Latest Posts › Data Security

Share:

Who’s Responsible When a Third-Party Vendor Is Compromised?

Recently, we had the opportunity to advise some clients who worked with a third-party vendor that maintained custody of personal information pertaining to our clients’ respective end users.  The vendor suffered a data breach...more

Risk Assessments in Healthcare: Where Legal Requirements Also Make Good Business Sense!  

While some of the legal requirements on your organization can seem overly burdensome, there are times when legal requirements also align nicely with what makes good business sense. Risk assessments in the healthcare industry...more

Virginia Bureau of Insurance Proposes Revised Regulations Implementing Insurance Data Security Act!

We previously informed our readers about regulations being proposed by the Virginia Bureau of Insurance (BOI) pursuant to Virginia’s relatively new Insurance Data Security Act (IDSA). After considering comments received in...more

Cybersecurity Advisory for K-12 Educational Institutions

The Federal Bureau of Investigation, the Cybersecurity and Infrastructure Security Agency, and the Multi-State Information Sharing and Analysis Center, recently released a Joint Cybersecurity Advisory warning that cyber...more

Insurers & Producers in Virginia: Get Ready for New Data Security and Notification Requirements!

Virginia has a new law, the Insurance Data Security Act (New Law), going into effect on July 1, 2020, which will expand the data security and incident notification requirements on insurers licensed in the Commonwealth.  The...more

A Practical Security Reminder for the COVID-19 Outbreak – Not Just for Remote Workers!

As many businesses and organizations adapt to the impact of COVID-19 on their operations, the systems and data security risks they face continue to increase and must be an area of focus in all planning for COVID-19. While...more

New York’s New Data Security Requirements

In the fall of last year, we wrote about the passage of the SHIELD Act (the Act) in New York, which expanded aspects of the state’s breach notification requirements (Breach Requirements) and created a statutory obligation to...more

NIST Guidance for Reducing Mobile Device Cybersecurity Risks

If your organization embraces (or simply allows!) the use of mobile devices for the workplace, the natural tradeoff you’re making for increased productivity, efficiency and convenience is an increase in cybersecurity risks to...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide