Data Security Data Breach

News & Analysis as of

Insurance Regulators Fine Tuning Cybersecurity Guidance

You may not realize how much personal information your insurance company has about you. Scarier still is that much of this data is sensitive and valuable to hackers – such as your Social Security number, financial...more

3 Guidelines to Maximize Value of Data

Imagine you are the CEO of company sitting across from an interviewer. The interviewer asks you the age old question, “So tell me about your company’s strengths and weaknesses?” You start thinking about your competitive...more

Privacy Tip #57 – Do Those Chip Credit Cards Really Protect Me from Fraud?

There are a half a billion chip cards in the market right now. They have been touted to improve security and reduce credit card fraud. But do they? According to a new report, both Visa and MasterCard have reported that...more

Cyber Security and Loss Recovery - A New Alternative for Organizations

The largest data breaches ever have occurred since 2015, and targets have encompassed a wide spectrum of entities. Organizations affected range from U.S. DOJ and the IRS—where citizens’ personally identifying information was...more

Advertising Law - October 2016 #3

YouTube Adds Sponsored Content Notification Feature - To help influencers achieve compliance with the necessary disclosures about their relationships with advertisers, YouTube has unveiled a new tool to provide notice to...more

Industry Insight: Information Governance – Leverage Your Business Intelligence and Reduce Risk

“The goal is to turn data into information, and information into insight.” – Carly Fiorina, former CEO, Hewlett-Packard Co. The most valuable asset of every organization is information. Organizing, analyzing and...more

Vermont Settles with B2B Software Developer over Security Practices

Yesterday, the Vermont Attorney General announced a settlement with business-to-business software developer Entrinsik, Inc., resolving allegations that the company’s Informer program violated Vermont law, including the law...more

Breaches of Mobile-Banking Apps — What can you do?

American banks maintain many levels of protection against fraud. Institutions accurately and quickly can detect suspicious account activity, credit-card charges and funds transfers. But it seems the sophisticated software...more

UK ICO issues largest ever fine for a data breach

The UK Information Commissioner's Office (the "ICO") has issued a record fine of £400,000 to a UK telecoms company, in connection with a data breach that took place in October 2015. The fine, and the related adverse...more

NAIC Revised Draft Insurance Data Security Model Law Continues to Raise Significant Industry Concerns

The National Association of Insurance Commissioners (NAIC) Cybersecurity (EX) Task Force has received significant industry comments regarding its revised draft Insurance Data Security Model Law issued August 17, 2016 (the...more

Senate Commerce Committee Members Air Laundry List of Pressing Issues Including Privacy, Data Security, and FTC Enforcement

On September 27th, the Senate Committee on Commerce, Science, and Transportation held a general oversight hearing of the FTC, which covered a multitude of major policy issues and included testimony from Chairwoman Edith...more

Privacy and Cybersecurity Checklist When Designing a Family Office

As family office executives set up a family office or review an existing family office, it is important to make sure the privacy and cybersecurity concerns are addressed and the governance and information security...more

Privacy Tip #54 – Keep Student Data Safe

In the past few years, we have seen the explosion of “big data,” “data analytics,” “data aggregation,” “predictive modeling,” and “data breaches.” None of these terms existed when I graduated from law school. We have...more

TechConnect - Your Law Firm Link to Industry News - September 2016

Letter from the Editors - Dear Readers, The world of raising capital for emerging companies has experienced a revolution. Prior to the enactment of the JOBS Act in 2012, raising capital for private companies was...more

Small-Breach Focus Shows Growing Scope Of HIPAA Probes

Flexing yet more enforcement muscle under the Health Insurance Portability and Accountability Act, on Aug. 18, 2016, the U.S. Department of Health and Human Services Office for Civil Rights announced that it will more widely...more

New York Attorney General Announces Settlement With Trump Hotel Over Two Data Security Incidents

On September 23, 2016, New York Attorney General Eric T. Schneiderman announced a settlement with Trump International Hotels Management LLC, d/b/a Trump Hotel Collection (“THC”), imposing $50,000 in penalties and ongoing...more

UPDATE: Got Data? Actual Harm Not Required for FTC Enforcement Action for Lax Security Measures

As anticipated, things are getting even more exciting with the case previously covered in Password Protected. Specifically, LabMD is appealing the landmark data security case between it and the Federal Trade Commission...more

Key Legal Issues in Privacy and Data Security on Display in Sixth Circuit Data Breach Class Action Decision

A September 12, 2016 decision out of the U.S. Court of Appeals for the Sixth Circuit adds new fuel to an ongoing legal debate: when a data breach places a business’s sensitive customer information into the hands of hackers,...more

Aravind Swaminathan Weighs in on Proposed Cybersecurity Regulations for Financial Institutions

Aravind Swaminathan, global co-chair of Orrick’s Cybersecurity & Data Privacy team, recently spoke with Global Investigations Review regarding new plans proposed by New York’s Department of Financial Services that will...more

Questions Remain Regarding Revised NAIC Data Security Model Law

The National Association of Insurance Commissioners (NAIC) Cybersecurity (EX) Task Force released its second version of the Insurance Data Security Model Law (Model) on August 17. The first version was exposed on March 3, and...more

Cyber Alert: Security Vulnerabilities: You Don’t Need a Breach to Face Regulatory Scrutiny

Those who track newsworthy data breaches and other cybersecurity incidents know what type of fallout to expect from these events. Class action lawsuits from consumers, shareholders and financial institutions are now not an...more

Cyber Insurance: Common Pitfalls of the Insured

As we have noted in a number of recent posts, tech companies need cyber insurance. The risk of not having it is simply not worth it.  But cyber insurance policies can be confusing to understand because the policies vary...more

MedStar Health Cardiology Associates Employee Emails Patient Information to Personal Account and Gets Fired

MedStar Health Cardiology Associates, (“MedStar Cardiology”) affiliated with MedStar Health, which was recently in the news for a ransomware attack, discovered that an employee sent protected health information of 907...more

NAIC's New Cybersecurity Model Law Draft Is Still Flawed

Insurers are a prime target for hackers as a result of the vast stores of valuable data they maintain. Not all information is created equal, and it varies in value. Hacker services and software, illegal drugs, cyberweapons...more

OCR Sets Sights on Smaller HIPAA Breaches

Covered entities and business associates can expect increased scrutiny for breaches of unsecured protected health information affecting fewer than 500 individuals. Starting August 2016, the U.S. Department of Health and Human...more

433 Results
View per page
Page: of 18
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.