Risk Mitigation Data Protection

News & Analysis as of

Who is Stealing Your Trade Secrets? An Overview of Key Threats

Every company has trade secrets – for some, they may be special manufacturing processes, for other organizations, trade secrets could include product formulae, customer lists, software code or marketing strategies. The more...more

Media Query Call on Line 1: Do’s and Don’ts from an Information Security Officer

Putting your organization’s name in the paper can be a boon to both your business and your career. The ego stroke isn’t bad either; it can be quite a jolt to see your name in a trade or general news publication for the first...more

Cure of Security Rule Violations Following Breach of EPHI Cannot Save Covered Entities from $750,000 Settlement; Non-Breach...

More than three years after the Cancer Care Group, P.C. (“CCG”) notified the U.S. Department of Health and Human Services (“HHS”) Office for Civil Rights (“OCR”) of a breach of unsecured electronic protected health...more

SEC Issues Cybersecurity Examination Risk Alert

On September 15, the Securities and Exchange Commission’s (SEC) Office of Compliance Inspections and Examinations (OCIE) issued a Risk Alert re-emphasizing the careful scrutiny it will give to the data security practices of...more

SEC’s OCIE Risk Alert Announces New Cybersecurity Exam Initiative – Focus Includes Conducting Tests of Efficacy of Firm’s...

Following up on last year’s cybersecurity sweep exam, the SEC’s Office of Compliance Inspections and Examinations (“OCIE”) issued a new Risk Alert on September 15, 2015, announcing a second round of cybersecurity exams. In...more

Treasury Deputy Secretary Raskin Delivers Remarks On Cybersecurity and Insurance

On September 10, Deputy Secretary of the Treasury Sarah Bloom Raskin delivered remarks at the Center for Strategic and International Studies Strategic Technologies Program in Washington, D.C. After summarizing threats posed...more

SEC and DOJ Hacking Prosecutions Highlight SEC’s Increased Interest in Cybersecurity Risks

Companies are reminded of the need for strong internal controls. The US Securities and Exchange Commission (SEC) and the Department of Justice (DOJ) recently filed civil and criminal actions in the largest hacking and...more

In FTC v. Wyndham Worldwide, Third Circuit Upholds FTC Authority to Enforce Flawed Cybersecurity Measures

In a much anticipated decision, the Third Circuit Court of Appeals affirmed the authority of the Federal Trade Commission (FTC) to enforce actions against companies who have been subject to a data breach. The FTC sued...more

Cybersecurity Update - July 2015

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

New Whitepaper: Reasonable Steps to Protect Trade Secrets

Every company has trade secrets (so-called “crown jewels”)– confidential business and technical information – that if exposed, could result in lost sales, competitive advantage or the ability to further innovate....more

Data breach: how information governance reduces risk

With all the data breach activity over the past several years, any organization or individual that hasn’t been affected in some way almost feels left out. According to the Department of Health and Human Services, 120 million...more

Technology in Healthcare [Video]

From the 2015 PLUS Medical PL Symposium session “Technology in Healthcare: EHRs & PHI,” moderator Patricia Marzella-Graubert (Swiss Re American Holdings Corporation) and panelist Alexander Grijalva (New York Presbyterian...more

Strategies For Businesses Protecting Electronic Data Within California

Businesses in California have a number of tools with which to fight off unauthorized intrusions into their electronic data whether perpetrated by employees, former employees, disreputable competitors or random hackers....more

Four Security Gaps Cybercriminals Exploit in Your Business's Digital Storefront

Symantec, the American IT security company, recently released its 2015 Internet Security Threat Report that summarizes the number and types of threats and vulnerabilities seen in 2014. The report also analyzes trends and...more

The BakerHostetler Data Security Incident Response Report 2015

The rate of disclosures of security incidents in 2015 continues at a pace that caused many to call 2013 and then 2014 “the year of the breach.” Most incidents are described publicly with attention-grabbing terms such as...more

Gavel to Gavel: Establishing a Data Security Program

The ever-increasing expense of corrective actions taken by companies after data breaches occur is often publicized. What is not as apparent, or as publicized, are steps companies can take that may reduce the costs and the...more

Business Litigation Report - February 2015

- Firm News: - Main Article: ..Traversing the Breach: Why You Need to Prepare for Data Breaches and How to Do It - Noted With Interest: ..Direct Purchasers and End Payors Accuse Brand Pharma of...more

Another Good Reason to Pay Heed to Cyber Security

For many companies, the prospect of a dreadful, costly and reputation-damaging cyber-attack and data breach is all the motivation they need to assess and improve their cyber security and data protection posture RIGHT NOW. ...more

Locke Lord QuickStudy: Attention, Health Insurers: Unique Encryption Requirements in NJ

Setting a new standard for encryption, New Jersey has enacted a new law (P.L. 2014, c. 88, codified at N.J. Stat. Ann. §§ 56:8-196 - 56:8-198) effective August 1, 2015, requiring health insurance carriers authorized to issue...more

The Anthem Data Breach: The Fallout and What’s Next

By now (unless you have been under a snow drift), you have likely heard about the apparent intrusion into a database at the nation’s largest health insurer, Anthem, Inc. Rather than reiterate the facts as currently known...more

Digital Insights & Trends: What Keeps You Up At Night (Round 2) – Data INsecurity

We’re still wide awake, focusing on what keeps us (and our financial institution clients) up at night. Let’s pick up where we left off following our December webinar, but this time address data INsecurity from the perspective...more

Dealing with High Risk Data

When people think of high risk data, most think of Personal Health Information and Personally Identifiable Information as it relates to HIPAA and the health care industry, but Steve Shebest’s very informative article “High...more

Top Five Resolutions for Covered Entities and Business Associates in 2015

The New Year is here. It is time to make those 2015 resolutions, and not just those for getting fit and healthy. Resolve now to improve your organization’s compliance with the Health Insurance Portability and Accountability...more

IP | Trend: Data in the Cloud is the Next Big Storm? [Video]

Convenience, accessibility, and cost have led companies and their employees to put an increased amount of data in the cloud. But, does this put corporate data at risk? Attorneys Seth Northrop and Sam Walling discuss some of...more

Cybersecurity: Having a Privacy Policy is Not Enough

With the rash of significant data security incidents that occurred in 2013 and have continued to this day, it is increasingly important for companies to have an updated cybersecurity preparedness plan. The World Economic...more

30 Results
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.