News & Analysis as of

Information Security

Key Considerations for Adopting Ephemeral Communications Tools

by Mintz Levin - Mintz Edge on

The combination of emerging technologies, information security risks and electronic discovery obligations continues to give rise to questions regarding best practices for adoption of modern ephemeral communication tools in...more

The Data Report Episode 1: Information Is Currency

by Bilzin Sumberg on

Safeguarding, managing, controlling, and understanding your information is both valuable and vital. Litigation attorney Jay Ward begins building the foundation for understanding more complicated aspects of information...more

Target Reaches $18.5 Million Dollar Settlement in Data Breach with States

It seems as though we have been writing about this case for a lifetime. Target Corporation’s data breach saga came one step closer to a conclusion this week. On Tuesday, Target reached an $18.5 million settlement with 47...more

NAIC Model Cyber Law: Yet Another Regulatory Measure

The National Association of Insurance Commissioner’s (NAIC) model cybersecurity law will take center stage later this week at the group’s annual meeting in Denver. In its third draft, the Insurance Data Security Model...more

Data Classification and Information Security are Intertwined

A recent report entitled “Information Strategy 2017”, published by the Information Coalition finds that information security remains a top priority for over 90 percent of organizations. Given that the number of data breach...more

“W-2 Phishing Attacks Targeting Businesses to Cash in on Busy Tax Season: 10 Tips to Protect Your Business”

by Sedgwick LLP on

Cyber criminals are taking advantage of tax season to lure valuable W-2 information from vulnerable businesses. An example of a common phishing scheme starts with a scammer posing as a legitimate employee of a company,...more

Geolocation Privacy and Surveillance Act Introduced in US Congress

by Morgan Lewis on

On February 15, the Geolocation Privacy and Surveillance Act (GPS Act) was introduced by a bipartisan group of US Congress members. Designed to enact comprehensive rules for both government agencies and commercial service...more

Happy Data Privacy Day! A Few Tips from the MVA Privacy and Data Security Group

by Moore & Van Allen PLLC on

Saturday January 28, 2017 is Data Privacy Day. The Moore & Van Allen Privacy and Data Security group took a break from the pre-holiday revelries to put together some thoughts and tips for DataPoints. So hoist a glass and...more

How Should We Think About Cyber War, Where Rules Remain to be Written?

The recent hack of the Democratic National Committee (DNC) and the United States’ subsequent decision to impose retaliatory sanctions against Russia poses an important question: what does international law have to say about...more

The Panama Papers Make ‘Share Everything’ Security Policies a Thing of the Past

by Prosperoware on

The breach of the Panamanian law firm, Mossack Fonseca, two weeks ago and the ensuing leak of 11.5 million documents — 2.6 terabytes of data — to the press revealed in extraordinary detail how offshore bank accounts and tax...more

[Webinar] The FCC Privacy Rules: What You Need to Know - Nov. 29th and Dec. 6th, 1:00pm Eastern

by Davis Wright Tremaine LLP on

Following the approval of the FCC’s new privacy rules on October 27, ISPs need to address a number of issues, including opt-ins and opt-outs as well as information security programs. To help you prepare, the DWT team has...more

FCC Adopts Privacy Regulations for Broadband Internet Service Providers

by White & Case LLP on

On October 27, 2016 the FCC announced its adoption of an Order establishing a set of privacy regulations ("Broadband Privacy Rules") governing the use of consumer personal information by Broadband Internet Service Providers...more

Cybersecurity Requirements Proposed for New York Financial Companies

by Snell & Wilmer on

The New York Department of Financial Services has proposed new cybersecurity regulations “designed to promote the protection of customer information as well as the information technology systems of regulated entities...more

BIS Modifies Rules Governing the Export of Information Security Items Under the Export Administration Regulations; Updates to Cuba...

On September 20, 2016, the U.S. Department of Commerce's Bureau of Industry and Security (BIS) amended the Export Administration Regulations (EARs) to incorporate the December 2015 changes to the Wassenaar Arrangement's List...more

CFPB Management Challenges Include Information Security

by Ballard Spahr LLP on

On September 29th, the Office of the Inspector General (OIG) that oversees the CFPB released a memorandum detailing the major management challenges facing the CFPB.  The memo identified four areas of improvement that, unless...more

US Federal Financial Institutions Examination Council Revisions to Information Security Booklet

by Shearman & Sterling LLP on

The US Federal Financial Institutions Examination Council issued a revised Information Security booklet, which is part of the FFIEC’s IT Examination Handbook. The Information Security booklet summarizes the factors necessary...more

FFIEC Offers Guidance on Information Security Exams

How will examiners review the information security programs of financial institutions? Revised guidance from the Federal Financial Institutions Examination Council (FFIEC) provides help to banks by articulating the...more

New York State Department of Financial Services Proposes Cybersecurity Regulations for Financial Services Companies

If the New York State Department of Financial Services (“DFS”) has its way, come January 1, 2017, financial services companies that require a form of authorization to operate under the banking, insurance, or financial...more

Online Contacts and Eyewear Retailer Pays $100,000 Penalty to New York AG for Security Failures

Online retailer Provision Supply LLC (Provision Supply) (operator of EZContactsUSA.com which sells contacts and eye glasses) settled with the New York attorney general last week for its failure to notify its web customers of...more

Orrick's Financial Industry Week in Review

Federal Reserve Announces Extension of Conformance Period under Section 13 of the Bank Holding Company Act - On July 7, 2016, the Federal Reserve announced that it will extend until July 21, 2017 the conformance period...more

FFIEC Warns of Cyber Attacks

The Federal Financial Institutions Examination Council (FFIEC) reiterated the importance of banks protecting themselves from cyber attacks in a newly issued statement, urging financial institutions to "actively manage the...more

Are You Covered? Fourth Circuit Finds CGL Insurance Coverage for Data Breach

by Kelley Drye & Warren LLP on

As data breaches have continued to grow over the past few years, interest in cyber insurance coverage has grown along with it. This week, the Fourth Circuit upheld a lower court’s ruling in Travelers Indemnity Co. of America...more

FTC Settles with Router Manufacturer for Security Failure

by Davis Wright Tremaine LLP on

As the number of smart devices in homes connected to the Internet continues to grow, the need to keep home networks secure becomes increasingly important. Device manufacturers that promise to secure these home networks,...more

California Attorney General Defines Minimum Requirements for 'Reasonable Cybersecurity'

by Locke Lord LLP on

California has now weighed in on the definition of “reasonable” security and minimum security requirements for all businesses through the California Attorney General’s 2016 Data Breach Report. The Report references the...more

Backdooring Investment Security (On the Apple Case)

by Clark Hill PLC on

There's lots of talk about information security with the Apple case. But, perhaps just as important, the case also raises important concerns relating to investment security and to the predictability of our markets and laws. ...more

76 Results
|
View per page
Page: of 4
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.