Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

HIPAA Breaches: What They Are and What You Can Do to Protect Your Clients

45 CFR §§ 164.400-414– otherwise known as the HIPAA Breach Notification Rule– requires all entities and businesses covered by HIPAA to disclose any breaches of unsecured protected health information (PHI). In order to protect...more

Cybersecurity Litigation Monthly Newsletter

As we discussed in July, Tiversa, a “cyber-intelligence” company, notified the FTC in 2009 that a file containing the personal information of about 9,300 LabMD patients was available on a peer-to-peer file sharing network....more

Target Files Motion to Dismiss Data Breach Lawsuit

By now, we all know about the massive data breach at national retailer Target over the 2013 holiday season. The cyber-attack was carried out by sophisticated criminal hackers, who allegedly gained access to Target’s network...more

The Download - September 2014

In this issue: - House Committee Holds Hearing on FTC’s Use of Section 5 Authority in Data Security Cases - Congress Considers Student Privacy; Department of Education Releases Guidance - National...more

To Speak Or Not To Speak About A Data Breach

I recently posted about some companies making the decision to not announce when a data security breach has occurred, or at least they would think twice before announcing. According a couple crisis communication experts, that...more

Health Headlines: Also in the News - September 2014

GAO Finds CMS Should Fully Develop Plans for Medicare Advantage Encounter Data and Assess Data Quality Before Use – In a report released on September 2, 2014, GAO evaluated CMS’s plans for using Medicare Advantage (MA)...more

Privacy Top Five: Issues And Concerns In The First Six Months Of The Apps

That is, on receiving the personal information from a third party, you must contact each individual whose personal information you have now “collected” and notify them of the mandatory matters specified in the APPs, if such...more

5 Ways to Protect your Business from a Cyber Attack

Global cyber-attack threats stand at the highest ever recorded level, jumping 14 percent from 2012 to 2013 (Cisco 2014 Annual Security Report). Furthermore, a recent Microsoft Security Intelligence Report found that operating...more

Cyber, Data-Security Liability Claims: Coverage Under Traditional Lines of Insurance

Recent, large-scale data breaches at several well-known companies underscore the substantial risk that businesses now face with respect to cyber, data-security liability. In this year alone, numerous companies – including...more

Cybersecurity Concerns Underpin Continued Push In The Regulatory And Legal Arenas

While Congress continues its aggressive push on cybersecurity legislation, regulatory oversight and legal efforts continue across the spectrum of industries effectively filling the gap in addressing now every day concerns...more

The Congress Ramps Up Action On Cybersecurity Legislation - Possibilities For Data Protection/Breach Legislation Still Exist

While not a day goes by without a new cybersecurity attack, the recent news of the Russian criminal gang who is alleged to have stolen over 1 billion user names and passwords as well as 500 million email addresses reinforces...more

Privacy Monday – September 2014

Back to school, back to traffic jams … back to Privacy Mondays! Our look at bits and bytes and goofs and gaffes in data privacy and security....more

I Want My Selfie Back!!!

If your selfie has fallen into the wrong hands, the following statutory acts and/or common law theories may provide some relief....more

Major Barrier to E-Commerce in Middle East and North Africa is Fear about Data Security

In a recent article published by Law 360, Proskauer litigation associate Courtney Bowman outlines how companies can make inroads in the e-commerce market in the Middle East and North Africa (MENA). Although often overlooked,...more

PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY [Video]

Rarely does a day pass without new news of a data breach of some company around the world. It has impacted virtually every industry from hospitality to retail. What should companies do to avoid being the next target of...more

FRANCE: Orange receives a public warning from the French Data Protection Authority (CNIL) following a security breach in a...

The CNIL’s decision provides useful guidance on security measures that the CNIL considers must be taken by data controllers. Earlier this year, Orange discovered that the database of one of its sub-subcontractors had...more

Cloud Hacking Incidents May Prompt Congress and the Administration to Turn Attention Again to Mobile Privacy Issues

With the recent theft and release of several celebrities’ private photographs (many of which appear to have been taken with, and stored on, mobile devices), mobile privacy and the protection of sensitive data stored or...more

Privacy & Cybersecurity Update - August 2014

In This Issue: - NIST Announces October Workshop and Releases Framewok Update - Insurance Company Succeeds in Cybersecurity Litigation - Safe Harbor Under Attack — This Time From a US Group -...more

Learning from Target: Insurance Coverage for Data Breaches

Cyber liability is a clear and present danger. Target Corp. recently reported at least $235 million as gross expenses related to its 2013 data breach. Fortunately, Target was able to recover $90 million of that loss under...more

Massive Online Security Breach – Are You Reactive or Proactive?

A few weeks ago, a Russian cyber gang amassed around 1.2 billion user name and password credentials belonging to more than 500 million email addresses. This may be to date the largest cache of stolen data. The cyber gang...more

Breaching Bad: New Cyber Security Regs for Defense Contractors

Defense contractors with access to classified information will soon be required to quickly notify Defense Department (DOD) officials if the company’s computer network or information system is successfully penetrated in a...more

Data protection authority approves insurance antifraud registry

Data protection rules will be adequately protected through the registry to be set up against frauds in the insurance sector according to the Italian data protection authority. ...more

Board Oversight of Cybersecurity

Cyber-attacks on U.S. companies have increased over recent years resulting in significant costs to companies. According to surveys, U.S. companies have experienced a 42% increase between 2011 and 2012 in the number of...more

Survey Shows Cybersecurity Danger Worse than Most Retailers Think

There's a huge gap between retailers' perceptions and reality when it comes to cyberattacks and preventing data breaches, according to a new study from Dimensional Research and Tripwire. When asked how quickly their...more

Banking & Financial Services E-Note - August 2014

In This Issue: - Lawmakers Urge Fed to Clarify Emergency Lending Rules - CFPB Pushing Colleges to Be More Transparent in Bank Deals - Report Finds Reversal in Trend Toward Subprime Auto Loans - CFPB Concerned...more

1,102 Results
|
View per page
Page: of 45