Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Post navigation Cyber Insurance Primer – An Overview of Coverages

Insurance coverage for cyber risk – both first-party and third-party loss – is a burgeoning type of insurance many major carriers are now offering to their policyholders. In view of this significant growth, this blog will –...more

Intellectual Property and Technology News (Asia)

Welcome to the most recent Asia Pacific edition of Intellectual Property and Technology News, our biannual publication designed to report on worldwide developments in IP and technology law, offering perspectives, analysis and...more

QATAR: Promulgating the Cybercrime Prevention Law

On 15 September 2014, Qatar’s Emir approved Law No. 14 of 2014, The Cybercrime Prevention Law (“Cybercrime Law”). Although it has not yet been published in Qatar’s Official Gazette, the text of the law was published in the...more

Retailer - Fall 2014

Counting the Cost of Payroll Cards: Are they Worth it for Employers? Retailers, as well as other employers, have grown to rely on payroll cards to compensate employees who may not have bank accounts. What are the legal risks...more

The Celebrity Hacking Scandal and You: 3 Takeaways for Everyone

By now we all know a hacker accessed the personal iCloud accounts of dozens of A-list celebrities and leaked nude photos of stars such as Jennifer Lawrence, Kate Upton, Kirsten Dunst, and Victoria Justice. The anonymous...more

Back -to- School 2014

In mid-August Jewel-Osco announced that its computers, containing credit and debit card information, had suffered an “unlawful intrusion”. They are but the latest retailer to do so with the list that now includes CVS, Home...more

Corporate Insurance Trends 2014

Although we are seeing the tail end of many of the claims which arose from the Global Financial Crisis, the sophisticated plaintiff’s bar and ever-developing class action landscape means that companies and their officers will...more

Information Security Training Master Class: Winning the Battle Against Data Breaches, Malicious and Negligent Employees, and...

Disclaimer: I am a crazy person. I read over 50 articles before I wrote this (WHO DOES THAT) and I’m not even sure how I got so sucked in. In short, information security is a big deal right now – and there are tons of ways to...more

CIOs Spur Revenue Generation Through Smart Cybersecurity

Today as companies increasingly realize the value of strong cybersecurity, those CIOs who successfully implement an effective cybersecurity system should be viewed as a critical part of the revenue generation effort. An...more

Credit Unions Continue to Demand New Data Security Standards for Retailers and Right to Recover Losses After a Breach

On September 3, 2014, following the news of a possible breach at Home Depot (which was confirmed on September 8), the National Association of Federal Credit Unions (NAFCU) called on Congress to enact new legislation to hold...more

The Trend of Stricter State Data Breach Laws Continues with Florida

Florida’s new Florida Information Protection Act, Fl. Stat. § 501.171, became effective July 1, 2014. The new law repeals and replaces Florida’s existing data breach notification requirements (Fl. Stat. § 817.5681) with more...more

HIPAA Breaches: What They Are and What You Can Do to Protect Your Clients

45 CFR §§ 164.400-414– otherwise known as the HIPAA Breach Notification Rule– requires all entities and businesses covered by HIPAA to disclose any breaches of unsecured protected health information (PHI). In order to protect...more

Cybersecurity Litigation Monthly Newsletter

As we discussed in July, Tiversa, a “cyber-intelligence” company, notified the FTC in 2009 that a file containing the personal information of about 9,300 LabMD patients was available on a peer-to-peer file sharing network....more

Target Files Motion to Dismiss Data Breach Lawsuit

By now, we all know about the massive data breach at national retailer Target over the 2013 holiday season. The cyber-attack was carried out by sophisticated criminal hackers, who allegedly gained access to Target’s network...more

To Speak Or Not To Speak About A Data Breach

I recently posted about some companies making the decision to not announce when a data security breach has occurred, or at least they would think twice before announcing. According a couple crisis communication experts, that...more

Health Headlines: Also in the News - September 2014

GAO Finds CMS Should Fully Develop Plans for Medicare Advantage Encounter Data and Assess Data Quality Before Use – In a report released on September 2, 2014, GAO evaluated CMS’s plans for using Medicare Advantage (MA)...more

Privacy Top Five: Issues And Concerns In The First Six Months Of The Apps

That is, on receiving the personal information from a third party, you must contact each individual whose personal information you have now “collected” and notify them of the mandatory matters specified in the APPs, if such...more

5 Ways to Protect your Business from a Cyber Attack

Global cyber-attack threats stand at the highest ever recorded level, jumping 14 percent from 2012 to 2013 (Cisco 2014 Annual Security Report). Furthermore, a recent Microsoft Security Intelligence Report found that operating...more

Cyber, Data-Security Liability Claims: Coverage Under Traditional Lines of Insurance

Recent, large-scale data breaches at several well-known companies underscore the substantial risk that businesses now face with respect to cyber, data-security liability. In this year alone, numerous companies – including...more

Cybersecurity Concerns Underpin Continued Push In The Regulatory And Legal Arenas

While Congress continues its aggressive push on cybersecurity legislation, regulatory oversight and legal efforts continue across the spectrum of industries effectively filling the gap in addressing now every day concerns...more

The Congress Ramps Up Action On Cybersecurity Legislation - Possibilities For Data Protection/Breach Legislation Still Exist

While not a day goes by without a new cybersecurity attack, the recent news of the Russian criminal gang who is alleged to have stolen over 1 billion user names and passwords as well as 500 million email addresses reinforces...more

Privacy Monday – September 2014

Back to school, back to traffic jams … back to Privacy Mondays! Our look at bits and bytes and goofs and gaffes in data privacy and security....more

I Want My Selfie Back!!!

If your selfie has fallen into the wrong hands, the following statutory acts and/or common law theories may provide some relief....more

Major Barrier to E-Commerce in Middle East and North Africa is Fear about Data Security

In a recent article published by Law 360, Proskauer litigation associate Courtney Bowman outlines how companies can make inroads in the e-commerce market in the Middle East and North Africa (MENA). Although often overlooked,...more

PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY [Video]

Rarely does a day pass without new news of a data breach of some company around the world. It has impacted virtually every industry from hospitality to retail. What should companies do to avoid being the next target of...more

1,075 Results
|
View per page
Page: of 43