News & Analysis as of

Encryption

Significant WiFi vulnerability exposed

What is the problem? Belgian researchers have published information about a vulnerability in the most popular WiFi encryption protocol that makes monitoring of all communications possible, except those communications that...more

FTC’s “Stick With Security” #4: Store Sensitive Information Securely & Protect It During Transmission

by Snell & Wilmer on

On August 18, 2017, the FTC released its fourth “Stick with Security” principle, which explained the importance of keeping confidential data only when needed, and securely storing the data when it must be kept. To that end,...more

Avoiding Glittering Generalities in Selecting eDiscovery Software – Considering Security: eDiscovery Best Practices

by CloudNine on

...The security of data is fast becoming one of the most prominent and visible areas of concern in the selection of eDiscovery software solutions. With public examples of data security failures increasing in regularity and...more

Equifax and SEC Breaches Show You Can’t Hide from Hackers

by Wilson Elser on

Cited as one of the largest incidents of its kind in history, the recent Equifax data breach underscores that every business and individual is vulnerable to theft of sensitive information by unscrupulous hackers. In less than...more

FTC’s ‘Stick with Security’ Series Carries On

Continuing with its “Stick with Security” series of blog posts for businesses, the Federal Trade Commission worked its way through several more items found in the “Start with Security” guidance....more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

As expected, the Fed left interest rates at current levels yesterday, though it hinted at another December rate hike and officially unveiled the start of its bond wind-down next month....more

Beyond Care, Custody, and Control: Data Security Best Practices for the Transportation and Logistics Sector

by Benesch on

The receipt, storage, and handling of sensitive shipper data occurs, often frequently and in real-time, alongside the flow of goods. Commercial shippers are well aware of the supply chain security risk to the materials and...more

Time to Review Your Encryption Classifications – BIS Updates Primary Purpose Exemption

by Kelley Drye & Warren LLP on

The Bureau of Industry and Security (BIS) recently published changes to its encryption regulations in an effort to simplify the text and focus the scope of controls. The biggest change is that Note 4, the “primary purpose...more

Delaware Passes Amendment to Data Breach Notification Law

by Wilson Elser on

For the first time since 2005, Delaware has amended its data breach notification law (DE Code Tit. 6, 12B-101-104). Whereas Delaware’s previous law only required companies to notify affected residents of a breach “as soon as...more

Hogan Lovells supports Vodafone Group in its 2017 Law Enforcement Disclosure Statement

by Hogan Lovells on

Earlier this year Vodafone Group (“Vodafone“) published an update to its Law Enforcement Disclosure Statement (“Statement“), including an annexe summarizing law enforcement and encryption laws in 28 countries. The Statement...more

DOJ Obtains Price-Fixing Guilty Plea

by Jones Day on

Texas-based e-commerce company Zaappaaz, Inc.—doing business as WB Promotions, Inc., Wrist-Band.com, and Customlanyard.net—and its president both agreed to plead guilty to conspiring to fix prices for customized promotional...more

Get Ready for New Data Transfer Security Standard for POS Systems

by Bryan Cave on

Retailers are still feeling the pain from implementing EMV-compliant POS systems. An article by Kate Fitzgerald in the PaymentsSource Technology newsletter (August 8, 2017) caught our eye....more

German Government Tightens Rules for German Investment Control Covering M&A Transactions by Foreign Acquirers

by White & Case LLP on

On July 18, 2017, the Ninth Regulation Amending the Foreign Trade and Payments Regulation (Neunte Verordnung zur Änderung der Außenwirtschaftsverordnung ("AWV")) entered into force. The federal government is thus responding...more

Alert: Export Control Reminder: Semi-Annual Encryption Reporting Deadline 8/1/17

by Cooley LLP on

August 1, 2017, is the deadline for submitting semi-annual reports for certain ENC Restricted encryption items exported or re-exported between January 1 and June 30, 2017, pursuant to paragraphs (b)(2) and (b)(3)(iii) of...more

Multi-level Encryption Patent Survives § 101 Challenge in District Court

by Knobbe Martens on

On May 23, 2017, the District Court for the Eastern District of Virginia (“District Court”) denied a motion for summary judgment that the patent claims asserted in a lawsuit brought by TecSec, Inc. (“TecSec”) are invalid...more

Cybersecurity Steps Every Lawyer Should Consider

All lawyers face technology threats, ranging from the inconvenient to practice-threatening disasters. From unauthorized access, lawyers risk having confidential information stolen, destroyed or made inaccessible. Hackers...more

New EU e-Privacy Regulation: European Parliament Committee Publishes Draft Report

The EU Parliament Committee in charge of reviewing the EU Commission's Proposal for an e-Privacy Regulation (Proposal) released a Draft Report proposing amendments this week....more

Someone Needs a Digital Makeover: Rethinking NAFTA in the Digital Economy

by Patrick Law Group, LLC on

When the North American Free Trade Agreement went into effect on January 1, 1994, there were an estimated 10,000 websites, most people used dial-up online services, Google had not yet become a verb, and the first online...more

Global Privacy & Cybersecurity Update Vol. 14

by Jones Day on

New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more

Encrypting Emails: ABA Issues New Guidance Addressing Security Concerns over Attorney-Client Communications

In May, the American Bar Association (“ABA”) released a Formal Opinion 477, providing guidance on attorney use of emails in communication with clients. In doing so, the ABA has promulgated a new standard when considering the...more

A New Member in the Big Club – New Mexico Becomes the 48th State with a Breach Notification Law (+ Disposal and Service Provider...

by Locke Lord LLP on

Effective June 16, 2017, New Mexico will join 47 other states (as well as the District of Columbia, Guam, Puerto Rico, and the Virgin Islands) by imposing breach notification requirements on entities experiencing information...more

Governor Signs Amendment to Tennessee Data Breach Notification Law

by Bass, Berry & Sims PLC on

During the recent 110th Regular Session of the Tennessee General Assembly, Governor Bill Haslam signed into law an amendment to the Tennessee Identity Theft Deterrence Act of 1999....more

Compliance into the Weeds-Episode 39, Disclosure of Ransomware Attacks

by Thomas Fox on

In this episode Matt Kelly and I take a deep dive into the question of whether a company has a duty to disclose ransomware attacks. We consider it from the regulatory, legal, ethical, law enforcement, business, PR and some...more

ABA Encourages Encryption of Emails When Transmitting Confidential Client Information

by Seyfarth Shaw LLP on

In a recent formal Ethics Opinion, the American Bar Association stressed that lawyers must make reasonable efforts to prevent inadvertent or unauthorized access to confidential information relating to the representation of...more

When “WannaCry” Strikes: Preparing for and Responding to the Largest Ransomware Attack in History

As many around the world were preparing for the Mother’s Day weekend, the WannaCry ransomware attack hit over 70,000 organizations in nearly 100 countries in just one day, Friday, May 12th. After the weekend, the attack had...more

329 Results
|
View per page
Page: of 14
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.