested...more

US Companies Create Principles for Cybersecurity Risk Ratings

by BakerHostetler on

On June 20, 2017, the U.S. Chamber of Commerce announced that a consortium of more than two dozen chamber member companies, including prominent big banks, big-box retailers, and technology giants released a set of principles...more

Data Security in Japan: New Cross-Border Data Transfer Rule

by K&L Gates LLP on

Does your business outside of Japan receive any personal information from Japan, perhaps from your affiliates, business partners, or customers based in Japan? Does your business in Japan transfer any personal information...more

Strengthening Data Security Through Human Resources And Information Technology Teamwork

by Jackson Lewis P.C. on

Human Resources (“HR”) and information technology (“IT”) departments play unique and important roles within an organization. With instances of data breaches on the rise, however, companies should be mindful of the importance...more

My Entity Just Experienced a Cyber-Attack! What Do We Do Now?

by Balch & Bingham LLP on

On June 9, 2017, the U.S. Department of Health and Human Services (HHS), Office of Civil Rights (OCR) released a cyber-attack “Quick Response” checklist (the Checklist) for the benefit of HIPAA covered entities and business...more

OCR Publishes Checklist and Infographic for Cyber Attack Response

OCR released a simple checklist and infographic last week to assist Covered Entities and Business Associates with responding to potential cyber attacks. As cybersecurity remains a pressing concern for health care entities,...more

Yet another Target settlement highlights data breach costs

by Thompson Coburn LLP on

In what appears to be the closing act of the saga that is the Target data breach, on May 23 the retailer announced it had reached a settlement agreement with a coalition of 47 states’ attorneys general. Pursuant to the...more

The Internet of Things: A Trifecta of Cyber and Physical Threat Risks

by Wilson Elser on

The recent WannaCry ransomware cyberattack provided another chilling reminder of the potential disruptive power behind the Internet of Things. Even before the WannaCry attack in May 2017, a distributed-denial-of-service...more

Home Depot Settles Data Breach Suit for $25M

As a result of a $25 million settlement reached with the remaining banks and credit unions, the litigation against Home Depot stemming from its 2014 data breach will finally end....more

(Un)Protected Health Information Held for Ransom

by Snell & Wilmer on

Recent experiences of major health care companies offer a reminder of the importance of data security and following a well-written policy for compliance with the HIPAA Privacy Rule....more

Global Privacy & Cybersecurity Update Vol. 14

by Jones Day on

New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more

512 Results
|
View per page
Page: of 21
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.