Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Are China’s New Data and Cybersecurity Regulations a Wolf in Sheep’s Clothing?

As the Year of the Sheep gets underway, it is already apparent that the Chinese government will not be living up to the meek reputation of its zodiac representative—at least not as far as data and cybersecurity are concerned....more

Update: Hotel Industry Members Withdrawal FCC Wi-Fi Petition

This is an update to an article we posted on January 28, Can Hotels Legally Block Wi-Fi Hot Spots? The FCC Says No, and Fines a Hotel $600,000 For Doing It. On August 25, 2014, the American Hotel & Lodging Association,...more

President Obama’s Proposed Privacy Bill of Rights - Part 3: Who’s Covered

This week we have brought you a multi-part series analyzing the Obama administration’s proposed Consumer Privacy Bill of Rights, which would require greater transparency by businesses in their privacy practices, and grant...more

White House Releases Cyber Threat Intelligence Integration Center Fact Sheet

On February 25, the White House issued a fact sheet regarding the establishment of the Cyber Threat Intelligence Integration Center (CTIIC), which outlines the purpose, authority, organizational structure, and how the CTIIC...more

New York Bank Regulator Considering Cybersecurity Regulations, Random Audits of Banks

On February 25, New York DFS Superintendent Benjamin Lawsky delivered remarks at Columbia Law School focusing on how state bank regulators can better supervise financial institutions in a post-financial crisis era. In his...more

Reed Smith's Government Contracts Weekly Rundown

In case you spent last week (this morning) dealing with winter weather instead of reading the latest and greatest in the realm on federal contracting, here is a rundown of last week’s top developments related to government...more

The Consumer Privacy Bill of Rights Redux

On February 27, 2015, the Obama White House released an “Administration Discussion Draft” of its Consumer Privacy Bill of Rights Act of 2015 (Proposed Consumer Privacy Act). ...more

New Cyber Agency to Combat Cyber Threats

The Obama administration, on February 10, announced its intention to create a new federal agency to combat cyber threats and coordinate digital intelligence among all federal agencies....more

Traversing the Breach: Why You Need to Prepare for Data Breaches and How to Do It

“At every board meeting, whether it’s monthly, whether it’s quarterly, cybersecurity should be on [the agenda]. If not, you’re going to wind up in a situation where you’re having an emergency board meeting to discuss...more

Privacy Tuesday – March 2015: How is Your Cyber Resilience?

Welcome to March (and in the Northeast, the arrival of meterological spring is welcome indeed……) We start this month with a question: Have you looked at your cyber resilience?...more

Privacy & Cybersecurity Update - February 2015 (Updated)

In This Issue - White House Releases Proposed Privacy Legislation - Lessons from the Anthem Data Breach - SEC and FINRA Release Results of Industrywide Cybersecurity Examination Sweeps - COSO Releases Report on...more

JD Supra Thought Leaders in Cybersecurity - Feb 2015

Meet the top Cybersecurity writers on JD Supra during February, 2015....more

A Compilation of Enforcement and Non-Enforcement Actions

Non-Enforcement - 2015 Legislative Agenda Includes Dodd-Frank Revisit and Cybersecurity. Enforcement - SEC Enforcement Action Underscores Importance of Custody Rule Compliance - Joint SEC/State...more

Weekly Update Newsletter - January 2015 #4

GOVERNMENT CONTRACTS - SBA Considering Extending Comment Period for Proposed Rule on the Limitations on Subcontracting - Although not yet official, we anticipate that SBA will grant an extension until April 6th...more

SIFMA Gets Its Cybersecurity-Antitrust Wish

I’m sure you remember SIFMA’s Principles for Effective Cybersecurity Regulatory Guidance, issued last October. I mean, you read about them right here. One of the principles was this: Principle 9: Information Sharing...more

The SEC and FINRA Will Continue to Audit the Financial Services Industry to Ensure Cybersecurity Protocols Are Current and Viable

On February 2, 2015, Wilson Elser released an overview entitled Corporate Hacking and the Financial Services Industry that provided in-house counsel with talking points to better discuss and understand their corporate...more

Executive order "promoting private sector cybersecurity information sharing": top points

In conjunction with the recent White House Summit on Cybersecurity and Consumer Protection Summit, President Barack Obama has issued a much-anticipated cybersecurity information sharing Executive Order, "Promoting Private...more

Investment Management Legal + Regulatory Update - February 2015

In This Issue: - SEC Proposes Rule Requiring Hedging Disclosure - SEC Reports the Result of its Cybersecurity Sweep of Broker-Dealers and Investment Advisers - House Passes Bill to Ease Volcker Rule and Other...more

“Bring Your Own Device” To Work Programs: Regulatory and Legal Risks and How To Minimize Them

If you’ve ever left your mobile phone on an airplane, in a restaurant, or somewhere other than in your possession, you know it’s frightening enough to think of losing the device itself, which costs a premium, as well as your...more

Two-Factor Authentication May Be Coming to a Bank Near You

When I was at the SEC and online broker-dealers’ customers were the victims of hacking incidents, I used to wonder, why don’t the broker-dealers require multi-factor authentication to gain access to accounts? It was a silly...more

FTC Director Jessica Rich Discusses Privacy and Data Security at BakerHostetler Symposium

On February 26, 2015, Jessica L. Rich, Director of the Bureau of Consumer Protection at the Federal Trade Commission, spoke at the BakerHostetler Symposium on Section 5 of the FTC Act on how the FTC approaches privacy and...more

Developments in Privacy and Cybersecurity Legislation

On January 13, 2015, the Obama Administration presented to Congress an updated legislative proposal to improve American cybersecurity and data privacy protection....more

Smart Car Legislation Suggests Different Approach To Internet Of Things Regulation

On February 11, Senators Ed Markey (D-Mass.) and Richard Blumenthal (D-Conn.) announced legislation aimed at establishing federal data security and privacy standards for Internet-connected automobiles (“smart cars”). This...more

What General Counsel Need To Know About The Latest Cybersecurity Developments

In the wake of reported security breaches at a number of significant financial institutions, cybersecurity is garnering more attention and concern than ever before — both within the financial services industry and among...more

Legislation To Increase Sharing Of Cyber Data Introduced

On February 11, Senator Tom Carper (D-Del.), Ranking Member of the Senate Homeland Security and Governmental Affairs Committee, introduced legislation aimed at increasing the sharing of cyber threat data between the federal...more

1,546 Results
|
View per page
Page: of 62