Security and Privacy Controls

News & Analysis as of

3rd Circuit Affirms FTC’s Cybersecurity Oversight

If you read one thing: - The Federal Trade Commission (FTC) secured a major appellate victory in its quest to challenge lax corporate cybersecurity practices - In light of the 3rd Circuit’s decision,...more

In FTC v. Wyndham Worldwide, Third Circuit Upholds FTC Authority to Enforce Flawed Cybersecurity Measures

In a much anticipated decision, the Third Circuit Court of Appeals affirmed the authority of the Federal Trade Commission (FTC) to enforce actions against companies who have been subject to a data breach. The FTC sued...more

Health Update - August 2015

Five Lessons From 2015 Healthcare Deals - In 2015, we already have seen a great deal of activity in healthcare transactions that is attracting antitrust scrutiny, with mixed results. Among the winners have been Cabell...more

Privacy Commissioners Issue Joint Guidance on Bring Your Own Device Programs

An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate “bring your own...more

Be Alert Asia Pacific: Employment Law Newsletter: Top Tips for Employers: Cyber Risks and Fraud

Cyber risk is becoming a growing concern amongst businesses and institutions. Data breaches and hacking have been problematic among some sectors, predominantly financial services, for some time. These risks are now often...more

Adding a Short-Order Cook to a Crowded Kitchen: OMB Guidance Creates a Sense of Urgency for Cybersecurity in Federal Acquisitions

The Office of Management and Budget (OMB) on August 11, 2015 released proposed guidance, that takes “major steps” towards – and likely accelerates – the implementation of cybersecurity requirements in federal acquisitions....more

Doing Business With the State of Connecticut: A Guide to Data Privacy and Security Requirements

Doing business with Connecticut’s state government requires individuals, businesses and other entities to comply with numerous legal, regulatory and contractual requirements. Among these obligations are some of the nation’s...more

How To Make Computer Fraud Claims Stick

Employers need clear policies in order to use a federal criminal law as a civil remedy against workers. The recent decision in Allied Portables v. Youmans from the U.S. District Court for the Middle District of Florida...more

Cybersecurity Update - July 2015

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

State Breach Notification Laws – Updates From the 2015 Legislative Sessions, 6 Action Steps for Companies

This is proving to be a banner year for new breach notice requirements. In the period between 2006 and 2009, most US states enacted data breach notice laws. This year, we are seeing a wave of “second-generation” breach notice...more

Privacy and Security Guidance: Cloud Computing in the MUSH Sector

I. Purpose of this Guidance Document and How to Apply - This document is intended to be used by decision makers in the MUSH Sector when considering using cloud services....more

The WSGR Data Advisor

In this issue: - Navigating Public Company Cybersecurity Obligations: Advising Boards and Disclosing to Investors - FTC Updates School-Related COPPA Guidance - Status Update on the EU Data Protection...more

TerraCom & YourTel Reach $3.5 Million Settlement With FCC over Alleged Privacy, Data Security, and Lifeline Violations

On July 9th, the Enforcement Bureau (EB) of the Federal Communications Commission (FCC or the Commission) reached a $3.5 million Consent Decree to resolve an investigation into whether TerraCom, Inc. (TerraCom) and YourTel...more

Connecticut to Tighten Data Privacy Requirements

On June 1, 2015, the Connecticut Legislature passed S.B. 949, a comprehensive data privacy and security bill that tightens the state’s data breach response requirements and imposes new obligations on state contractors and the...more

Russia’s data localization requirement will take effect September 1

Russia’s much publicized changes to its data protection rules come into force as of September 1, 2015. These changes are broadly, and vaguely, written and apply to almost anyone handling the personal data of Russian...more

Russia’s data localization requirement will take effect September 1

Russia’s much publicized changes to its data protection rules come into force as of September 1, 2015. These changes are broadly, and vaguely, written and apply to almost anyone handling the personal data of Russian...more

FFIEC Tool Helps You Assess Cyber Risk

The Federal Financial Institutions Examination Council (FFIEC) has released its long-awaited Cybersecurity Assessment Tool (Assessment) to help financial institutions identify the inherent risks faced by a company and...more

Start with Security

On June 30, 2015, the Federal Trade Commission (FTC) published “Start with Security: A Guide for Businesses” (the Guide). The Guide is based on 10 “lessons learned” from the FTC’s more than 50 data-security...more

The Top 10 Priorities For Your Information Governance Program

The title, of course, begs the question: does your business even have an Information Governance Program? If not, you should get one—quick. An integrated Information Governance Program is considered a “best practice” to...more

Audit reveals U.S. Treasury Dept. security infrastructure is weak

An annual audit conducted by the U.S. Government Accountability Office of the Fiscal Service Bureau, identified (9) nine new information security weaknesses in the U.S. Treasury Department’s information systems that are used...more

OPM Proposes Actions To Strengthen Cybersecurity Of Its IT Systems

On June 24, 2015, the Office of Personnel Management (the “OPM”) announced several actions to strengthen its cybersecurity. The 8-page “Actions to Strengthen Cybersecurity and Protect Critical IT Systems” (the “Action Plan”)...more

Federal Trade Commission Issues “Start with Security” Guidance

On June 30, the Federal Trade Commission (FTC) issued its first guidance document as part of its Start with Security initiative. The initiative, announced by FTC Consumer Protection Director Jessica Rich in March, will...more

Lessons from FTC Enforcement Actions

The FTC released a guide for businesses based on lessons learned from the more than 50 reported FTC enforcement actions. This new guide, “Start With Security: A Guide For Business” outlines a general “standard of care” for...more

Privacy & Cybersecurity Update - June 2015

In This Issue: - USA Freedom Act Brings Changes to Surveillance Program - Connecticut Enacts Bill Imposing Tighter Data Security Obligations - Pennsylvania Court Dismisses Data Breach Negligence...more

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

76 Results
|
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×