Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Employment Law Commentary -- Volume 26, Issue 7 July 2014 -- Building A Workforce Culture Of Data Security In The Post-Snowden Era

Last month’s Employment Law Commentary discussed the high level of international attention now being paid to protecting trade secrets from misappropriation, with recommendations for practical steps that companies may take to...more

Senate Intelligence Committee Approves Cybersecurity Bill

The Senate Intelligence Committee on June 8th voted 12-3 to approve a cybersecurity bill authored by Senate Intelligence Committee Chairman Dianne Feinstein (D-CA) and Vice Chairman Saxby Chambliss (R-GA). S. 2588, the...more

House Passes Three Bipartisan Cybersecurity Bills to Protect Critical Infrastructure

On July 28, 2014, the House of Representatives passed three bills aimed at enhancing the cybersecurity efforts of the Department of Homeland Security (DHS) in certain critical infrastructure sectors, including the energy...more

Using Words To Battle Cyber Losses

Words matter when it comes to cybersecurity. With security concerns dominating today’s corporate planning from the Board on down, the CIO often comes in as a technical expert, providing an analysis of the threat...more

OCC Report Highlights Risks Linked to Evolving Cyberthreats

According to the latest semi-annual risk report issued by the U.S. Office of the Comptroller of Currency (OCC), new methods of money laundering and a growth in both the volume and sophistication of electronic banking fraud...more

Privacy & Cybersecurity Update - July 2014

In This Issue: - Treasury Secretary Calls for Increased Focus on Cybersecurity - New Requirements for ‘Cleared Intelligence’ Contractors - FTC Clarifies Verifiable Parental Consent Methods Under COPPA - Small...more

Dodd-Frank News: July 2014 Dodd Frank Wall Street Reform and Consumer Protection Act Update

In This Issue: - Recent Cases ..RESPA ..FDCPA ..TCPA ..FCCPA & FDCPA ..TILA - In The News ..CFPB to Begin Collecting Complaints Regarding Prepaid Cards ..CFPB Proposes Letting...more

New Mandatory Exclusions in Standard CGL Policies Limit Coverage for Data Breaches

The insurance industry continues to respond to the growing threat of data breaches by directing businesses facing that risk towards new, risk-specific cyber insurance products, while attempting to restrict coverage for data...more

Third Circuit to Consider FTC’s Authority Over Data Security Standards in FTC v. Wyndham

We have written previously about the FTC’s action arising out of the data breach suffered by the Wyndham hotel group, and the company’s petition for permission to pursue an interlocutory appeal regarding the FTC’s use of its...more

Capital Thinking: Cybersecurity

Legislative Branch Activity - House Cybersecurity Legislation - This week, the House will consider four pieces of cybersecurity legislation on the floor including the National Cybersecurity and Critical...more

An Emboldened FTC: What Does It Mean for a Company’s Cybersecurity Team?

In April, Edith Ramirez, Chairwoman of the FTC, and Julie Brill, FTC Commissioner, tweeted: “Pleased the court recognized @FTC’s authority to hold biz accountable for safeguarding consumer data & look forward to trying this...more

OCR to Begin Phase 2 of HIPAA Audit Program

The U.S. Department of Health and Human Services’ Office for Civil Rights (OCR) will soon begin a second phase of audits (Phase 2 Audits) of compliance with Health Insurance Portability and Accountability Act of 1996 (HIPAA)...more

House of Representatives Passes SAFETY Act Amendment

The U.S. House of Representatives took a major positive step towards increasing the nation’s cyber security posture today when, on a voice vote, it passed H.R. 3696, the “National Cybersecurity and Critical Infrastructure...more

Capital Thinking: General Legislative

Senate Legislative Activity - The Senate will convene on Monday, July 28, at 2:00 pm. After any leader remarks, the Senate will proceed to Executive Session to resume consideration of Executive Calendar #929—Pamela...more

Privacy Tuesday: July 2014 #4

The last Tuesday in July — the summer of 2014 is rapidly slipping away! Here are some privacy and security bits and bytes for this last week of July...more

It’s No Surprise: Health Care Data Breaches Are on the Rise and So Is Government Enforcement

In This Issue: - The Take-Aways for Covered Entities and Business Associates - For More Information - Excerpt from The Take-Aways for Covered Entities and Business Associates: As a majority of the...more

Mobile Application: Security Best Practices

The industry for mobile applications is growing rapidly. As companies and independent developers look to gain—or strengthen—footholds in this competitive space, the Federal Trade Commission (FTC) asks, “… is security keeping...more

Sourcing Reference Guide: A reference tool for customers and service providers explaining current best practice and thinking from...

Outsourcing and the New Australian Privacy Law: In a nutshell - In Australia all APP Entities which collect, use or disclose Personal Information must, under the Privacy Act 1988 (Cth) (“Act”), take reasonable steps...more

SEC Charges ECN Operator For Failing To Protect Customer Data

Fragmented markets, alternative trading systems and dark pools are increasingly a focus of discussion in the wake of repeated market outages. Interest in these venues has been intensified by the publication of Flash Boys and...more

New York Proposes First Virtual Currency Licensing Framework

On July 17, the New York DFS announced a proposal to establish a licensing regime for virtual currency businesses, the first by any state. In January, the DFS held a two-day hearing on developing a regulatory framework for...more

Congress Putting Microscope on FTC Enforcement

On July 24, 2014, the House Committee on Oversight and Government Reform held a hearing entitled, "The Federal Trade Commission and Its Section 5 Authority: Prosecutor, Judge and Jury." The purpose of the hearing was to...more

Washington Insight - July 2014

In This Issue: - Progress Toward Comprehensive Patent Reform Stalls - As Attention Turns to a Border Supplemental, a Twelve Bill Omnibus Seems Certain - Highways, Taxes, and Partisanship: The Next...more

Cyber Security: Forewarned is Fair-Warned

When Wei Wong, owner of Sushi Mushi, a popular Japanese food bistro in Texas, installed a phone add-on to take credit and debit card payments straight from his employees’ phones, his revenues skyrocketed. Yesterday the Feds...more

Think Beyond Social Media Training: There’s More than One Way to Manage Social Media Risk

I have to admit that since I’ve thrown myself into the deep end of the compliance field, I may have gotten a bit narrow-minded, especially when it comes social media. When social media came up in my MBA Information Technology...more

New York AG Reports that Data Breaches Cost New York Businesses over $1B Last Year

The current headline in data security is a just-released report from the New York Attorney General's Office (the "AG Report") announcing that the number of reported data breaches more than tripled between 2006 and 2013,...more

1,033 Results
|
View per page
Page: of 42