News & Analysis as of

Sensitive Business Information

FTC’s “Stick With Security” #4: Store Sensitive Information Securely & Protect It During Transmission

by Snell & Wilmer on

On August 18, 2017, the FTC released its fourth “Stick with Security” principle, which explained the importance of keeping confidential data only when needed, and securely storing the data when it must be kept. To that end,...more

The Data Report Episode 17: What the GDPR Means for American Companies

by Bilzin Sumberg on

Module Five: International Law (Part II) In this episode of The Data Report, Litigation attorney Jay Ward expands his discussion on the GDPR, examining what it means for American companies and how thoughtful steps can be...more

Data Breach at Italy’s No. 1 Bank Exposes 400,000 Accounts

Italy’s top bank, UniCredit SpA, is yet another victim in a series of cyberattacks exploiting vulnerabilities in the financial services industry. Criminals made off with biographical and loan data from 400,000 UniCredit loan...more

Privacy Tip #94 – Keep Your Day Job and Stay Out of Jail

One of my favorite lines when I conduct employee education about data privacy and cybersecurity is “Keep Your Day Job.” The context of the comment is when I tell audiences about the dumb moves of employees who think they can...more

The Importance of Non-Compete Agreements

by Revision Legal on

It is a common business practice for employers to require their employees to sign a non-compete agreement as part of the terms of their employment. Use of non-compete agreements are a particularly popular practice in...more

FCPA Compliance Report-Episode 326, Paula Long On The Intersection Of Data Security And Compliance

by Thomas Fox on

In this episode I caught up with Paula Long, founder and CEO of DataGravity, Inc. at the recently concluded Collision 2017 Conference. Paula has worked in the data and information space for over 30 years and now helps...more

Wyden’s C-THRU Act – Publicizing PBM Rebate Data

Last week, Senate Finance Committee Ranking Member Ron Wyden (D- Ore.) introduced the “Creating Transparency to Have Drug Rebates Unlocked (C-THRU) Act of 2017.” As its name suggests, it seeks to require parties (e.g., PBMs)...more

The Clock Has Started: What ISPs Need to Do and When to Comply with the FCC’s Broadband Privacy Rules

On December 2, 2016, the Federal Communications Commission (“FCC”) published its Report and Order entitled “Protecting the Privacy of Customers of Broadband and Other Telecommunications Services” (the “Order”) as a final rule...more

Trade secret protection under President-elect Trump

by Dentons on

Without question, US companies face a growing and daily threat from rival companies and foreign governments. Thieves operating in cyberspace and using sophisticated technologies can quickly steal and transfer massive...more

National security reviews: A global perspective — France

by White & Case LLP on

Following the Montebourg Decree in 2014, the scope of activities covered by national security reviews has been significantly extended to several key industries. The Bureau Multicom 2, which is located within the Ministry...more

EU Final Legislation on Requirements for Firms to Hold Information on Financial Contracts

by Shearman & Sterling LLP on

A Commission Delegated Regulation outlining Regulatory Technical Standards specifying the information on financial contracts that a firm may be required to maintain was published in the Official Journal of the European...more

Third-Party Risk Management – Part 2: Contract Termination

by Michael Volkov on

This second part of the series will take a look at the last phase in the lifecycle of third-party business relationship and that is contract termination. This is a phase a lot of times overlooked....more

Cybersecurity Risks to the Manufacturing Sector

The 2016 Manufacturing Report by Sikich finds that there has been a progressive growth in cyber-attacks in the manufacturing sector. This is consistent with the most recent IBM /X-Force Research 2016 Cyber Security...more

DOJ Continues to Monitor Interlocking Corporate Directorates with Restructuring of Tullett Prebon’s Acquisition of ICAP

by McDermott Will & Emery on

On July 14, 2016, the US Department of Justice (DOJ) announced that the restructuring of a planned $1.5 billion transaction between Tullett Prebon Group Ltd. (Tullett Prebon) and ICAP plc adequately addresses the DOJ’s...more

Three Tips to Verify the Security of Your E-Discovery Software

by Zapproved LLC on

SOC 2® Type 2 Certification and Zapproved–Building Trust and Confidence that Your Data is Secure - Today in e-discovery, it should be no surprise that cyber security is a rising concern among corporate leaders and that...more

Amended Rule 26: Protecting Against Competitively Sensitive Disclosures

by Cozen O'Connor on

Hundreds of billions of business e-mails are sent per day. That number may not come as a shock to many, but once a company is involved in litigation, e-discovery can be quite burdensome. Even the mention of the phrase...more

Recent Decision Highlights Important Pleading Requirements for Computer Fraud and Abuse Act Claims

by Seyfarth Shaw LLP on

Ever since Iqbal and Twombly, it has become imperative that a complaint filed in federal court contains “sufficient factual matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’” Ashcroft v....more

CFTC Approves NFA Interpretive Notice on Information Systems Security Programs, Including Cybersecurity Guidance

The CFTC recently approved the National Futures Association’s interpretive notice (the “Cybersecurity Notice”) on the general requirements that members should implement for their information systems security programs...more

The NLRB Expands Its Reach in the Non-Union Workplace

by Akerman LLP - HR Defense on

The National Labor Relations Board continues to infiltrate the workplace even where there are no unions. Standard workplace policies — including those relating to employee conduct, protecting intellectual property, use of...more

Business information and data processing: tidbits on the draft Code of Conduct

by DLA Piper on

On March 11, 2015 the Italian Data Protection Authority (Garante per la protezione dei dati personali, the “Italian DPA“) initiated a public consultation on the draft Code of Conduct concerning the processing of personal data...more

Protect Your Stuff

by GableGotwals on

From Day One, a start-up company needs to protect its technology and its branding, and to budget for that protection. Some suggested steps follow, many of which require little or no direct, out-of-pocket expense....more

Privacy Top Ten: Things You Think You Know About Privacy – But Don’t!

by DLA Piper on

Whether a start–up or a listed ASX company, your business opportunities are increasingly on–line and/or overseas. At last count over 80 countries have adopted data privacy laws and Australia’s new Australian Privacy...more

Twas the Night Before Christmas -- Non-Compete Style

by Fisher Phillips on

Twas the night before Christmas, when all through the company; A disgruntled employee kept saying “please jump with me.” She was trying to line up a grand, mass departure; Of which she was certain no one could...more

Protecting Trade Secrets In Germany

As Europe’s largest economy, one might expect Germany to provide robust protection of intellectual property assets such as trade secrets....more

Say What? Terminated Employees ‘Own’ Their LinkedIn Accounts (and the Company’s Trade Secrets)?

by Lane Powell PC on

Companies are getting a big surprise these days: Employees are leaving with their LinkedIn accounts and the company’s proprietary list of business contacts. LinkedIn is a well-known, business-oriented social media website...more

36 Results
|
View per page
Page: of 2
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.