Data Breach

News & Analysis as of

Privacy Tuesday: August 2014 #2

There is another retail data breach to talk about in this Privacy Tuesday post – privacy & security bits and bytes to start your week....more

Hospital Network Reports Large HIPAA Breach

Community Health Systems announced yesterday, August 18th, that hackers broke into its computers and stole data on 4.5 million patients. ...more

Changes in State Breach Notification Laws

As data breaches continue to occur, breach notification laws are being amended or enacted. In the United States, state and federal breach notification laws should be monitored carefully regarding changes, as should breach...more

Bring Your Own Device Doesn't Mean Bring in Security Breach

Bring-Your-Own-Device (“BYOD”) policies have been picking up steam because of increased productivity, improved communications, and the need for employees to work remotely. However, when implementing any BYOD policy there are...more

PCI Council Issues Biz Tips to Reduce 3rd Party Security Risk

On August 7, 2014 the PCI Security Standards Council issued new guidance to supplement PCI DSS Requirement 3.0 and help organizations reduce the risks associated with entrusting third-party service providers (“TPSPs”) with...more

Data Breach Notification, Helpful or Harmful?

Some IT professionals are debating whether they would issue a data breach notification in the event of a hack. Their rationale is that such a notification makes them a target for other hackers and that most of the incidents...more

The Inevitable Cyber Break In: Are You Protected?

The prevalence of cyber data breach over the years has not only grown in number, but has also grown in size. Perhaps the most well-known example of a large-scale data breach is that suffered by Target Corp. occurring at the...more

Russian Crime Ring Possesses Mass Quantities of Stolen Online Information

With recent reports that a Russian crime ring may have stolen the largest collection of online data — including 1.2 billion username and password combinations—effective data security is more critical than ever for all...more

Data Breach Litigation – A New Wave of Class Actions by Financial Institutions

Rarely does a day go by without news of a data security breach. According to the Identify Theft Resource Center, there have been a total of 447 data breaches to date this year, which represents a 20.5% increase over the same...more

What Companies Can Do to Protect Themselves in the Face of Yet Another Massive Data Breach

Last week it was reported that a small group of Russian computer hackers illegally obtained an unprecedented quantity of internet credentials, including 1.2 billion username and password combinations, and over 500 million...more

How Are You Affected By The Recent Massive Data Breach?

As you have probably seen, it was announced on Tuesday, August 5th, that usernames and passwords from 1.2 billion Internet accounts from over 420,000 websites were stolen by a criminal organization in Russia. According to...more

Privacy Tuesday – August 2014

We are just two Mondays away from Labor Day, the traditional end of summer in the United States. Here are some privacy tidbits to get your week started. See especially Jake Romero’s piece on the new Delaware data...more

Russian Cyberattack May Trigger State Security Laws And Notification Obligations

Now that entities are aware that at least 1.2 billion records have been compromised from websites spanning across all industries, a question arises whether entities have an obligation to investigate whether their websites...more

From Russia With Love: ‘Do svidaniya’ Peace Of Mind, Hello Information Security Training

So, this is rather embarrassing to admit, but I am one of those people that knows exactly what to do when your personal information is stolen. It’s not embarrassing that I know what to do. It’s embarrassing why I know what to...more

Cyber and Data Security and Privacy Liability: The Problem Isn’t Going Away. Get Out in Front of the Problem By Insuring Your...

On August 6, 2014, the New York Times – and other media outlets – reported that a Russian crime ring had amassed the largest known collection of stolen Internet data – a cache of at least 1.2 billion user name and password...more

Hackers steal 1.2 billion passwords – 4 steps to take now

The New York Times reported this week that an organized Russian criminal group stole approximately 1.2 billion user name and password credentials associated with more than 500 million email addresses from hundreds of...more

5 Next Steps For Companies After News of Massive Russian Data Breach

Before taking any action on this latest data breach news out of Russia, there are a number of things to understand....more

The Great Russian Internet Heist – What Now?

A breach of this nature is reportable under the breach notification laws in both California and Florida, as recently amended: “Personal Information” includes user name or email address, in combination with a password or...more

Did Russian Hackers Really Amass Over a Billion Passwords?

It was widely reported yesterday in The New York Times and elsewhere that a sophisticated Russian crime ring was holding a massive cache of stolen Internet credentials. According to the private security firm Hold Security, a...more

Cybersecurity and Data Privacy in Business Transactions

In This Presentation: - Data Breaches: By the numbers - Costs of Data Breach - Cybersecurity Considerations in Business Transactions - Cybersecurity in M&A Transactions - Cybersecurity –...more

Russian Hackers Reportedly Obtain Internet Credentials of More Than 500 Million Users

On August 5, The New York Times reported that Russian hackers have obtained what could be the largest collection of confidential data in history. The security firm that discovered the breach continues to alert affected...more

SEC Investigations Spur Debate over "Materiality" of Cyberattacks

Following a record year for data breach incidents — with eight breaches exposing over 10 million identities — the U.S. Securities and Exchange Commission (SEC) is closely scrutinizing how those breaches were handled. Multiple...more

Employment Law Commentary -- Volume 26, Issue 7 July 2014 -- Building A Workforce Culture Of Data Security In The Post-Snowden Era

Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more

Using Words To Battle Cyber Losses

Words matter when it comes to cybersecurity. With security concerns dominating today’s corporate planning from the Board on down, the CIO often comes in as a technical expert, providing an analysis of the threat...more

Privacy & Cybersecurity Update - July 2014

In This Issue: - Treasury Secretary Calls for Increased Focus on Cybersecurity - New Requirements for ‘Cleared Intelligence’ Contractors - FTC Clarifies Verifiable Parental Consent Methods Under COPPA - Small...more

708 Results
|
View per page
Page: of 29