This is proving to be a banner year for new breach notice requirements. In the period between 2006 and 2009, most US states enacted data breach notice laws. This year, we are seeing a wave of “second-generation” breach notice...more
I. Purpose of this Guidance Document and How to Apply -
This document is intended to be used by decision makers in the MUSH Sector when considering using cloud services....more
In this issue:
- Navigating Public Company Cybersecurity Obligations: Advising Boards and Disclosing to Investors
- FTC Updates School-Related COPPA Guidance
- Status Update on the EU Data Protection...more
On July 9th, the Enforcement Bureau (EB) of the Federal Communications Commission (FCC or the Commission) reached a $3.5 million Consent Decree to resolve an investigation into whether TerraCom, Inc. (TerraCom) and YourTel...more
On June 1, 2015, the Connecticut Legislature passed S.B. 949, a comprehensive data privacy and security bill that tightens the state’s data breach response requirements and imposes new obligations on state contractors and the...more
Russia’s much publicized changes to its data protection rules come into force as of September 1, 2015.
These changes are broadly, and vaguely, written and apply to almost anyone handling the personal data of Russian...more
The Federal Financial Institutions Examination Council (FFIEC) has released its long-awaited Cybersecurity Assessment Tool (Assessment) to help financial institutions identify the inherent risks faced by a company and...more
On June 30, 2015, the Federal Trade Commission (FTC) published “Start with Security: A Guide for Businesses” (the Guide).
The Guide is based on 10 “lessons learned” from the FTC’s more than 50 data-security...more
The title, of course, begs the question: does your business even have an Information Governance Program? If not, you should get one—quick.
An integrated Information Governance Program is considered a “best practice” to...more
An annual audit conducted by the U.S. Government Accountability Office of the Fiscal Service Bureau, identified (9) nine new information security weaknesses in the U.S. Treasury Department’s information systems that are used...more
On June 24, 2015, the Office of Personnel Management (the “OPM”) announced several actions to strengthen its cybersecurity. The 8-page “Actions to Strengthen Cybersecurity and Protect Critical IT Systems” (the “Action Plan”)...more
On June 30, the Federal Trade Commission (FTC) issued its first guidance document as part of its Start with Security initiative. The initiative, announced by FTC Consumer Protection Director Jessica Rich in March, will...more
The FTC released a guide for businesses based on lessons learned from the more than 50 reported FTC enforcement actions. This new guide, “Start With Security: A Guide For Business” outlines a general “standard of care” for...more
In This Issue:
- USA Freedom Act Brings Changes to Surveillance Program
- Connecticut Enacts Bill Imposing Tighter Data Security Obligations
- Pennsylvania Court Dismisses Data Breach Negligence...more
In this Presentation:
- Chocolate, Cookies, Coffee and Biscuits
- Privacy, Legislation, Underworld behaviour
- Even manufacturers have secrets to protect!
- Invention, 1%’ers and...more
On June 19, 2015, the National Institute of Standards and Technology (NIST) published the final version of guidance for federal agencies to ensure sensitive information remains confidential when stored outside of federal...more
In This Presentation:
- Regulatory expectations for financial institutions
- Risks for financial institutions
- Planning to reduce risks
- The Breach
- Duties and responsibilities
A data breach hurts in a myriad of ways – the tarnished image of the breached company, the diminished consumer trust and the bottom-line impact of remedial costs and lost business. The last thing a company already reeling...more
In this Presentation:
- Internet of Things - definition
- But what is it all about?
- But not just that...
- The IoT market in figures...
- Beecham Research - view of the World
- The Connected...more
There’s a tempest amidst the recent spring shower of “cyber” insurance cases. It isn’t the Recall Total case reported the week before last, or the Travelers v. Federal Recovery Services case reported the week before. While...more
The redesigned account page does not offer any additional privacy or security options over those previously offered. Instead, it consolidates all of Google’s privacy and security settings, thus making it easier for a customer...more
Tens of thousands of cyber attackers employed by Chinese People’s Liberation Army and other employees and contractors of the Chinese Ministry of State Security work diligently every day to steal information from U.S....more
The Office of the National Coordinator for Health Information Technology (“ONC”) of the U.S. Department of Health and Human Services (“HHS”) recently released Version 2.0 of the Guide to Privacy and Security of Electronic...more
The HHS Office of the National Coordinator for Health Information Technology (ONC) recently released Version 2.0 of its Guide to Privacy and Security of Electronic Health Information (Guide)....more
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top