Latest Publications

Share:

DoD Cyber Compliance Deadline Fast Approaching – Here’s What Government Contractors Need to Know

U.S. Department of Defense (DoD) contractors face new cybersecurity compliance requirements, including a significant deadline set for December 31, 2017. Most DoD contracts now include clauses imposing obligations on...more

The Equifax Breach: How to Protect Your Company and Your Customers

On September 7, Equifax, one of the three major credit reporting firms in the U.S., disclosed a data breach that potentially affects 143 million consumers. Equifax’s disclosure indicated that the breach, which Equifax claims...more

Law Firms’ Data Duty: Protecting Client Information From Cybercriminals

July 1, 2017 The impact from the recent Petya/NotPetya ransomware attack — or what was reported as a ransomware attack but now appears to be something even more damaging — continues to spread around the globe, with several...more

Massive Cyberattack Developing Worldwide

Several cybersecurity firms and news outlets are reporting a new major cyberattack spreading across the globe. The attack, which is still developing and appears to have hit the UK first, is being described as a “global...more

Friday’s Massive Malware Attack – Cyber Insurance and the Importance of IMMEDIATE Notice to Insurers

On Friday, May 12, 2017, a massive ransomware attack swept across the globe. As of the date of this post, the attack reportedly had infected more than 100,000 organizations in 150 countries. The attack continues to propagate...more

ALERT: Beware of W-2 Scam!

Our Data Privacy and Security team is currently assisting multiple clients in responding to nearly identical fraudulent requests for IRS Form W-2 information. Significantly, these clients are in a number of industries and are...more

2/17/2017  /  Cybersecurity , Email , IRS , Phishing Scams , Popular , W-2

Cybersecurity and Data Privacy in 2017: Eight Topics to Follow

Throughout the past several years, data privacy and security practices have evolved into more than just defending against identity theft and protecting sensitive data. In fact, since 2014, to help raise awareness for data...more

A Closer Look: Practical Tips to Managing a Ransomware Attack Part 2

Part 1 of this two part series laid out the state of the industry regarding ransomware. In Part 2, this post will examine what steps to take, or not to take, during and after a ransomware attack. “We’ve Been Hit – Now...more

A Closer Look: Practical Tips to Managing a Ransomware Attack (Part 1)

The Federal Trade Commission (FTC) is conducting a three-part fall conference workshop on select technology issues. The first conference was held on September 7th about ransomware. The second conference was held on October...more

EU Commissioner Jourová Speaks Before European Parliament About Schrems’ Impact on Safe Harbor Negotiations

On October 26, 2015, EU Commissioner Jourová, responsible for data protection, delivered before the European Parliament a speech on the implications of the Schrems ruling (C-362/14) by the Court of Justice of the EU, which...more

SIFMA Urges Senate to Pass Cyber Sharing Bill

It seems as if every day there is a new report of a data breach or cyber attack. For the same reason that Willie Sutton robbed banks — “because that’s where the money is” — cyber criminals have been incessant in their...more

IRS, States, Industry Continue Progress to Protect Taxpayers from Identity Theft

On October 20, 2015, the IRS, state taxing authorities, and leaders of the tax industry announced continued progress to expand and strengthen protection against identity theft in refund fraud for the 2016 tax season. “We are...more

Safe Harbor Invalidated by the CJEU; Are There Other Solutions for Transatlantic Transfers?

After the October 6, 2015, decision of the CJEU, it is clear that transfers of personal data may no longer take place under the Safe Harbor. This was confirmed with no ambiguity by the Article 29 Working Party (Group 29,...more

Means, Other Than Safe Harbor, of Transferring Personal Data to the U.S. Potentially Vitiated?

After the decision of October 6, 2015, of the Court of Justice of the EU (CJEU) invalidating the decision from the EU Commission (Decision 2000/520) on the Safe Harbor, transfer of personal data to the U.S. based on Standard...more

Draft Kings Class Action Argues Data Leak Revealed “Insider Trading” – But Can Case Survive Arbitration Clause?

Draft Kings and Fan Duel, competing daily fantasy sports (DFS) sites, have been vying for attention by flooding the airwaves with a reported 60,000 commercials this year. However, a recent data leak has resulted in less...more

New CFTC Cybersecurity Standards Are Coming Soon

On September 29, 2015, Commodity Futures Trading Commission (CFTC) Chairman Timothy Massad delivered a “State of the Derivatives Marketplace” speech before the 3rd Annual OTC Derivative Summit North America. The speech...more

CJEU Declares the EU Commission Safe Harbor Decision Invalid

On October 6, 2015, the Court of Justice of the EU (CJEU) ruled that the Safe Harbor decision from the EU Commission (Decision 2000/520) is invalid. The ruling seems more severe than the opinion rendered on September 23,...more

Bombshell OIG Report a Reminder to Vigilantly Protect Confidential Information

The U.S. Secret Service’s most recent scandal spectacularly illustrates the need to enforce restrictions on access to databases housing confidential information. According to a September 25, 2015, report from the Office of...more

Jeepers, Creepers: The Launch of the New “Peeple” App and Privacy Concerns

It’s 12:43 in the morning, and you have had a tough day at work. You are tired, thinking slowly, and feeling a little anxious that you should already be in bed to catch some rest before a 6 a.m. wake-up call. And then you get...more

Cacophony in the E.U. About National Data Retention Laws

The European Commission made it clear on September 16, 2015, that the issue of whether to introduce national data retention laws is a national decision. The European Commission has no intention of going back on this statement...more

Forum Shopping in the Ashley Madison MDL Proceedings

As anticipated in our previous discussion of the Ashley Madison data breach litigation, lawyers representing the various putative classes have begun sparring over their preferred venues. The Missouri Jane Doe – who filed the...more

Social Media Employee Privacy Laws – The New Majority Approach?

As the old Bob Dylan song goes, “the times they are a-changin’.” While I suspect his message may have been intended for a more meaningful topic than social media employee privacy laws, his words do ring true. When Maryland...more

Advocate General Bot Proposes That CJEU Declare the Safe Harbor Invalid

On September 23, 2015, Advocate General Yves Bot delivered an opinion on the issue of the transfer of personal data from Facebook Ireland to Facebook USA, in light of the generalized access the National Security Agency (NSA)...more

Through the Wire: SEC Turns its Sights on Insider Trading, Hacking and Data Thievery

There once existed a time when a crew of skydiving surfers could throw on surprisingly well crafted ex-president masks, stroll into a cash-heavy bank and rob the institution blind. There was a time when the weapon of choice...more

SEC’s OCIE Issues a Second Cybersecurity Risk Alert

On Sept. 15, 2015, the Securities Exchange Commission (SEC) Office of Compliance Inspections and Examinations (OCIE) published its second cybersecurity risk alert (the “2015 Risk Alert”). The 2015 Risk Alert is a follow up to...more

66 Results
/
View per page
Page: of 3

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.