News & Analysis as of

Data Security

“GLB” and What it Means for Auto Dealers

by Fisher Phillips on

Developing an information security program is good business, and for auto dealers that are considered “financial institutions” under the Gramm-Leach-Bliley Act (GLB) it is the law. As part of the GLB, the Federal Trade...more

The FTC Data Security Settlement with Uber

by Bilzin Sumberg on

The Risks of Overpromising and Underperforming - Demonstrating its authority over all things cybersecurity, the Federal Trade Commission (FTC) announced that it has entered into a proposed consent order with Uber for the...more

Los Angeles Launches America’s First City-Based Cyber Lab

by King & Spalding on

Los Angeles Mayor Eric Garcetti announced on August 15 an unprecedented initiative to launch the “LA Cyber Lab”—a public-private partnership that will freely share cyber threat intelligence with businesses in the city. Due to...more

FTC Continues Series With Collection, Retention Safety Tips

For the Federal Trade Commission’s second blog post in its “Stick with Security” series, the agency discussed how to maintain a focus on security, regardless of the size of a business or the type of data it handles....more

FTC Blog Post Series Makes Common Sense Of Data Security

by BakerHostetler on

Recently, data security experts and regulators have said that “businesses should use a common sense approach” when addressing data security. However, rarely do I hear clients or other business professionals speak in those...more

A Year in Review: FTC Data Privacy Actions and its Impacts on 2017 and Beyond

Whether it means taking a prominent role shaping data security for the Internet of Things, or addressing high profile breaches, the FTC has adopted an active position in policing data privacy and security. And, as data...more

Federal Lawmakers Consider IoT Security Standard

A new federal bill would regulate security for Internet of Things (IoT) devices by requiring government vendors to conform to standards and make sure that products can have security problems patched....more

Uber Settles FTC Dispute Over Consumer Data Privacy and Security Allegations

by Ballard Spahr LLP on

There are several key takeaways from a 20-year proposed consent order agreed to by Uber Technologies, Inc. (Uber) and the Federal Trade Commission (FTC)...more

DOL Temporarily Shuts Down OSHA Injury Reporting Portal Because of Possible Data Breach

by Fisher Phillips on

According to Bloomberg BNA, the Labor Department temporarily shut down OSHA’s (ITA) “Injury Tracking Application” portal for employers to report injuries and illnesses so that OSHA can investigate a “potential compromise” of...more

The Data Report Episode 12: Malicious Tools

by Bilzin Sumberg on

Module Four: When It All Goes Wrong The fourth module of The Data Report discusses the nature of data breaches, who might be responsible, what typically happens, what should happen, and what you can do to prepare for a...more

Hackers Surveyed On Their Favorite Ways To Access Your Data

by Fox Rothschild LLP on

Cybercrooks’ preferred path to critical data is through privileged accounts, those held by users who have broad access and powers within the target’s network. That’s according to a recent survey conducted by the...more

SEC Cybersecurity Risk Alert Emphasizes Proactive Compliance and Ongoing Vigilance

by BakerHostetler on

On August 7, 2017, the Securities and Exchange Commission (SEC) released its latest cybersecurity risk alert, detailing findings from the examination of 75 broker-dealers, investment advisers and investment companies carried...more

SEC Watch: “Observations” from SEC’s Cybersecurity 2 Initiative

Last week, the U.S. Securities and Exchange Commission’s (“SEC”) Office of Compliance Inspections and Examinations (“OCIE”) released its “Observations from Cybersecurity Examinations” conducted pursuant to OCIE’s...more

The FTC and Industry Propose Best Practices for IoT Security Updates

by Hogan Lovells on

How do you ensure that an Internet-connected sensor or device—often inexpensive and designed for lifespans of up to 20 years or more—can be secured against not only the intrusions of today but also those of the future? This...more

Governors of 38 States Join a Cybersecurity Compact

by Wilson Elser on

On July 16, 2016, the chair of the National Governors Association (NGA), Governor Terry McAuliffe (D-VA), unveiled his 2016-2017 initiative, Meet the Threat: States Confront the Cyber Challenge. Over the past year, the...more

DOE Imposes Data Security Requirements on Colleges and Universities

Do you have a written data security program in place to meet federal requirements? In the last year, the Department of Education (DOE) released guidance in the form of a “Dear Colleague” letter emphasizing the importance...more

New Mexico’s Data Breach Law

by Snell & Wilmer on

Almost all U.S states have laws about data security and what to do when there’s a data breach. New Mexico recently added such a law for its state. Here is what’s in the New Mexico law....more

NAIC Cybersecurity Working Group Votes to Approve Insurance Data Security Model Law

by Carlton Fields on

The National Association of Insurance Commissioners (NAIC) Cybersecurity (EX) Working Group (Cybersecurity WG) approved Version 6 (Finalized) of its Insurance Data Security Model Law (Model) on August 7 at the NAIC Summer...more

Patching Up Your Information Security Review

by Morgan Lewis on

In light of recent significant ransomware cyberattacks such as the one that originated in Ukraine and quickly spread to affect hundreds of thousands of computers in more than 150 countries, we wanted to provide a few pointers...more

Apple Takes Bite From Data Security False Ad Suit

Apple scored a victory in a data security suit when a California federal court judge denied a plaintiff’s motion to certify a class of consumers asserting false advertising claims....more

CPR Appoints New Cyber Panel Ahead of Anticipated Increase in Data Security Disputes

by Hogan Lovells on

The International Institute for Conflict Prevention and Resolution, a New York-based organisation offering Alternative Dispute Resolution (ADR) services, has recently announced the launch of a new specialised panel of...more

FTC Blog Posts Offer Security Guidance

In an effort to provide insight into the Federal Trade Commission’s data security principles, the agency pledged to each week share a new blog post with lessons for businesses....more

The Data Report Episode 11: Don't Be an Easy Target

by Bilzin Sumberg on

Module Three: Small Businesses & Start-Ups Attacks against small businesses have dramatically risen over the last few years. Litigation attorney Jay Ward discusses why companies should be concerned in a new episode of The...more

Connecticut Insurance Department Issues Bulletin on Data Security Requirements

We previously outlined the requirements of the Connecticut data breach law when it was amended in 2015, including the requirement to implement a comprehensive information security program (CISP)....more

Cloud computing security

by Ropes & Gray LLP on

Jim DeGraw, Ropes & Gray technology partner, addresses cloud computing security issues that companies should be aware of as they consider moving data to the cloud. _______________________ Clients call us up frequently and...more

1,541 Results
|
View per page
Page: of 62
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.