The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
6/29/2021
/ Cyber Attacks ,
Cyber Insurance ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Loss Prevention ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Ransomware
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more
COVID-19 spurred an overnight surge in demand for work-from-home vendors. These include companies offering audio and videoconferencing services, cloud services, e-commerce platforms, and virtual desktop infrastructure, to...more
4/5/2020
/ California Consumer Privacy Act (CCPA) ,
Contract Peformance ,
Corporate Counsel ,
Cybersecurity ,
Data Management ,
Data Security ,
Force Majeure Clause ,
General Data Protection Regulation (GDPR) ,
Privacy Policy ,
Telecommuting ,
Vendor Contacts
In this program, Elizabeth Reilly from Fidelity National Financial joins Carlton Fields’ attorneys Jack Clabby, Joe Swanson, and Steve Blickensderfer as they answer real questions from real members of the American Land Title...more
1/15/2020
/ Business Development ,
California Consumer Privacy Act (CCPA) ,
Data Collection ,
Data Management ,
Data Privacy ,
Data Processors ,
Data Protection ,
Data Security ,
Land Titles ,
Personal Data ,
Personally Identifiable Information
In this program, Jack Clabby, Joe Swanson and Steve Blickensderfer give practical advice on the attorneys’ role in a data security incident response guide, which is a key document in preparing for California’s new data...more
11/7/2019
/ California Consumer Privacy Act (CCPA) ,
Cyber Incident Reporting ,
Cybersecurity ,
Data Breach ,
Data Loss Prevention ,
Data Privacy ,
Data Protection ,
Data Security ,
Incident Response Plans ,
Notification Requirements ,
Risk Mitigation ,
State Data Breach Notification Statutes
Last month the White House disclosed how the federal government will coordinate incident response activities in the event of a large-scale cyber incident. While the policy directive is worth reading in its entirety, this...more
8/29/2016
/ Critical Infrastructure Sectors ,
Cyber Attacks ,
Cyber Incident Reporting ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Security ,
Incident Response Plans ,
NCCIC ,
Presidential Directives
I. Legal Exposure to Federal and State Privacy Laws -
A. Federal Statutes and Enforcement -
1. Federal Trade Commission Act, 15 U.S.C. §§ 41-58 -
The Federal Trade Commission (FTC) has emerged as the leading...more
3/1/2016
/ Breach Notification Rule ,
Communications Act of 1934 ,
Cybersecurity ,
Cybersecurity Information Sharing Act (CISA) ,
Data Security ,
EU ,
EU-US Privacy Shield ,
Fair Credit Reporting Act (FCRA) ,
FCC ,
Federal Trade Commission (FTC) ,
FTC Act ,
Gramm-Leach-Blilely Act ,
Hackers ,
Health Insurance Portability and Accountability Act (HIPAA) ,
HITECH Act ,
Intellectual Property Protection ,
Malware ,
US-EU Safe Harbor Framework
In This Issue:
IN THE SPOTLIGHT -
- Your Data Breach Collided With My Personal Injury Coverage
LIFE INSURANCE -
- Phantom Injury Dooms “Shadow Insurance” Case
- Latest NAIC Cybersecurity News...more
10/8/2015
/ Administrative Law Judge (ALJ) ,
AIG ,
Auto Body Shop ,
Bailout ,
Banking Sector ,
Banks ,
Big Data ,
Breach Notification Rule ,
Class Action ,
Compliance ,
Consumer Financial Products ,
Consumer Financial Protection Bureau (CFPB) ,
CT Supreme Court ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Security ,
Department of Labor (DOL) ,
Derivative Suit ,
Disclosure Requirements ,
Disparate Impact ,
EB-5 ,
Fair Housing Act (FHA) ,
FFIEC ,
Fiduciary Duty ,
Financial Institutions ,
Foreclosure ,
Healthcare ,
Insurance Industry ,
King v Burwell ,
Life Insurance ,
Mortgage Servicers ,
Mutual Funds ,
NAIC ,
Online Advertisements ,
Ransomware ,
Reassigned Phone Numbers ,
Regulation A ,
RI Supreme Court ,
SCOTUS ,
Securities and Exchange Commission (SEC) ,
Standing ,
TCPA ,
Telecommunications ,
Treble Damages ,
Whistleblowers