News & Analysis as of

Risk Mitigation

No Rules, Just Be Right? The ABA's New Technology Ethics Opinion

by JD Supra Perspectives on

On the heels of the recent Petya ransomware attack, which infected DLA Piper's IT systems, a superb analysis by Peter Norman of the ABA's Formal Opinion 17-477R on lawyers' ethical responsibilities when using information...more

Gavel to Gavel: Preventing data breaches

by McAfee & Taft on

The risk data breaches and cyberattacks pose to small businesses cannot be overstated. Roughly half experienced a breach within the past year at an average cost of $665,000 and immeasurable lost revenue. Worse yet,...more

Cybersecurity: When Social Engineering Fraud is Not Covered Under Your Insurance Policy

by Bennett Jones LLP on

We live in an age of escalating cybersecurity threats. Many intrusion threats are social engineering attacks, which seek to gain entry to an organization's computer systems via its personnel and not a hack to the computer...more

Minimizing Risks and Maximizing Opportunities in China-Latin America Investment

On June 1, 2017, Skadden hosted the webinar “Minimizing Risks and Maximizing Opportunities in China-Latin America Investment.” Topics of discussion included the increasing importance of Chinese investment in Latin America,...more

New Revenue Recognition Standard – Part VI: What Does Mean?

by Thomas Fox on

Over several blog posts, I have explored in detail the new Financial Accounting Standards Board (FASB) Accounting Standards Update No. 2014-09, Revenue from Contracts with Customers (Topic 606), which set forth a new Revenue...more

Environmental Law: H.R. 2936 a Solution to Fire-borrowing?

by Lewitt Hackman on

The federal House Natural Resources Committee (HNRC) recently passed H.R. 2936, a bill to improve the overall health of forests and other lands across the country. The bill was introduced by Bruce Westerman (R-AK), who is...more

Blog: Monetizing an Earn-Out – Does That Make It a “Security?”

by Cooley LLP on

In life sciences/medical technology transactions, buyers and sellers often use milestone-based and sometimes royalty-based contingent consideration to compensate sellers for assets that are in various stages of development...more

Ransomware: Assessing & Crafting Coverage

by GB&A Insurance on

When it comes to cyber risk insurance, coverage for ransomware related claims is an important component. And with ransom attacks on the rise, it’s more important than ever. But organizations need to be careful not to develop...more

North Sea decommissioning: Primed for a boom? The complexities and challenges associated with decommissioning offshore oil and...

by White & Case LLP on

Historically, the attitude towards decommissioning disused offshore oil and gas platforms—'abandonment' as it was previously known—has been largely negative, with companies viewing mature installations as a burden rather than...more

Types of Insurance That May Apply if You Are Injured in a Car Accident in North Carolina

by Ward and Smith, P.A. on

In 2015, there were over 250,000 reported car accidents in North Carolina. And, unfortunately, statistics suggest that nearly every driver will be involved in at least one car accident in their lifetime. Given these numbers,...more

Preparing For and Responding to the Petya Ransomware Attack

While still reeling from last month’s WannaCry attack, organizations worldwide were hit with another global ransomware attack this week, June 27, 2017. The infection began inside the Ukraine but has quickly spread across four...more

James Dalton, Director of Civil Works at USACE, Offers Valuable Perspectives at Annual NAFSMA Conference

by Downey Brand LLP on

One of the best ways to learn about the direction of national flood risk management is to attend the annual conference of the National Association of Flood and Stormwater Management Agencies (NAFSMA). The NAFSMA conference is...more

The CCO as a Futurist

by Thomas Fox on

Every Chief Compliance Officer (CCO) and compliance practitioner who thinks about their compliance program one, three or five years down the road is a budding futurist. The Compliance Week 2017 Annual Conference opened this...more

Anti-Corruption Diligence in the M&A Context

A successful merger or acquisition requires careful consideration of many components and diligence in a number of specialties. Corruption issues, generally, and the global reach of the Foreign Corrupt Practices Act and the...more

"Meaningfully Useful" Risk Mitigation Strategies for Providers Following the eClinicalWorks Settlement

by Jones Day on

The Health Information Technology for Economic and Clinical Health Act ("HITECH Act") established financial incentives under Medicare and Medicaid for eligible health care providers that adopt, implement, and demonstrate use...more

The Challenge of Auditing and Monitoring Your Distributors

by Michael Volkov on

Whether you are in the high-tech industry and managing your channel partners (i.e. third-party distribution network), the pharmaceutical and medical device industry managing a complex network of distributors and...more

Yet another Target settlement highlights data breach costs

by Thompson Coburn LLP on

In what appears to be the closing act of the saga that is the Target data breach, on May 23 the retailer announced it had reached a settlement agreement with a coalition of 47 states’ attorneys general. Pursuant to the...more

HHS Releases Health Care Industry Cybersecurity Task Force Report

Last week, the Department of Health and Human Services (HHS) issued its “Report on Improving Cybersecurity in the Health Care Industry,” which is the culmination of a year-long effort on behalf of the Cybersecurity Task...more

IAIS Proposes Revisions To Insurance Core Principle 13 On Reinsurance

by Carlton Fields on

The International Association of Insurance Supervisors (“IAIS”) recently released proposed revisions to the existing version of its Insurance Core Principle 13 regarding “Reinsurance and Other Forms of Risk Transfer.” The...more

Best practices for Oklahoma employers when inquiring about criminal histories

by McAfee & Taft on

You’ve probably at least heard of the so-called “Ban the Box” movement, a campaign aimed at convincing employers to remove any checkbox on applications designed to elicit information regarding an applicant’s criminal record....more

Outsourcing In The Hotel Industry – Beware Of The Pitfalls

by Fisher Phillips on

In recent years, a number of hotels both in the United States and abroad have increasingly outsourced certain departments. Housekeeping, valet parking, and some or all aspects of food service are frequently selected as...more

Privacy & Cybersecurity Update - May 2017

In this edition of our Privacy and Cybersecurity Update, we take a look at the Trump administration's executive order outlining its cybersecurity plans, Acting FTC Chairwoman Maureen Ohlhausen's comments on the possible...more

FDA Commissioner Hints at Drug Pricing-Related Initiatives

During his first appearance before Congress as FDA Commissioner on May 25, 2017, Scott Gottlieb reported that the Agency is preparing a “Drug Competition Action Plan” that it will unveil in upcoming weeks and months. This was...more

OIG reports on CFPB’s public website security controls

by Ballard Spahr LLP on

The Office of Inspector General for the Fed and CFPB has completed a report setting forth its findings from an audit in which it evaluated “selected security controls for protecting the [CFPB’s] consumerfinance.gov website...more

Ohio’s Ethical Limitations on the Use of Attorney-Client Arbitration Clauses

by Reminger Co., LPA on

It is essential for attorneys to understand the interplay between risk mitigation/resolution strategies and the rules of professional conduct. After all, when addressing a risk, attorneys must be careful not to run afoul of...more

484 Results
|
View per page
Page: of 20
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.