Information Security

News & Analysis as of

Protection against Business and Legal Risks from the iPhone 5s Security Vulnerabilities

The iPhone 5s debuted with a list of new features designed to enhance its users’ experience. Among the list is Touch ID, a form of biometric security that allows users to lock and unlock their iPhone with their fingerprint....more

Government Contracts Quarterly Update - February 2014

The Government Contracts Quarterly Update is published by BakerHostetler's government contracts practice group to inform our clients of the latest developments in federal government contracting. This update covers the...more

FTC Settles Claims Relating to U.S. – EU Safe Harbor Program

The Federal Trade Commission recently announced it has settled claims against 12 companies relating to charges the companies falsely claimed they were abiding by the U.S. – EU Safe Harbor program that enables U.S. companies...more

SEC National Examination Program Outlines 2014 Priorities

On January 9, the SEC National Examination Program (NEP) published its examination priorities for 2014. The NEP’s market-wide priorities include (i) fraud detection and prevention; (ii) corporate governance and enterprise...more

Connecticut Appellate Court Affirms Denial of Coverage Under CGL Policy for Data Breach

As more data breaches and information security events occur, the insurance industry will see more disputes over whether losses from these events are covered under commercial general liability (CGL) policies. In the latest...more

How To Catch-Up in a Revised HIPAA World

The HIPAA final omnibus rule (Omnibus Rule) made sweeping changes to the HIPAA Privacy, Security, Breach Notification and Enforcement Rules earlier this year. Although the compliance deadline of September 23, 2013 has come...more

Making data count

Good data processed quickly and seamlessly is critical for modern businesses. Get it right and it will improve profitability and company valuation. Get it wrong and it may cost you dearly. Think of “Big Data” and what...more

Set Your “Target” on Data Security in 2014

Target Corp.’s data breach has been big news this holiday season, with as many as 40 million holiday shoppers across the nation exposed to potential credit and debit card fraud. According to the Identity Theft Resource...more

Academic Institutions Face Increased Threat Of Cyberattacks

American research universities typically structure their data and digital networks to be as accessible and open as possible to promote the open exchange and sharing of information. ...more

Employer BYOD Concerns: Part 2 of It's 2013. Do You Know Where Your BYOD Policies Are?

In Part 2 of "It's 2013. Do You Know Where Your BYOD Policies Are?" we will discuss employer BYOD concerns. Check out Part 1 to learn more about employee interests; Part 3 will present developing trends and suggest best...more

Information Security Implications for Business Agreements

On February 12, 2013, President Obama signed an Executive Order (“Order”) that outlined a voluntary cybersecurity framework (“Framework”) designed to help protect the nation’s critical infrastructure, which is generally...more

European Commission Publishes Cybersecurity Strategy and a Proposed Directive on Network and Information Security that Would...

On 7 February 2013, the European Commission published two cybersecurity documents designed to provide a comprehensive vision of how European Union Member States, national authorities, and private industry will prevent and...more

12 Results
|
View per page
Page: of 1