News & Analysis as of

Tips for Protecting Your Company Against Cyberattacks

Cybersecurity has become, as it should, an extremely important topic on company boards’ agendas. The main question on everyone’s mind is: “How can we eliminate this problem?” The answer, unfortunately, is that you can’t....more

Increased risk of ‘Medjacking’ calls for better security measures on medical devices

Did you know that right now we have about 5 billion connected smart devices in use? Is it surprising that it is predicted that by 2020 that number will skyrocket to 25 billion? Of all these connected devices, a significant...more

Massachusetts develops a remote controlled contraceptive chip

Ladies and gentlemen, introducing the remote controlled contraceptive computer chip. Releasing measured doses of the levonorgestrel hormone, these computer chips can be implanted under a woman’s skin as a new form of birth...more

DOJ Unseals Indictment Against Individuals for Alleged Involvement in Hacks Against Various U.S. Institutions

On November 10, the DOJ unsealed an indictment against three individuals, Gery Shalon, Joshua Samuel Aaron and Ziv Orenstein, for allegedly orchestrating and committing computer hacking crimes against U.S. financial...more

Medical Devices a Target for Online Hackers

In the past few years, medical devices have become a major target for online criminals. Not only are medical devices considered to be one of the easiest and most vulnerable points of entry into a health care enterprise, they...more

Breaches, Damned Breaches and Their Statistics

Interesting conclusions about data breach costs emerge from two new studies, the 2015 Ponemon Institute’s Cost of Cyber Crime Study: Global and the 2015 NetDiligence® Cyber Claims Study. While the phrase alluded to in our...more

Financial Institutions Council Publishes Statement On Hacker Extortion

Amid the recent increase in hacker extortion cases, the Federal Financial Institutions Examination Council (“FFIEC”) issued a statement on November 3 (the “Statement”) describing steps financial institutions should take to...more

FCC Settles with Company Over Alleged Data Protection Failures

On November 5, the FCC resolved its first ever data security action against a cable company with a $595,000 settlement. According to the FCC, the company did not have adequate data security measures in place for employees and...more

Mental health center hacked

Not-for-profit mental health center Emergence Health Network, located in El Paso, Texas, has announced that its computer servers were compromised “through an unauthorized internet connection” from as far back as 2012....more

Employment Law Update - November 2015

Coming Changes to Overtime Exemptions Rules Will Have Serious Impact on Employers - The Fair Labor Standards Act ("FLSA") requires that employees be paid minimum wage and overtime pay at a rate of not less than one and...more

SEC Freezes Hacker’s Assets

Federal oversight related to hacking recently made headlines when a federal court in New Jersey granted the Securities and Exchange Commission’s (SEC’s) motion to freeze assets connected to a hedge fund manager accused of...more

Recent Amendments to Security Breach Notification Laws Further Complicate Breach Notification for Employers

It is not a matter of "if" but "when" an employer will be required to notify employees of a security breach.  Forty-seven states require employers to notify employees when defined categories of personal information, including...more

Senate Passes Legislation To Ease Sharing Of Cybersecurity Threat Information

On October 27, 2015, the Senate passed S. 754, the Cybersecurity Information Sharing Act of 2015 (“CISA”), which addresses how companies can share cyber threat information with the federal government. The legislation aims to...more

San Francisco Launches First “Internet of Things” Wireless Network in United States

With the onslaught of smart watches, smart thermostats, and even smart refrigerators that allow you to Tweet hungry messages to your followers, it’s only natural that a “smart city” would follow. This week, San...more

Report on Student Data Privacy Highlights Two Key Issues For School Leaders

Student data privacy is the “it” issue right now in edtech, as evidenced by a recent special Student Data Privacy Report (free registration required) issued by Education Week. Education Week prefaces the report with a fact...more

Privacy Tip #7 – Who is listening to your conversations through your smartphone microphone?

I’ve always known that my smartphone had a microphone. If nothing else, it obviously has to be used for the Shazam app so I can figure out the name of that great song. So that is the only time I use the microphone on my...more

Uber class action case hits roadblock

A California federal judge has ruled that a former Uber driver who is suing Uber in a proposed class action case was unable to show that he suffers an immediate threat of identity theft and dismissed the driver’s first...more

Senate passes Cybersecurity Information Sharing Act

After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015. The bill has been touted as being controversial and is opposed by...more

Data-Harvesting Zombie Hackers, Blood-Thirsty Auditors, and Other Reasons to be Scared on Halloween

This Halloween, the scariest monsters might not be in your closet or under your bed. They may be overseas, orchestrating intrusions into your electronic medical record. Or they may be lurking in your own workforce, carrying...more

Hacker arrests and prosecutions update

We previously reported that alleged Ukranian hacker Sergey Vovnenko, also known as “Flycracker,” “Fly” and “Darklife” was extradited from Italy, arrested and charged in New Jersey federal court for his part in disbursing the...more

ISIS Cyber-attacks On U.S. Infrastructure

At GridSecCon last week, FBI cyber division chief John Riggi announced that the Islamic State of Iraq and Syria (“ISIS”) attempted to hack American power companies, but failed. Riggi acknowledges the growing concern of...more

Colleges and Universities Are Prime Cyberattack Targets: What’s Behind the Threat?

When it comes to cyberattack targets, many think of retailers and associated credit card transactions or customer information, or perhaps healthcare providers with their ever-increasing storage and transmission of electronic...more

Time Is Precious with Computer-Hacking Claims

A recent ruling shows that plaintiffs must act fast when using a federal criminal statute for a civil suit. The U.S. Court of Appeals for the Second Circuit in August addressed the proper application of the statute of...more

Quick Guide to Trade Secrets

An overview of trade secrets, the critical business information that provides companies with a competitive edge. What are Trade Secrets? - Technical Information - Product formulas - Product designs ...more

That is SO last week - October 2015 #4

Last week, the Second Circuit Court of Appeals issued its summary decision in Triple Play Sports Bar and Grille. Affirming the National Labor Relations Board, the Court held that an employee’s Facebook comments about working...more

521 Results
View per page
Page: of 21

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.