News & Analysis as of

Encryption

A New Member in the Big Club – New Mexico Becomes the 48th State with a Breach Notification Law (+ Disposal and Service Provider...

by Locke Lord LLP on

Effective June 16, 2017, New Mexico will join 47 other states (as well as the District of Columbia, Guam, Puerto Rico, and the Virgin Islands) by imposing breach notification requirements on entities experiencing information...more

Governor Signs Amendment to Tennessee Data Breach Notification Law

by Bass, Berry & Sims PLC on

During the recent 110th Regular Session of the Tennessee General Assembly, Governor Bill Haslam signed into law an amendment to the Tennessee Identity Theft Deterrence Act of 1999....more

Compliance into the Weeds-Episode 39, Disclosure of Ransomware Attacks [Video]

by Thomas Fox on

In this episode Matt Kelly and I take a deep dive into the question of whether a company has a duty to disclose ransomware attacks. We consider it from the regulatory, legal, ethical, law enforcement, business, PR and some...more

ABA Encourages Encryption of Emails When Transmitting Confidential Client Information

by Seyfarth Shaw LLP on

In a recent formal Ethics Opinion, the American Bar Association stressed that lawyers must make reasonable efforts to prevent inadvertent or unauthorized access to confidential information relating to the representation of...more

When “WannaCry” Strikes: Preparing for and Responding to the Largest Ransomware Attack in History

As many around the world were preparing for the Mother’s Day weekend, the WannaCry ransomware attack hit over 70,000 organizations in nearly 100 countries in just one day, Friday, May 12th. After the weekend, the attack had...more

New ABA Opinion – Attorneys Must Take Reasonable Cybersecurity Measures To Protect Client Data

by Dentons on

On May 11, 2017, the American Bar Association (ABA) issued Formal Opinion 477, making clear that a lawyer may transmit information relating to the representation of a client over the Internet without violating the Model Rules...more

Another HIPAA Settlement: Stolen Laptop Costs $2.5 Million Plus Encryption Requirement

by Perkins Coie on

The U.S. Department of Health and Human Services (HHS) recently announced yet another HIPAA privacy and security settlement involving Protected Health Information (PHI) on a stolen laptop. Although this might be seen as just...more

New York stiffens data protection regs

by Thompson Coburn LLP on

New York has once again positioned itself as a leader among states by recently implementing one of the most detailed and stringent data security regulations to date. It should come as no surprise that New York is a prime...more

TMT China Brief - Winter/Spring 2017

by Hogan Lovells on

Welcome to this edition of our bi-annual TMT China Brief! This edition features a total of 15 articles which capture the significant TMT developments in Greater China in the Winter/Spring 2017. These developments cover an...more

New Mexico Becomes 48th State To Enact Data Breach Notification Law

by Dentons on

On April 6, 2017, New Mexico became the 48th state to enact a data breach notification law, leaving Alabama and South Dakota as the only two states without such a law. The New Mexico law goes into effect June 16, 2017....more

Tennessee Adds New Encryption And Timing Requirements To Its Data Breach Notification Law

by Dentons on

On April 4, 2017, Tennessee Governor Bill Haslam signed into law an amendment to the state’s data breach notification law, making two substantive changes to the statute...more

Tennessee Adds Technical Requirements To Its Data Breach Notification Laws

by Dickinson Wright on

Are you doing business in Tennessee? Do you have computerized personal information about anyone in Tennessee (including employees, clients, or customers)? Are you encrypting that data in accordance with the current version of...more

Heads Up, App Developers: Google Is Getting Serious About Privacy and Data Security in Apps

Beginning March 15, 2017, Google began removing apps from Google Play, its online marketplace where apps and other digital media are offered for download and use on the Android platform, for failing to comply with Google’s...more

N.Y.’s New Cybersecurity Regulations: What Financial Services Companies Need to Know

With corporate data security breaches on the rise, the New York State Department of Financial Services (NYDFS) has adopted rules requiring financial institutions to take certain measures to safeguard their data and inform...more

HIPAA Guidance Issued on Man-In-The-Middle Attacks

by McGuireWoods LLP on

Last week, the Office of Civil Rights (OCR) issued guidance on securing end-to-end communications for sensitive information transmitted between parties over the internet. The OCR warns against “man-in-the-middle” (MITM)...more

Tennessee Legislature Amends (Again) Its Data Breach Laws

by Butler Snow LLP on

As I blogged about here, last year the Tennessee legislature amended its data breach laws to become the first state in the U.S. to remove the encryption safe harbor from its definition of a data breach, which required notice...more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

Foreclosure stats are a far cry from their heights in the aftermath of the 2008 economic crisis. But the big news in the industry is the rise of party players that were barely a blip on the scene (if around at all) 10 years...more

Something in Common with a Secret Service Agent: eDiscovery Trends

by CloudNine on

I have something in common with a Secret Service agent. We both have had a laptop stolen out of a vehicle. In the case of the Secret Service agent, as reported by CBS New York (and covered by Ride the Lightning), an...more

Third Circuit Holds Criminal Defendant in Contempt for Refusing to Decrypt Hard Drives

In a precedential ruling, the Third Circuit Court of Appeals this week upheld a lower court’s ruling holding a criminal defendant in contempt for refusing to decrypt two external hard drives that were seized during a child...more

Market Solutions, Volume 26, No. 1

by Morrison & Foerster LLP on

Sanctions: Will the Trump Administration Stay the Course? President Trump made many statements during the campaign regarding actions he plans to take to reverse Obama administration sanctions policies. These included...more

“W-2 Phishing Attacks Targeting Businesses to Cash in on Busy Tax Season: 10 Tips to Protect Your Business”

by Sedgwick LLP on

Cyber criminals are taking advantage of tax season to lure valuable W-2 information from vulnerable businesses. An example of a common phishing scheme starts with a scammer posing as a legitimate employee of a company,...more

Eight Keys to Securing Portable Devices

by Baker Donelson on

Securing physical worksites and workspaces is by now old hat. We all know file cabinets should be locked, worksites secured and personal access to information monitored. Securing portable devices, however, often receives less...more

California Data Breach Notification Law

by Revision Legal on

California law takes the privacy of its residents seriously. Privacy is an inalienable right guaranteed to California residents by the California Constitution. It was the first state to enact laws protecting the rights of...more

Health Company Fined by UK’s Information Commissioner Office

by Hogan Lovells on

Last week, the UK’s Information Commissioner’s Office (ICO) published a monetary penalty notice which fined a private healthcare company, HCA International, £200,000 for its failure to keep sensitive data secure....more

The February 2017 Update – The Mintz Matrix

During 2016, amendments to breach notification laws in five states went into effect (California, Nebraska, Oregon, Rhode Island and Tennessee). And by the end of last year, well over twenty states had introduced or were...more

315 Results
|
View per page
Page: of 13
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!