Risk Mitigation Today's Popular Updates

News & Analysis as of

Criminal Cyberattacks: The No. 1 Cause of Health Care Data Breaches in 2014

A new study released on May 7, 2015, by the Ponemon Institute revealed that criminal cyberattacks on health care organizations were the most prevalent cause of data breaches in 2014. The report underscores the need to think...more

New Guidance from the SEC: Cyber Security Best Practices

On April 28, 2015, the U.S. Securities and Exchange Commission’s Division of Investment Management (the “Division”) issued a Guidance Update to investment and fund advisers on the topic of improving cyber security. While it...more

Cybersecurity is a Real Risk, So Become “Compromise Ready”

Many have heard that “it is not a matter of if a company will be attacked, but when.” Statements like this used to be met with skepticism – companies would say we do not have information hackers want, we outsource our...more

Court Says Cyber Forensics Covered by Legal Privilege

The Middle District of Tennessee recently issued a key decision in the ongoing Genesco, Inc. v. Visa U.S.A., Inc. data breach litigation. The court denied discovery requests by Visa for analyses, reports, and communications...more

BakerHostetler Partner Paul Karlsgodt Discusses Privacy Class Actions [Video]

Paul Karlsgodt, Leader of BakerHostetler's Class Action Defense team, talks about class actions privacy and litigation issues....more

BakerHostetler Partner Alan Friel Talks Big Data and Data Collection [Video]

Alan Friel, Partner with BakerHostetler's Privacy and Data Protection team, talks about compliance programs for companies, consumer data collection, misrepresentation, and data security deficiencies....more

Cybersecurity in the Construction Industry - What Construction Executives Should Be Doing Now to Prepare for the Inevitable

Cybersecurity is everywhere in the news today because hackers have been very successful in exploiting human weaknesses across a broad array of industries. Our construction industry appears to be tempted to brush off these...more

Traversing the Breach: Why You Need to Prepare for Data Breaches and How to Do It

“At every board meeting, whether it’s monthly, whether it’s quarterly, cybersecurity should be on [the agenda]. If not, you’re going to wind up in a situation where you’re having an emergency board meeting to discuss...more

The Anthem Data Breach: The Fallout and What’s Next

By now (unless you have been under a snow drift), you have likely heard about the apparent intrusion into a database at the nation’s largest health insurer, Anthem, Inc. Rather than reiterate the facts as currently known...more

C-Suite – Changing Tack on the Sea of Data Breach?

The country awoke to what seems to be a common occurrence now: another corporation struck by a massive data breach. This time it was Anthem, the country’s second largest health insurer, in a breach initially estimated to...more

Potential Pitfalls in Data Licensing and Big Data Analytics

The trend in Big Data analytics among companies shows no sign in abating, with companies covetously collecting vast amounts of data with the hopes of harvesting market differentiators. A study by open-source research firm...more

Breaches in the Boardroom: What Directors and Officers can do to Reduce the Risk of Personal Liability for Data Security Breaches

Corporate directors and officers may increasingly be targets of shareholder derivative lawsuits in the wake of the surge of regulatory actions and private litigation around data breaches,. While no individual directors and...more

Catching Up on the False Claims Act

From a corporate risk perspective, if your company is in the financial industry, healthcare, or defense industry, your greatest legal and compliance risk has to be the False Claims Act....more

Alert: Five Ways to Reduce Your HIPAA Liability

As of early December 2014, 1,170 security breaches under the Health Insurance Portability and Accountability Act (HIPAA) involving 31 million records had been reported to the U.S. Department of Health and Human Services (HHS)...more

Time To Apply A Risk-Based Approach To Information Security Training

Digital warfare seems to be the name of the game these days. Terrorists attack our database infrastructures and wreck havoc by making personal information public. Look at the most recent attacks on Sony, Chick-Fil-A and...more

IP | Trend: Data in the Cloud is the Next Big Storm? [Video]

Convenience, accessibility, and cost have led companies and their employees to put an increased amount of data in the cloud. But, does this put corporate data at risk? Attorneys Seth Northrop and Sam Walling discuss some of...more

Information Security Training Master Class: Winning the Battle against Data Breaches, Malicious and Negligent Employees, and...

Information security has continued to play prominently in the news as this series has evolved. Just today AT&T announced a data breach. Home Depot and Jimmy John’s, also added to the list in the past month, are still...more

Buying an FCPA Violation Mergers and Acquisition Risks [Video]

FCPA risks are significant when companies acquire other companies. The Justice Department and the SEC have imposed "successor" liability on companies for past bribery violations committed by an acquired company. Pre-closing...more

New York AG Reports that Data Breaches Cost New York Businesses over $1B Last Year

The current headline in data security is a just-released report from the New York Attorney General's Office (the "AG Report") announcing that the number of reported data breaches more than tripled between 2006 and 2013,...more

Alice v. CLS Bank Applied Broadly by the Federal Circuit

On Friday, the Federal Circuit released its first opinion citing the Supreme Court’s June 2014 decision in Alice Corp. v. CLS Bank. This opinion is significant because it shows how the Federal Circuit intends to follow the...more

Intellectual Property Alert: Supreme Court Rules Against Broadly Claimed Software Patents, But Offers No Clear Test for Abstract...

In a unanimous decision, the Supreme Court held that patent claims directed to abstract ideas do not become patent eligible by the “mere recitation” of generic computer elements. Alice Corp. Pty. Ltd. v. CLS Bank Int’l, No....more

Supreme Court: Generic Computer Implementation Does Not Render Abstract Ideas Patentable

On June 19, 2014, the Supreme Court issued its opinion in Alice Corp. v. CLS Bank Int’l, No. 13-298, which was previously discussed. In a unanimous opinion by Justice Thomas, the Court held, consistent with its precedent,...more

Supreme Court Silent on General Eligibility of Software Patents; Weakens Computer System and Media Claims

Yesterday, the U.S. Supreme Court upheld previous decisions finding that certain business method patents are not capable of patent protection under 35 U.S.C. § 101 because they are unpatentable “abstract ideas.” ALICE...more

Supreme Court Invalidates Software Patents Directed to Implementing Abstract Ideas

Yesterday, the U.S. Supreme Court announced its highly anticipated opinion in Alice Corp. Pty. Ltd. v. CLS Services, Inc., No. 13-298. In Alice Corp., the Court upheld an en banc decision of the United States Court of...more

Developments in Unitranch Financing: Balancing Opportunity and Risks

The loan markets saw a continued rise in middle market unitranche financings in 2013. Unitranche loans combine separate senior and subordinated debt financings into a single debt instrument. While unitranche financing is not...more

26 Results
|
View per page
Page: of 2

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×