All U.S states have laws about data security and what to do when there’s a data breach. Here is what’s in the Arizona law.
Who The Law Applies To. The law applies to anyone who conducts business in Arizona and who owns or...more
8/3/2018
/ Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Encryption ,
Hackers ,
Notification Requirements ,
Personally Identifiable Information ,
Privacy Laws ,
State Data Breach Notification Statutes
The California Consumer Privacy Act of 2018 (“CCPA”) offers a new, very broad framework for data protection with increased obligations for businesses, and its reach is far and wide. It was passed in a whirlwind seven days. On...more
7/5/2018
/ Consumer Information ,
Cure Periods ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Rights ,
Encryption ,
Governor Brown ,
Opt-Outs ,
Personally Identifiable Information ,
Portability ,
Private Right of Action ,
State Data Breach Notification Statutes ,
Statutory Damages
Snell & Wilmer’s Breach Response Team regularly guides clients through all phases of data breach and cyber incident response, including leading internal investigations related to data breaches and cyber incidents in...more
6/7/2018
/ Corporate Counsel ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Notification Requirements ,
Personally Identifiable Information ,
State Data Breach Notification Statutes ,
Young Lawyers
All U.S states now have laws about data security and what to do when there’s a data breach. Alabama recently was the 50th state to add such a law, and it takes effect on May 1, 2018. Here are its highlights....more
Business email compromise (“BEC”) is a type of cyberattack that is increasing at an alarming pace. The U.S. Federal Bureau of Investigation estimated in a May 2017 alert that global losses due to BEC scams totaled more than...more
11/2/2017
/ Business E-Mail Compromise (BEC) ,
CEOs ,
Cyber Attacks ,
Cybersecurity ,
Data Protection ,
Email ,
FBI ,
Fraudulent Wire Transfers ,
Hackers ,
Malware ,
Personally Identifiable Information ,
Policies and Procedures ,
Spam ,
Spoofing
Almost all U.S states have laws about data security and what to do when there’s a data breach. New Mexico recently added such a law for its state. Here is what’s in the New Mexico law....more
Colorado has adopted new rules that add cybersecurity requirements for certain entities with Colorado securities licenses. The rules are from the regulatory agency the Division of Securities. It licenses securities...more
8/9/2017
/ Broker-Dealer ,
Business Continuity Plans ,
Confidential Information ,
Cybersecurity ,
Cybersecurity Framework ,
Data Protection ,
Information Technology ,
Investment Adviser ,
New Rules ,
Risk Assessment ,
Risk Management ,
Security Breach
Colorado has new proposed rules that add cybersecurity requirements for certain entities with Colorado securities licenses. The proposed rules are from the regulatory agency the Division of Securities. It licenses securities...more
The New York Department of Financial Services has new cybersecurity regulations “designed to promote the protection of customer information as well as the information technology systems of regulated entities [financial...more
3/7/2017
/ Banking Sector ,
Chief Information Security Officer (CISO) ,
Confidential Information ,
Cybersecurity ,
Cybersecurity Framework ,
Data Protection ,
Financial Institutions ,
Financial Services Industry ,
Gramm-Leach-Blilely Act ,
Information Technology ,
Insurance Industry ,
Notice Requirements ,
NYDFS ,
Personally Identifiable Information ,
Risk Assessment ,
Risk Management
The New York Department of Financial Services has proposed new cybersecurity regulations “designed to promote the protection of customer information as well as the information technology systems of regulated entities...more
10/20/2016
/ Banks ,
Covered Entities ,
Customer Protection Rule ,
Cybersecurity ,
Data Security ,
Department of Financial Services ,
Encryption ,
Financial Institutions ,
Information Security ,
Insurance Industry ,
Proposed Regulation ,
State Data Breach Notification Statutes
In response to increasing cybersecurity threats in vehicles, in 2015 the Automotive Information Sharing and Analysis Center (Auto-ISAC) was formed. Its member companies include all automakers operating in North America...more
The Cybersecurity Act of 2015 became law on December 18, 2015. It’s the biggest piece of cybersecurity legislation passed by Congress in recent years. It authorizes and protects certain information-sharing for cybersecurity...more
In an era of ever-evolving ‘wired’ technology, increasing interconnectedness, and business and personal concerns about data security, we recently asked attorneys writing on JD Supra: What will be among the defining issues of...more