News & Analysis as of

Data Security

FTC’s “Stick With Security” #5: Segment Your Network And Monitor Who’s Trying To Get In And Out

by Snell & Wilmer on

On August 25, 2017, the FTC released its fifth “Stick with Security” principal, which focused on how companies can protect their virtual “entrances and exits” and make life harder for hackers. The FTC believes that the...more

FTC’s “Stick With Security” #4: Store Sensitive Information Securely & Protect It During Transmission

by Snell & Wilmer on

On August 18, 2017, the FTC released its fourth “Stick with Security” principle, which explained the importance of keeping confidential data only when needed, and securely storing the data when it must be kept. To that end,...more

Privacy Perils: Reality Check - Your Information is Not Secure

by Bass, Berry & Sims PLC on

As we all know, over the past few years there have been a host of data breaches by entities that most of us expected would safeguard that information. The latest loss of roughly 150 million Americans' personal information is...more

FTC Provides Guidance on Reasonable Data Security Practices (Part I of III)

by Patrick Law Group, LLC on

Over the past 15 years, the Federal Trade Commission (FTC) has brought more than 60 cases against companies for unfair or deceptive data security practices that put consumers’ personal data at unreasonable risk. Although the...more

Is Your Business In Compliance With The Illinois Biometric Information Privacy Act

by Fox Rothschild LLP on

A number of employers in Illinois are involved in pending class action litigation regarding violations of the Illinois Biometric Information Privacy Act, 740 ILCS 14/1, et seq. (the “BIPA”). The BIPA, which was enacted in...more

FTC’s “Stick With Security” #3: Require Secure Passwords and Authentication

by Snell & Wilmer on

On August 11, 2017, the FTC released its third “Stick with Security” principle, which touched on the necessity of strong authentication practices. Secure passwords and fortified authentication practices make it that much...more

FTC’s “Stick With Security” #2: Control Access to Data Sensibly

by Snell & Wilmer on

On August 4, 2017, the FTC released its second “Stick with Security” principle, which addressed the next step a company should take after it has identified confidential data in its possession and determined what information...more

The Data Report Episode 17: What the GDPR Means for American Companies

by Bilzin Sumberg on

Module Five: International Law (Part II) In this episode of The Data Report, Litigation attorney Jay Ward expands his discussion on the GDPR, examining what it means for American companies and how thoughtful steps can be...more

Getting to data nirvana: Mapping connected car data usage scenarios and creating a holistic data governance plan

by Hogan Lovells on

In this hoganlovells.com interview, partner Winston Maxwell discusses how Hogan Lovells helps connected car manufacturers to develop simplified frameworks that internal stakeholders can use to understand business and...more

FY 2018 Forecasts: Winds Shifting on Data Security, Industry Consolidation, and DOJ Enforcement Efforts

In the second of our series about what to watch for in government contracts in fiscal year 2018, we focus on Cybersecurity, Cloud-Based Services, Employment Regulations, M&A, FCA enforcement, and Block Chain....more

Across the Board-Episode 7, Brad Davis on the Board's Role in Data Security Oversight

by Thomas Fox on

In this episode I visit with data and IT security expert Brad Davis, CEO of EverSolve, a company specializing in data security. We discuss the role of the Board of Director's in data and IT security in both oversight and...more

Top Five Takeaways from PREX17

by Zapproved LLC on

Tech, data security and ethics dominate e-discovery conversations heading into 2018 - Every year at PREX, our in-house e-discovery conference, I’m exposed to an impressive array of intriguing new perspectives and creative...more

Securing Your Home’s Digital Entry Points

We’re all concerned with our home’s physical security, but so often we forget to pay the same amount of attention to our digital security. However, leaving your home’s digital entry points open is like leaving your front door...more

Equifax Fallout Could Boost Consumers' Shaky Harm Claims

Tim Toohey was quoted in Allison Grande’s article that ran in Law360 on October 6, 2017, discussing the Equifax data breach and the congressional hearings in both the Senate and House following the breach. The hearings have...more

Court Deals Blow to FTC’s Position on Unfair Data Security Practices

by Reed Smith on

Over the last several years, the Federal Trade Commission (FTC) has regularly used its authority under Section 5 of the FTC Act to bring cases against companies due to their allegedly unreasonable data security measures. The...more

Is Blockchain the Answer to Identity Management?

Considering the recent Equifax data breach which put an estimated 145.5 million American’s identity at risk, main stream media outlets are starting to ask an important question; if we can’t stop data breaches, how do we...more

What American Companies Need to Know about the EU’s New General Data Protection Regulation (GDPR)

by Fisher Phillips on

The General Data Protection Regulation (GDPR) is a new data privacy and security law in Europe that will go into force on May 25, 2018. Every organization that does business with EU customers, regardless of the home base of...more

Equifax Flunked Index Provider’s Cybersecurity Test A Year Ago

A financial index provider foretold the Equifax Inc. data breach more than a year ago, warning that the rating agency “is vulnerable to data theft and security breaches.”...more

Delaware Strengthens Cybersecurity Law

by McGuireWoods LLP on

On August 17, 2017, Delaware became the latest state to strengthen its cybersecurity laws. Under the newly enacted House Substitute 1 for House Bill 180, businesses who suffer cybersecurity breaches will face far more...more

China Issues Second Draft of Cross-Border Data Transfer Guidelines

by Faegre Baker Daniels on

China has issued its second draft of cross-border data transfer guidelines for public comments, as one of a series of the implementation rules for the Cybersecurity Law of China. The “Information Security...more

Financial Services Committee Rounds Out Equifax Hearings

by Cozen O'Connor on

The House Financial Services Committee this morning rounded out a full week of congressional hearings for former Equifax CEO Richard Smith. Chairman Jeb Hensarling (R-TX) reiterated his earlier calls for national standards...more

New Ibero-American Standards to Provide Consistency in the Protection of Personal Data

by Jones Day on

In Short - The Situation: On June 20, 2017, the Ibero-American Network for Data Protection approved the Standards for Data Protection for the Ibero-American States....more

State Data Breach Notification Laws

by Foley & Lardner LLP on

While most state data breach notification statutes contain similar components, there are important differences, meaning a one-size-fits-all approach to notification will not suffice. What’s more, as data breaches continue to...more

Ohlhausen Examines 'Informational Injury'

Making good on her promise to focus on concrete consumer injury, Acting Chair of the Federal Trade Commission Maureen K. Ohlhausen announced a December workshop on “informational injury.”...more

Alert: New Law Heightens Cybersecurity Requirements for Delaware Residents

by Cooley LLP on

On August 17, 2017, Governor John Carney signed into law bi-partisan legislation that increases cybersecurity protections for Delaware residents whose personal information may be compromised as a result of a data breach....more

1,629 Results
|
View per page
Page: of 66
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.