Latest Publications

Share:

How Employers Can Become Experts at Data Breaches: Blowing the whistle

A large portion of the data breaches that occur each year involve human resource related information. Bryan Cave has put together a multi-part series to help human resource managers understand, prepare for, and react to, a...more

How Employers Can Become Experts at Data Breaches: ID theft services

A large portion of the data breaches that occur each year involve human resource related information. Bryan Cave has put together a multi-part series to help human resource managers understand, prepare for, and react to, a...more

How Employers Can Become Experts at Data Breaches: HR service providers

A large portion of the data breaches that occur each year involve human resource related issues. This includes situations in which HR data was lost, employees were inadvertently responsible for the loss of information about...more

How Employers Can Become Experts at Data Breaches: Talking about security with employees

A large portion of the data breaches that occur each year involve human resource related issues. This includes situations in which HR data was lost, employees were inadvertently responsible for the loss of information about...more

How Employers Can Become Experts at Data Breaches: Incident Response Plans

A large portion of the data breaches that occur each year involve human resource related issues. This includes situations in which HR data was lost, employees were inadvertently responsible for the loss of information about...more

How Employers Can Become Experts at Data Breaches: What is a WISP?

A large portion of the data breaches that occur each year involve human resource related issues. This includes situations in which HR data was lost, employees were inadvertently responsible for the loss of information about...more

How Employers Can Become Experts at Data Breaches: Breaches involving employee health information

A large portion of the data breaches that occur each year involve human resource related information. Bryan Cave has put together a multi-part series to help human resource managers understand, prepare for, and react to, a...more

How Employers Can Become Experts at Data Breaches: Unauthorized authentication of employee accounts

Service providers that permit your employees to establish a user name and/or password in order to log-into an online portal often monitor employee accounts for indications that an unauthorized person has obtained an...more

Cyber-insurance and Employee Data Breaches: Part 5

A large portion of the hundreds of data breaches and thousands of data security incidents that occur each year involve human resource related issues. This includes situations in which HR data was lost, employees were...more

Cyber-insurance and Employee Data Breaches: Part 4

A large portion of the hundreds of data breaches and thousands of data security incidents that occur each year involve human resource related issues. This includes situations in which HR data was lost, employees were...more

Cyber-insurance and Employee Data Breaches: Part 3

A large portion of the hundreds of data breaches and thousands of data security incidents that occur each year involve human resource related issues. This includes situations in which HR data was lost, employees were...more

Cyber-insurance and Employee Data Breaches: Part 2

A large portion of the hundreds of data breaches and thousands of data security incidents that occur each year involve human resource related issues. This includes situations in which HR data was lost, employees were...more

Cyber-insurance and Employee Data Breaches: Part 1

A large portion of the hundreds of data breaches and thousands of data security incidents that occur each year involve human resource related issues. This includes situations in which HR data was lost, employees were...more

EU Retail News - September 2017

UK Competition Authority Warns Creative Sector About Price Fixing and Information Sharing - On 12th September 2017 the UK Competition Authority,the Competition and Markets Authority ("CMA") sent an open letter to...more

How Employers Can Become Experts at Data Breaches: Understand the Lingo

Many human resource professionals may not be familiar with data security-related terminology. As a result, when an incident occurs there can be confusion when terms like “security event” or “data breach” are thrown around....more

The 2017 Human Resource Professional's Handbook for Data Security Breaches

About twelve years ago, when most people had never heard the term “data breach”, a colleague asked me what type of law I practiced. I tried to explain that I helped companies collect, secure, and share data, and, when data...more

Passwords

Passwords have become ubiquitous such that many consumers, and many employees, may have dozens of passwords that permit them to access dozens of different systems, services, networks or terminals. From a corporate...more

Healthcare Data Breach Litigation Trends

Companies that have a breach involving PHI worry not only about fines and penalties imposed by HHS, but about class action lawsuits. The risk that a class action lawsuit will lead to financial liability, however, is often...more

Self-Driving Vehicles

Self-driving cars, or autonomous vehicles, may be the greatest disruptive innovation to travel that we have experienced in a century. A fully-automated, self-driving car is able to perceive its environment, determine the...more

2017 Data Breach Litigation Report

2016 was another year in which data breaches continued to dominate the headlines, a constant reminder to people that their personal information was vulnerable and the target of criminal attacks. Yet, despite the fact that...more

Defining Sensitive Personal Information

Like the terms “personal information,” “personally identifiable information,” or “PII,” the terms “sensitive information” and “sensitive personal information” are often left undefined in contracts and treated as if they were...more

Defining Personal Information

The terms “personal information,” “personal data,” “personally identifiable information,” and “PII” are often left undefined in contracts and treated as if they were terms of art for which there was a single definition....more

Retailers Should Be Aware of Data Privacy Concerns With Bring Your Own Device Policies

Many retailers permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

Bring Your Own Device (“BYOD”) Policies

Many companies permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

Avoiding Management Struggles When it Comes to Data Breaches: Part 8

The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more

180 Results
/
View per page
Page: of 8

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.