News & Analysis as of

Information Technology

European Court Restricts Employer Access to Employee’s Private Communications

by Orrick - Trust Anchor on

With its recent ruling in Barbulescu v. Romania (application no. 61496/08), the Grand Chamber of the European Court of Human Rights (ECHR) made a decision of enormous impact for employers in Europe. The decision makes clear...more

Cisco Releases Midyear Cybersecurity Report

We continue to try to alert our clients about the changing threat landscape in cybersecurity. We keep saying how the threats are becoming more and more sophisticated and more and more frequent, and that companies must...more

New York DFS Cyber Rules Go Live: Here’s Your Roadmap

by Orrick - Trust Anchor on

August 28, 2017 marks the end of the initial 180-day grace period for compliance under the New York Department of Financial Services’ “first-in-the-nation” cybersecurity regulations (the “Rules”). The initial regulations...more

USTR Requests Input on Impact of Trade Agreements on Government Procurement

by Hogan Lovells on

On August 21, 2017, the Department of Commerce (Commerce) and the Office of the United States Trade Representative (USTR) issued a request for public comment on the impact of government procurement provisions of U.S. trade...more

Deadline to Meet DFS Cyber Regulation Is Monday

Banks, insurance companies and other financial institutions have only a few days left to comply with the first wave of requirements under New York’s controversial new cybersecurity regulation....more

New Report from The Aberdeen Group Cites Lack of Advanced Technologies, Offers Recommendations: eDiscovery Trends

by CloudNine on

While recovering from ILTACON and Vegas, I found an interesting report with some interesting statistics and observations from The Aberdeen Group about how many organizations are handling eDiscovery and what they could be...more

Four New Risks Under China’s New Cybersecurity Law for Companies With Cross-Border IT Networks

by Kobre & Kim on

Companies operating in China that keep data offshore face great uncertainty under China’s new cybersecurity law, which came into effect June 1. The law imposes cybersecurity and data privacy requirements on two...more

DFS Cyber Regulation Countdown: Who Should Certify Compliance?

Companies subject to New York’s Department of Financial Services (DFS) new cybersecurity regulation should be preparing to comply with the first round of requirements by the upcoming August 28th deadline: enacting a...more

A Guide to NYDFS Cybersecurity Regulations’ August 28 Implementation Deadline

by Hogan Lovells on

As a follow-up to our previous reports (December 30, 2016 Alert; February 24, 2017 Alert) regarding the cybersecurity regulations issued by the New York State Department of Financial Services (NYDFS), we would like to remind...more

New Cybersecurity Rules for Colorado Investment Advisers and Broker-Dealers

by Snell & Wilmer on

Colorado has adopted new rules that add cybersecurity requirements for certain entities with Colorado securities licenses. The rules are from the regulatory agency the Division of Securities. It licenses securities...more

ILTACON 2017 Preview Edition: eDiscovery Trends

by CloudNine on

Believe it or not, it’s almost time for another ILTACON! ILTACON is the annual conference for the International Legal Technology Association (ILTA). This year, it is being held in Las Vegas (baby!) at the Mandalay Bay Hotel...more

How the U.S. Healthcare Sector Can Prepare for and Harden Its Systems Against Cyberattack

by Hogan Lovells on

“The number one issue on the minds of many CEOs and boards is cyberattacks and data breaches,” said Hogan Lovells partner Marcy Wilder. In this hoganlovells.com interview, Wilder discusses three key things health sector...more

Your Daily Dose of Financial News

by Robins Kaplan LLP on

Wells Fargo has reportedly uncovered another trove of unauthorized accounts, according to a regulatory filing on Friday. The bank also disclosed a CFPB investigation over potential harm to customers over its practice of...more

Hackers Could Target Airports, Planes, Satellites, Ships, Cars, and Trains

Cybersecurity for critical infrastructure continues to be of concern, including the transportation sector. A new study by ABI Research concludes that although the transportation sector continues to increase spending on...more

Women’s Health Care Group Notifies 300,000 About Ransomware Attack

Women’s Health Care Group of Pennsylvania has notified approximately 300,000 patients that their protected health information has been compromised by a ransomware attack....more

Bipartisan Group of Senators Introduce Bill to Impose Baseline Security Requirements for IoT Devices Provided to U.S. Government

by Hogan Lovells on

On August 1, a bipartisan group of four senators introduced a bill that would impose specific cybersecurity requirements on providers of Internet of Things (IoT) devices when doing business with the U.S. Government and...more

Data Breach at Italy’s No. 1 Bank Exposes 400,000 Accounts

Italy’s top bank, UniCredit SpA, is yet another victim in a series of cyberattacks exploiting vulnerabilities in the financial services industry. Criminals made off with biographical and loan data from 400,000 UniCredit loan...more

Unusual IoT Hacking Shows Creativity of Hackers

Everything connected to the Internet is hackable and at risk. But there are some things connected to the Internet that you just don’t think of as risks to an organization. That is, until now. Darktrace has issued its report...more

Gavel to Gavel: Preventing data breaches

by McAfee & Taft on

The risk data breaches and cyberattacks pose to small businesses cannot be overstated. Roughly half experienced a breach within the past year at an average cost of $665,000 and immeasurable lost revenue. Worse yet,...more

Russia Introduces New Definition and Obligations for Audiovisual Service Owners

by Latham & Watkins LLP on

The Federal Law No. 87-FZ of May 1, 2017, on Amendments to the Federal Law on Information, Information Technologies, and Information Protection (the Law) came into force on July 1, 2017. The Law introduces the definition of...more

National Association of Corporate Directors Updates Cyber-Risk Oversight Handbook

by Hogan Lovells on

Earlier this year, the National Association of Corporate Directors (NACD) released an updated version of its Director’s Handbook on Cyber-Risk Oversight (Handbook). The updates add 16 pages of content to the previously...more

Data Protection Laws Could Increase After Jio Data Break

Reliance Jio, an Indian telecom upstart, compromised the personal data of over 100 million customers. This has prompted a call for increased data protection laws in India. At present, companies in India do not have to...more

Chinese walls? Germany reinforces the control of foreign investments

by Hogan Lovells on

On 12 July 2017, the German Federal Government significantly reinforced the barriers for the acquisition of German companies by non-EU companies. The new Regulation for the Amendment of the Foreign Trade and Payments...more

Cyber Threats Equal Serious Threats

by Burr & Forman on

Every where you look these days, there seems to be another report of a cyber attack--attacks which do not discriminate based on industry type, size of business, or impact. In other words, everyone is vulnerable. In fact, the...more

Ransomware is taking the world by storm; does insurance respond?

On June 27, 2017, the world had its second major ransomware attack in two months, and experts are predicting more to come. The first, named WannaCry, began May 12, and quickly spread to over 400,000 machines, the vast...more

305 Results
|
View per page
Page: of 13
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.