News & Analysis as of

Data Security Security Controls

Hinshaw & Culbertson - Consumer Crossroads

Cybersecurity Compliance Emphasized at MBA's Legal Issues and Regulatory Compliance Conference

With cybersecurity legislation and regulation sweeping the country in response to a series of high-profile hacking and ransomware attacks, it was little surprise that cybersecurity was a topic at the recently concluded...more

Partridge Snow & Hahn LLP

Bringing Your Business Online: Written Information Security Programs (WISPs)

The current COVID-19 pandemic has forced many businesses online in order to survive. In many cases, businesses had no plans to be online. Others were forced to move online more quickly than planned. In order to assist these...more

Clark Hill PLC

Returning to Work with Secure Systems

Clark Hill PLC on

Here are some tips to make sure you secure your systems as employees head back into the office after working remotely....more

Sheppard Mullin Richter & Hampton LLP

Ohio Gives Breach Safe Harbor for Companies with Written Data Security Program

Effective November 2, 2018, companies that suffer a breach may have certain defenses in Ohio if they have a written cybersecurity program in place. Under this new law, companies can use as an affirmative defense the existence...more

BCLP

Security Due Diligence In A Merger Or Acquisition

BCLP on

When a company is acquired, the buyer ultimately becomes responsible for the data security practices of the company that it acquired. This is true with regard to litigation risks, reputational risks, and regulatory risks. ...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Don't Ignore Privacy and Data Security: Pre-Deal and Negotiation Considerations for Buyers in Merger and Acquisition Transactions

Almost all parties are required to exchange personal data as part of a merger and acquisition transaction. With data breaches on the rise, any buyer in a M&A transaction cannot afford to ignore privacy and data security...more

K2 Integrity

Securing Your Home’s Digital Entry Points

K2 Integrity on

We’re all concerned with our home’s physical security, but so often we forget to pay the same amount of attention to our digital security. However, leaving your home’s digital entry points open is like leaving your front door...more

King & Spalding

California Attorney General Interprets “Reasonable” Data Security

King & Spalding on

On February 16, 2016, California Attorney General Kamala Harris released guidance defining the minimum level of data security measures organizations should enact to comply with state laws governing the protection of personal...more

Cooley LLP

Alert: Reasonable Security Defined: California Attorney General's 2016 Data Breach Report

Cooley LLP on

On February 25, 2016, the Office of the California Attorney General released its 2016 California Data Breach Report, which contains a compilation and analysis of the information provided to the Attorney General pursuant to...more

Robinson+Cole Data Privacy + Security Insider

Information Security: MBA Whitepaper

Recently, the Mortgage Bankers Association released “The Basic Components of an Information Security Program,” for small and medium size companies in the mortgage industry that may not have the resources to stay well-informed...more

King & Spalding

California State Auditor Report Reveals Weaknesses In Golden State’s Information Systems

King & Spalding on

Elaine M. Howle, the California State Auditor (“CSA”), released a report on August 25, 2015 on the results of her office’s audit of controls in the state’s information systems. The results of the audit generally were grim,...more

PilieroMazza PLLC

Not So Far Out: OMB Memo Indicates Cybersecurity FAR Clauses Are Coming Soon

PilieroMazza PLLC on

On August 11, 2015, the Office of Management and Budget (“OMB”) released a draft policy memo entitled “Improving Cybersecurity Protections in Federal Acquisitions.” The purpose of the memo is to provide federal agencies with...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide