Internet Data Security

News & Analysis as of

Hello Insurers – Court says CGL may Cover Privacy Breaches Occurring Prior to 2014

In April 2013, Glens Falls Hospital admitted that the medical records for more than 2,300 of its patients were stored for several months on an unprotected computer server. The hospital’s outside records contractor, Portal...more

Fourth Circuit Upholds Coverage Under CGL Policy for Data Breach Claims

The United States Court of Appeals for the Fourth Circuit (“Fourth Circuit”) recently concluded that an insurer had a duty to defend a health care company that was sued by individuals whose personal health information was...more

Fourth Circuit Finds That Traditional CGL Policies May Continue to Provide Coverage for Cyberliability Claims

A federal U.S. Court of Appeals has confirmed that comprehensive general liability (CGL) and other traditional policies may yet be a source of liability insurance coverage for cyberliabilities. Although a dedicated...more

Hanging Around: Fourth Circuit Confirms the Coverage for Data Breach Can Still Be Found in Traditional Liability Policies

With today’s increased focus on data breaches and related cyber liability exposure, the insurance market continues to develop policies tailored to this unique risk. Insurers are also excluding cyber risks in many traditional...more

Fourth Circuit Expands Cyber Coverage under Commercial General Liability Policies

The United States Court of Appeals for the Fourth Circuit recently affirmed a decision by the United States District Court for the Eastern District of Virginia, Alexandria Division (District Court), finding that Travelers...more

Court Upholds Coverage Under General Liability Policy for Claim Alleging Failure to Protect Data

In an encouraging development for insureds, the United States Court of Appeals for the Fourth Circuit held that a health care company’s general liability insurer was required to defend the company against claims stemming from...more

FFIEC Weighs in on Cybersecurity in Light of Unprecedented Risk of Cyber Threats

As financial institutions of all sizes continue to face unprecedented cybersecurity risk, the Federal Financial Institutions Examination Council (FFIEC) released its Cybersecurity Assessment Tool. The Assessment is...more

CA AG Requires Chief Privacy Officer and Privacy Compliance Program

California’s Attorney General, Kamala Harris, has required Houzz, a home décor information and e-commerce website and mobile app publisher, to hire a chief privacy officer (CPO), conduct a company-wide privacy assessment, and...more

Cure of Security Rule Violations Following Breach of EPHI Cannot Save Covered Entities from $750,000 Settlement; Non-Breach...

More than three years after the Cancer Care Group, P.C. (“CCG”) notified the U.S. Department of Health and Human Services (“HHS”) Office for Civil Rights (“OCR”) of a breach of unsecured electronic protected health...more

Internet of Things – What does it mean for business?

What is the Internet of Things? The 'Internet of Things' (IoT) is a catchphrase describing the increasing interconnectedness between smart devices and sensors facilitated through their connection to the internet. It's not a...more

Internet of Things – Security

In a recent article we discussed the growth of wirelessly interconnected devices and the transformative impact it will have for business and more broadly on our lives. In that article we broadly highlighted some of the key...more

Ashley Madison Fallout: Class Actions, Pentagon investigation and easily searchable data

We previously reported that hackers The Impact Team had posted legitimate detailed information about 36 million adultery website Ashley Madison users. In the wake of the shocking posting of the data last week, two class...more

Legal Insights on the Ashley Madison Hack: Part I

Internet commenters and legal analysts alike are buzzing about the Ashley Madison hack. The website -- which billed itself as a networking site for anyone who wanted to discretely arrange an extramarital affair -- has already...more

NIST Guide Highlights Cybersecurity Considerations for Utilities and Manufacturing Companies

In 2013 alone, the U.S. Department of Homeland Security (DHS) and its Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to more than 256 cyber-incident reports—more than half of them in the energy...more

Ashley Madison’s Impact on New Jersey Divorce

Names, email addresses, credit card information, billing addresses and more for over 36,000,000 registered users have been released on the internet by the Ashley Madison Hackers. While many of the registered accounts may...more

FAQ - Russia’s Data Localisation Law

What does the new law do? It introduces a requirement for personal data of Russian citizens (individuals) to be processed by data operators who collect such personal data using data centres located in the Russian...more

Ontario Issues Guidance on Internet Publication

Ontario Municipalities Should Exercise Care in Publishing Personal Information - The Information and Privacy Commissioner of Ontario (IPC) has published new guidance entitled, Transparency, Privacy and the Internet:...more

17 Results
|
View per page
Page: of 1
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×