News & Analysis as of

Gramm-Leach-Blilely Act Data Protection

Blog: New Mexico Poised to Add the ‘Data Breach Notification Act’ to the Patchwork of State-Level Data Privacy Laws

by Cooley LLP on

The New Mexico Legislature passed the ‘Data Breach Notification Act’ (the Act) on March 15. The Act is now with Governor Susana Martinez who has 20 days from the date the Act was passed to sign it into law. If enacted, the...more

New Cybersecurity Requirements for New York Financial Companies

by Snell & Wilmer on

The New York Department of Financial Services has new cybersecurity regulations “designed to promote the protection of customer information as well as the information technology systems of regulated entities [financial...more

New Year, New Rules – The 2017 Illinois Personal Information Protection Act

by Locke Lord LLP on

On January 1, 2017, Illinois ushered in a broader and stronger personal information and data breach regime. The Illinois Personal Information Act (PIPA), 815 ILCS § 530, applies any entity that “handles, collects,...more

Do You Know Where Your Data Is Located? Why Knowing is Half the Battle

by Jaburg Wilk on

Whether you realize it or not, you are probably storing some personal or business data in the cloud. The National Institute of Standards and Technology (NIST) defines cloud computing as a model for enabling ubiquitous,...more

2016 Breach Roundup, Part I: U.S. State Data Breach Notification Laws Highlights and Trends

by Alston & Bird on

In many respects, 2016 has been a remarkable year, but one constant with recent history is that multiple states (six this year) amended their breach notification statutes. As is commonly stated, the U.S. ...more

FTC Publishes Data Breach Response Guidelines

by Goulston & Storrs PC on

Whether resulting from a planned cyberattack or mere carelessness, data breaches are on the rise. In 2015, 781 data breaches were reported across the United States, with the average breach costing $3.8 million. In 2016, the...more

Fenwick Privacy Bulletin - Fall 2016

by Fenwick & West LLP on

Privacy Shield – An Early Reflection - EU law generally prohibits the transfer of personal data from the European Economic Area to the U.S., unless the transfer is made in accordance with an authorized data transfer...more

Privacy & Cybersecurity Update: New York State Proposes Cybersecurity Regulation for Financial Institutions

New York state has proposed a new regulation — to go into effect January 1, 2017 — that would require banks, insurance companies and other financial services institutions regulated by the New York State Department of...more

Heal Thyself: Insider Threats to Heed, Especially for Industries with Large Amounts of Personal Information

by Carlton Fields on

A recent study by the Ponemon Institute found that insider threats due to malicious or negligent employees are the leading cause of private-sector cybersecurity incidents. Of the over 600 information security professionals...more

Illinois Joins the Fray: Strengthens its Laws Around Data Breach Notification and Data Security

Sophisticated phishing scams and muscular hacking efforts continue to compromise personal and sensitive information held by insurers, hospital systems, and businesses large and small. In response, many states have...more

Tennessee’s Data-Breach Notice Requirements Among the Nation’s Toughest

by Burr & Forman on

On July 1, 2016, Tennessee’s new notice requirements for breaches of data security systems which compromise an individual’s personal information will take effect. The amendments to Tennessee’s current rules, found at T.C.A....more

Cyber Security

by Kirton McConkie PC on

Roughly one million pieces of malware—computer viruses or malicious software—are released every day. In recent years, we’ve witnessed an unprecedented level of activity in the cyber arena, both in the form of increased...more

Financial Institutions Spend More on Cybersecurity

by Carlton Fields on

Financial institutions have been at the forefront of protecting their customers’ personal information, including names, addresses, phone numbers, account numbers, Social Security numbers, income, and credit histories. The...more

Privacy & Cybersecurity Newsletter: April 2016

by Locke Lord LLP on

What seems like a long time ago now, in 2011 PricewaterhouseCoopers (PwC) warned that “there is no question that law firms are among the companies being targeted by cyber criminals.” Despite this, many law firms believed (or...more

Close Encounters of the eDiscovery Kind

by Conduent on

Last week, two astronomers at CalTech predicted that a new planet is lurking at the edges of the solar system. They discovered the planet using computer simulations and mathematical calculations based on the planet’s...more

SEC brings first cybersecurity-related enforcement action

The Securities and Exchange Commission (“SEC”) recently settled its first cybersecurity-related enforcement action against a Missouri based registered investment adviser, R.T. Jones Capital Equities Management, Inc. (the ...more

What's So Great About an Information Security Policy?

by Brooks Pierce on

Lawyers and compliance professionals constantly tout the importance of internal information security policies, particularly in light of data privacy problems that are reported almost daily in the media. Admittedly, drafting...more

How to Avoid and Respond to a Cybersecurity Breach

by Pepper Hamilton LLP on

In light of numerous recent data breaches, cybersecurity has emerged as an issue impacting organizations ranging from the local hardware store to the largest multi-national firms in the world. In short, no industry is immune...more

FTC Can Regulate Cybersecurity Practices, Third Circuit Rules

by Ballard Spahr LLP on

The Federal Trade Commission (FTC) can regulate cybersecurity policies and procedures as “unfair” acts or practices under Section 5 of the FTC Act, the U.S. Court of Appeals for the Third Circuit has ruled in a very important...more

Under the Thumb: Regulatory Compliance When Outsourcing Cybersecurity Management

Managed security services are often a natural “add-on” when outsourcing IT services given that data protection is integral to application development, software as a service, and cloud storage, among other services. More...more

New Potential Liability for Data Security: U.S. Court of Appeals for the Third Circuit Announces FTC has Authority to Scrutinize a...

The U.S. Court of Appeals for the Third Circuit announced that the Federal Trade Commission (FTC) has the authority to scrutinize a business’s data security protocol -- and to file a complaint if the FTC finds that protocol...more

The FTC, Privacy, and the Life & Health Business

by Carlton Fields on

The Federal Trade Commission Act (“FTC Act”) prohibits unfair or deceptive acts or practices affecting commerce, as well as unfair competition in commerce. The FTC Act also created the Federal Trade Commission (“FTC”), and...more

Consumer Privacy Bill of Rights

by DLA Piper on

The White House released its much anticipated legislative proposal on the Consumer Privacy Bill of Rights Act (CPBRA) that was first floated in 2012. The CPBRA, if enacted (which seems unlikely before 2016), would provide...more

President Obama Unveils Plans About Cybersecurity

by DLA Piper on

Written by Sydney White President Obama made a series of announcements on cybersecurity, data security, and privacy that will be incorporated into his State of the Union address tonight.  In conjunction with the...more

Data Center Contracts: Privacy and Security Terms

by Snell & Wilmer on

A sometimes overlooked but potentially significant liability exposure for any company that uses the “cloud” to remotely store, process or distribute data is the service provider contract between the company user and its data...more

34 Results
|
View per page
Page: of 2
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!