Risk Mitigation Today's Popular Updates

News & Analysis as of

Hacking Your Health: For Healthcare Providers, Risk Analysis Must Be Ongoing

Healthcare providers would be wise to keep in mind that if a patient is harmed by a hacked medical device, Exhibit A in the negligence suit against them may be that provider’s risk analysis, or lack thereof....more

Privacy Commissioners Issue Joint Guidance on Bring Your Own Device Programs

An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate “bring your own...more

Be Alert Asia Pacific: Employment Law Newsletter: Top Tips for Employers: Cyber Risks and Fraud

Cyber risk is becoming a growing concern amongst businesses and institutions. Data breaches and hacking have been problematic among some sectors, predominantly financial services, for some time. These risks are now often...more

7th Circuit Opens Door to Data Breach Class Actions

On July 20, 2015, the U.S. Court of Appeals for the 7th Circuit issued an opinion that could dramatically change the class action landscape for companies that are victims of hackers. In Remijas v. Neiman Marcus Gp., the 7th...more

Breaking Down Compliance: The Keys to Creating a Successful Compliance Program—As Told through the Letters of COMPLIANCE

Still being a young role and profession, many people are working to define what makes a successful compliance professional and program, and what can help them improve. After traveling the country for the past few months at...more

Profile of a Malicious Insider: Top Warning Signs

How are your company’s crown jewels – trade secrets, digital assets and the like – most likely to be compromised? Although coverage in the media would suggest that nation states or competitors are most likely to be the...more

Cyber-Attacks: Threats, Regulatory Reaction and Practical Proactive Measures to Help Avoid Risks

I. Cybersecurity; Its Importance and Relevance – How We Got to Where We Are Today - In the past few months, the White House, Home Depot, JP Morgan, Hard Rock Hotels, Tesla, the St. Louis Federal Reserve, the Internal...more

Encouraging Employees to Break the “Rules” to Do the Right Thing

Laws and regulations draw black lines in often-gray areas. That is their purpose; they exist to make it easier to tell what is “wrong” and what is “right” (as defined by whoever made the law). The U.S. government has...more

Four Security Gaps Cybercriminals Exploit in Your Business's Digital Storefront

Symantec, the American IT security company, recently released its 2015 Internet Security Threat Report that summarizes the number and types of threats and vulnerabilities seen in 2014. The report also analyzes trends and...more

Criminal Cyberattacks: The No. 1 Cause of Health Care Data Breaches in 2014

A new study released on May 7, 2015, by the Ponemon Institute revealed that criminal cyberattacks on health care organizations were the most prevalent cause of data breaches in 2014. The report underscores the need to think...more

New Guidance from the SEC: Cyber Security Best Practices

On April 28, 2015, the U.S. Securities and Exchange Commission’s Division of Investment Management (the “Division”) issued a Guidance Update to investment and fund advisers on the topic of improving cyber security. While it...more

Cybersecurity is a Real Risk, So Become “Compromise Ready”

Many have heard that “it is not a matter of if a company will be attacked, but when.” Statements like this used to be met with skepticism – companies would say we do not have information hackers want, we outsource our...more

Court Says Cyber Forensics Covered by Legal Privilege

The Middle District of Tennessee recently issued a key decision in the ongoing Genesco, Inc. v. Visa U.S.A., Inc. data breach litigation. The court denied discovery requests by Visa for analyses, reports, and communications...more

BakerHostetler Partner Paul Karlsgodt Discusses Privacy Class Actions [Video]

Paul Karlsgodt, Leader of BakerHostetler's Class Action Defense team, talks about class actions privacy and litigation issues....more

BakerHostetler Partner Alan Friel Talks Big Data and Data Collection [Video]

Alan Friel, Partner with BakerHostetler's Privacy and Data Protection team, talks about compliance programs for companies, consumer data collection, misrepresentation, and data security deficiencies....more

Cybersecurity in the Construction Industry - What Construction Executives Should Be Doing Now to Prepare for the Inevitable

Cybersecurity is everywhere in the news today because hackers have been very successful in exploiting human weaknesses across a broad array of industries. Our construction industry appears to be tempted to brush off these...more

Traversing the Breach: Why You Need to Prepare for Data Breaches and How to Do It

“At every board meeting, whether it’s monthly, whether it’s quarterly, cybersecurity should be on [the agenda]. If not, you’re going to wind up in a situation where you’re having an emergency board meeting to discuss...more

The Anthem Data Breach: The Fallout and What’s Next

By now (unless you have been under a snow drift), you have likely heard about the apparent intrusion into a database at the nation’s largest health insurer, Anthem, Inc. Rather than reiterate the facts as currently known...more

C-Suite – Changing Tack on the Sea of Data Breach?

The country awoke to what seems to be a common occurrence now: another corporation struck by a massive data breach. This time it was Anthem, the country’s second largest health insurer, in a breach initially estimated to...more

Potential Pitfalls in Data Licensing and Big Data Analytics

The trend in Big Data analytics among companies shows no sign in abating, with companies covetously collecting vast amounts of data with the hopes of harvesting market differentiators. A study by open-source research firm...more

Breaches in the Boardroom: What Directors and Officers can do to Reduce the Risk of Personal Liability for Data Security Breaches

Corporate directors and officers may increasingly be targets of shareholder derivative lawsuits in the wake of the surge of regulatory actions and private litigation around data breaches,. While no individual directors and...more

Catching Up on the False Claims Act

From a corporate risk perspective, if your company is in the financial industry, healthcare, or defense industry, your greatest legal and compliance risk has to be the False Claims Act....more

Alert: Five Ways to Reduce Your HIPAA Liability

As of early December 2014, 1,170 security breaches under the Health Insurance Portability and Accountability Act (HIPAA) involving 31 million records had been reported to the U.S. Department of Health and Human Services (HHS)...more

Time To Apply A Risk-Based Approach To Information Security Training

Digital warfare seems to be the name of the game these days. Terrorists attack our database infrastructures and wreck havoc by making personal information public. Look at the most recent attacks on Sony, Chick-Fil-A and...more

IP | Trend: Data in the Cloud is the Next Big Storm? [Video]

Convenience, accessibility, and cost have led companies and their employees to put an increased amount of data in the cloud. But, does this put corporate data at risk? Attorneys Seth Northrop and Sam Walling discuss some of...more

35 Results
|
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×