Security and Privacy Controls

News & Analysis as of

OPM Proposes Actions To Strengthen Cybersecurity Of Its IT Systems

On June 24, 2015, the Office of Personnel Management (the “OPM”) announced several actions to strengthen its cybersecurity. The 8-page “Actions to Strengthen Cybersecurity and Protect Critical IT Systems” (the “Action Plan”)...more

Federal Trade Commission Issues “Start with Security” Guidance

On June 30, the Federal Trade Commission (FTC) issued its first guidance document as part of its Start with Security initiative. The initiative, announced by FTC Consumer Protection Director Jessica Rich in March, will...more

Lessons from FTC Enforcement Actions

The FTC released a guide for businesses based on lessons learned from the more than 50 reported FTC enforcement actions. This new guide, “Start With Security: A Guide For Business” outlines a general “standard of care” for...more

Privacy & Cybersecurity Update - June 2015

In This Issue: - USA Freedom Act Brings Changes to Surveillance Program - Connecticut Enacts Bill Imposing Tighter Data Security Obligations - Pennsylvania Court Dismisses Data Breach Negligence...more

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

ALERT: NIST Issues Final Guidance on Federal Contractor Cybersecurity Standards for Controlled Unclassified Information

On June 19, 2015, the National Institute of Standards and Technology (NIST) published the final version of guidance for federal agencies to ensure sensitive information remains confidential when stored outside of federal...more

Is Your Financial Institution the Next Target of a Cyber-Attack?

In This Presentation: - Regulatory expectations for financial institutions - Risks for financial institutions - Planning to reduce risks - The Breach - Duties and responsibilities -...more

Inside Insight: How the FTC Approaches Data Breach Investigations

A data breach hurts in a myriad of ways – the tarnished image of the breached company, the diminished consumer trust and the bottom-line impact of remedial costs and lost business. The last thing a company already reeling...more

The Internet of Things

In this Presentation: - Internet of Things - definition - But what is it all about? - But not just that... - The IoT market in figures... - Beecham Research - view of the World - The Connected...more

The Devil in the “Cyber” Insurance Details

There’s a tempest amidst the recent spring shower of “cyber” insurance cases. It isn’t the Recall Total case reported the week before last, or the Travelers v. Federal Recovery Services case reported the week before. While...more

Google Revamps Privacy and Security Settings

The redesigned account page does not offer any additional privacy or security options over those previously offered. Instead, it consolidates all of Google’s privacy and security settings, thus making it easier for a customer...more

A Deeper Dive: Risk Assessments Are a Necessary Step in Creating Layered Cyber Defenses

Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more

ONC Releases Updated Guide to Privacy and Security of Electronic Health Information

The Office of the National Coordinator for Health Information Technology (“ONC”) of the U.S. Department of Health and Human Services (“HHS”) recently released Version 2.0 of the Guide to Privacy and Security of Electronic...more

New HIPAA Guide to Privacy and Security of Electronic Health Information

The HHS Office of the National Coordinator for Health Information Technology (ONC) recently released Version 2.0 of its Guide to Privacy and Security of Electronic Health Information (Guide)....more

ONC-HIT Releases Updated Guide for Privacy and Security of Electronic Health Information

The Office of the National Coordinator for Health Information Technology (ONC-HIT) released version 2.0 of its Guide to Privacy and Security of Electronic Health Information (the Guide). While the Guide clearly states that it...more

SEC Publishes Cybersecurity Guidance for Registered Investment Companies and Advisers

On April 30, the SEC’s Division of Investment Management issued IM Guidance Update No. 2015-02 which highlights measures that investment companies and advisers may wish to consider in addressing cybersecurity risks....more

Revised Guidance for Privacy and Security of Electronic Health Information Released by Government

The Office of the National Coordinator for Health Information Technology (“ONC”) has released a revised Guide to Privacy and Security of Electronic Health Information (the “Guide”), which is intended to be a resource for...more

HIPAA “Phase 2” Audits: Are You Ready?

The Civil Rights Office of the Department of Health and Human Services announced a “Phase 2” audit program in the Fall of 2014. That audit program was delayed due to funding issues, but appears to be back on schedule for...more

A Primer on FTC Expectations for Your Partner and Vendor Relationships: Enforcement Shows You Are Your Brother’s Keeper

With all of the privacy and data security enforcement actions brought by the Federal Trade Commission in recent years, and with all of the guidance distributed by the FTC in that time frame, it is easy to get caught up in...more

Meaningful Use Stage 3 Proposed Rule: Security Risk Analysis and Patient Access

Where HIPAA and Meaningful Use intersect, does the newly released Meaningful Use Stage 3 proposed rule provide greater clarity or create more confusion? As discussed in our earlier advisory, the Meaningful Use Stage 3...more

Cybersecurity is a Real Risk, So Become “Compromise Ready”

Many have heard that “it is not a matter of if a company will be attacked, but when.” Statements like this used to be met with skepticism – companies would say we do not have information hackers want, we outsource our...more

Privacy in Latin America and the Caribbean - April 2015

Thirteen jurisdictions in Latin America now have comprehensive privacy laws including: Argentina, Aruba, Bahamas, Chile, Colombia, Costa Rica, Curacao, Dominican Republic, Mexico, Nicaragua, Peru, Trinidad and Tobago and...more

China Update: Privacy Law and Network Security Developments

The past 16 months have been eventful in China in connection with privacy law and network security developments. Key privacy law developments included: .. the coming into effect of new privacy provisions of the...more

Data Privacy and Security Considerations in M&A Transactions

By some estimates, cybercrime costs the global economy $445 billion annually. If cybercrime were a single country, this dollar amount would place it within the world’s top 30 countries in terms of gross domestic product, and...more

The FCC Just Upped the Ante for Communications Providers and the FTC with a $25 Million Fine, a Detailed Information Security...

The FCC has been warning communications companies for months that protecting consumer privacy and information security is a top priority, and the recent announcement of a $25 million settlement with AT&T over its alleged...more

56 Results
|
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×