News & Analysis as of

Data Security

A Year in Review: FTC Data Privacy Actions and its Impacts on 2017 and Beyond

Whether it means taking a prominent role shaping data security for the Internet of Things, or addressing high profile breaches, the FTC has adopted an active position in policing data privacy and security. And, as data...more

Federal Lawmakers Consider IoT Security Standard

A new federal bill would regulate security for Internet of Things (IoT) devices by requiring government vendors to conform to standards and make sure that products can have security problems patched....more

Uber Settles FTC Dispute Over Consumer Data Privacy and Security Allegations

by Ballard Spahr LLP on

There are several key takeaways from a 20-year proposed consent order agreed to by Uber Technologies, Inc. (Uber) and the Federal Trade Commission (FTC)...more

DOL Temporarily Shuts Down OSHA Injury Reporting Portal Because of Possible Data Breach

by Fisher Phillips on

According to Bloomberg BNA, the Labor Department temporarily shut down OSHA’s (ITA) “Injury Tracking Application” portal for employers to report injuries and illnesses so that OSHA can investigate a “potential compromise” of...more

The Data Report Episode 12: Malicious Tools

by Bilzin Sumberg on

Module Four: When It All Goes Wrong The fourth module of The Data Report discusses the nature of data breaches, who might be responsible, what typically happens, what should happen, and what you can do to prepare for a...more

Hackers Surveyed On Their Favorite Ways To Access Your Data

by Fox Rothschild LLP on

Cybercrooks’ preferred path to critical data is through privileged accounts, those held by users who have broad access and powers within the target’s network. That’s according to a recent survey conducted by the...more

SEC Cybersecurity Risk Alert Emphasizes Proactive Compliance and Ongoing Vigilance

by BakerHostetler on

On August 7, 2017, the Securities and Exchange Commission (SEC) released its latest cybersecurity risk alert, detailing findings from the examination of 75 broker-dealers, investment advisers and investment companies carried...more

SEC Watch: “Observations” from SEC’s Cybersecurity 2 Initiative

Last week, the U.S. Securities and Exchange Commission’s (“SEC”) Office of Compliance Inspections and Examinations (“OCIE”) released its “Observations from Cybersecurity Examinations” conducted pursuant to OCIE’s...more

The FTC and Industry Propose Best Practices for IoT Security Updates

by Hogan Lovells on

How do you ensure that an Internet-connected sensor or device—often inexpensive and designed for lifespans of up to 20 years or more—can be secured against not only the intrusions of today but also those of the future? This...more

Governors of 38 States Join a Cybersecurity Compact

by Wilson Elser on

On July 16, 2016, the chair of the National Governors Association (NGA), Governor Terry McAuliffe (D-VA), unveiled his 2016-2017 initiative, Meet the Threat: States Confront the Cyber Challenge. Over the past year, the...more

DOE Imposes Data Security Requirements on Colleges and Universities

Do you have a written data security program in place to meet federal requirements? In the last year, the Department of Education (DOE) released guidance in the form of a “Dear Colleague” letter emphasizing the importance...more

New Mexico’s Data Breach Law

by Snell & Wilmer on

Almost all U.S states have laws about data security and what to do when there’s a data breach. New Mexico recently added such a law for its state. Here is what’s in the New Mexico law....more

NAIC Cybersecurity Working Group Votes to Approve Insurance Data Security Model Law

by Carlton Fields on

The National Association of Insurance Commissioners (NAIC) Cybersecurity (EX) Working Group (Cybersecurity WG) approved Version 6 (Finalized) of its Insurance Data Security Model Law (Model) on August 7 at the NAIC Summer...more

Patching Up Your Information Security Review

by Morgan Lewis on

In light of recent significant ransomware cyberattacks such as the one that originated in Ukraine and quickly spread to affect hundreds of thousands of computers in more than 150 countries, we wanted to provide a few pointers...more

Apple Takes Bite From Data Security False Ad Suit

Apple scored a victory in a data security suit when a California federal court judge denied a plaintiff’s motion to certify a class of consumers asserting false advertising claims....more

CPR Appoints New Cyber Panel Ahead of Anticipated Increase in Data Security Disputes

by Hogan Lovells on

The International Institute for Conflict Prevention and Resolution, a New York-based organisation offering Alternative Dispute Resolution (ADR) services, has recently announced the launch of a new specialised panel of...more

FTC Blog Posts Offer Security Guidance

In an effort to provide insight into the Federal Trade Commission’s data security principles, the agency pledged to each week share a new blog post with lessons for businesses....more

The Data Report Episode 11: Don't Be an Easy Target

by Bilzin Sumberg on

Module Three: Small Businesses & Start-Ups Attacks against small businesses have dramatically risen over the last few years. Litigation attorney Jay Ward discusses why companies should be concerned in a new episode of The...more

Connecticut Insurance Department Issues Bulletin on Data Security Requirements

We previously outlined the requirements of the Connecticut data breach law when it was amended in 2015, including the requirement to implement a comprehensive information security program (CISP)....more

Cloud computing security

by Ropes & Gray LLP on

Jim DeGraw, Ropes & Gray technology partner, addresses cloud computing security issues that companies should be aware of as they consider moving data to the cloud. _______________________ Clients call us up frequently and...more

Don’t Let Data Walk Out the Front Door: 7 Security Measures for Preventing Data Loss When Employees Leave

by Exterro, Inc. on

With all the news surrounding data breaches and information leaks, it’s easy to overlook the fact that the number one path sensitive/confidential information illegally enters the public domain is when employees leave their...more

New Connecticut Insurance Department Bulletin on Data Security Requirements

by Polsinelli on

Connecticut Bulletin MC-23. The Connecticut Insurance Department issued Bulletin MC-23 on June 13, 2017. The Bulletin addresses certification and notice requirements for data security requirements applicable to TPAs and PBMs...more

EU-U.S. Privacy Shield – Its Origins and the High Bar It Must Meet

by Pierce Atwood LLP on

To predict the Privacy Shield’s future, it’s helpful to recall its origins and to understand the high bar it must meet – namely, ensuring “an adequate level of protection” under the Data Protection Directive. ...more

SEC Increases Focus on Cyber Incident Response

by Reed Smith on

In the past few years, we have seen an uptick in agencies beginning to focus on the cybersecurity readiness and response of organizations subject to their jurisdiction. The U.S. Securities and Exchange Commission (SEC),...more

Washington Joins Growing List Of States With Laws Protecting Biometric Information

by Jackson Lewis P.C. on

Not to be outdone by the recent attention to biometric information in Illinois, and the Prairie State’s Biometric Information Privacy Act (BIPA), Washington enacted a biometric data protection statute of its own, HB 1493,...more

1,536 Results
|
View per page
Page: of 62
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.