Security and Privacy Controls

News & Analysis as of

State Breach Notification Laws – Updates From the 2015 Legislative Sessions, 6 Action Steps for Companies

This is proving to be a banner year for new breach notice requirements. In the period between 2006 and 2009, most US states enacted data breach notice laws. This year, we are seeing a wave of “second-generation” breach notice...more

Privacy and Security Guidance: Cloud Computing in the MUSH Sector

I. Purpose of this Guidance Document and How to Apply - This document is intended to be used by decision makers in the MUSH Sector when considering using cloud services....more

The WSGR Data Advisor

In this issue: - Navigating Public Company Cybersecurity Obligations: Advising Boards and Disclosing to Investors - FTC Updates School-Related COPPA Guidance - Status Update on the EU Data Protection...more

TerraCom & YourTel Reach $3.5 Million Settlement With FCC over Alleged Privacy, Data Security, and Lifeline Violations

On July 9th, the Enforcement Bureau (EB) of the Federal Communications Commission (FCC or the Commission) reached a $3.5 million Consent Decree to resolve an investigation into whether TerraCom, Inc. (TerraCom) and YourTel...more

Connecticut to Tighten Data Privacy Requirements

On June 1, 2015, the Connecticut Legislature passed S.B. 949, a comprehensive data privacy and security bill that tightens the state’s data breach response requirements and imposes new obligations on state contractors and the...more

Russia’s data localization requirement will take effect September 1

Russia’s much publicized changes to its data protection rules come into force as of September 1, 2015. These changes are broadly, and vaguely, written and apply to almost anyone handling the personal data of Russian...more

Russia’s data localization requirement will take effect September 1

Russia’s much publicized changes to its data protection rules come into force as of September 1, 2015. These changes are broadly, and vaguely, written and apply to almost anyone handling the personal data of Russian...more

FFIEC Tool Helps You Assess Cyber Risk

The Federal Financial Institutions Examination Council (FFIEC) has released its long-awaited Cybersecurity Assessment Tool (Assessment) to help financial institutions identify the inherent risks faced by a company and...more

Start with Security

On June 30, 2015, the Federal Trade Commission (FTC) published “Start with Security: A Guide for Businesses” (the Guide). The Guide is based on 10 “lessons learned” from the FTC’s more than 50 data-security...more

The Top 10 Priorities For Your Information Governance Program

The title, of course, begs the question: does your business even have an Information Governance Program? If not, you should get one—quick. An integrated Information Governance Program is considered a “best practice” to...more

Audit reveals U.S. Treasury Dept. security infrastructure is weak

An annual audit conducted by the U.S. Government Accountability Office of the Fiscal Service Bureau, identified (9) nine new information security weaknesses in the U.S. Treasury Department’s information systems that are used...more

OPM Proposes Actions To Strengthen Cybersecurity Of Its IT Systems

On June 24, 2015, the Office of Personnel Management (the “OPM”) announced several actions to strengthen its cybersecurity. The 8-page “Actions to Strengthen Cybersecurity and Protect Critical IT Systems” (the “Action Plan”)...more

Federal Trade Commission Issues “Start with Security” Guidance

On June 30, the Federal Trade Commission (FTC) issued its first guidance document as part of its Start with Security initiative. The initiative, announced by FTC Consumer Protection Director Jessica Rich in March, will...more

Lessons from FTC Enforcement Actions

The FTC released a guide for businesses based on lessons learned from the more than 50 reported FTC enforcement actions. This new guide, “Start With Security: A Guide For Business” outlines a general “standard of care” for...more

Privacy & Cybersecurity Update - June 2015

In This Issue: - USA Freedom Act Brings Changes to Surveillance Program - Connecticut Enacts Bill Imposing Tighter Data Security Obligations - Pennsylvania Court Dismisses Data Breach Negligence...more

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

ALERT: NIST Issues Final Guidance on Federal Contractor Cybersecurity Standards for Controlled Unclassified Information

On June 19, 2015, the National Institute of Standards and Technology (NIST) published the final version of guidance for federal agencies to ensure sensitive information remains confidential when stored outside of federal...more

Is Your Financial Institution the Next Target of a Cyber-Attack?

In This Presentation: - Regulatory expectations for financial institutions - Risks for financial institutions - Planning to reduce risks - The Breach - Duties and responsibilities -...more

Inside Insight: How the FTC Approaches Data Breach Investigations

A data breach hurts in a myriad of ways – the tarnished image of the breached company, the diminished consumer trust and the bottom-line impact of remedial costs and lost business. The last thing a company already reeling...more

The Internet of Things

In this Presentation: - Internet of Things - definition - But what is it all about? - But not just that... - The IoT market in figures... - Beecham Research - view of the World - The Connected...more

The Devil in the “Cyber” Insurance Details

There’s a tempest amidst the recent spring shower of “cyber” insurance cases. It isn’t the Recall Total case reported the week before last, or the Travelers v. Federal Recovery Services case reported the week before. While...more

Google Revamps Privacy and Security Settings

The redesigned account page does not offer any additional privacy or security options over those previously offered. Instead, it consolidates all of Google’s privacy and security settings, thus making it easier for a customer...more

A Deeper Dive: Risk Assessments Are a Necessary Step in Creating Layered Cyber Defenses

Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more

ONC Releases Updated Guide to Privacy and Security of Electronic Health Information

The Office of the National Coordinator for Health Information Technology (“ONC”) of the U.S. Department of Health and Human Services (“HHS”) recently released Version 2.0 of the Guide to Privacy and Security of Electronic...more

New HIPAA Guide to Privacy and Security of Electronic Health Information

The HHS Office of the National Coordinator for Health Information Technology (ONC) recently released Version 2.0 of its Guide to Privacy and Security of Electronic Health Information (Guide)....more

67 Results
|
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×