Latest Publications

Share:

Step Carefully: Protecting Data Breach Expert Reports from Discovery

In order to provide legal advice to clients in the aftermath of a hacking, lawyers must rely on digital forensics investigators to understand the nature and scope of the breach. Corporations also use this type of information...more

Code Red: The FDA’s Artificial Intelligence/Machine Learning Action Plan Poses Potential Risks for Medical Device Makers

Q: The FDA’s stance on a regulatory framework for artificial intelligence and machine learning (AI/ML) software as a medical device is continuously evolving. Could you explain the history? A: Artificial intelligence (AI) is...more

FBI Warns of Upcoming Major Ransomware Attacks

Yesterday officials from the FBI, U.S. Department of Homeland Security, and Cybersecurity and Infrastructure Security Agency issued a joint alert that the agencies possessed “credible information of an increased and imminent...more

Data Security Year in Review

October marks the seventeenth annual National Cybersecurity Awareness month in the United States and provides an opportune moment to take stock of an extraordinary year. The past year has seen a rise in high-profile data...more

Treasury Department Warns of Potential Sanctions to Organizations Paying to Resolve Ransomware Attacks

Ransomware attacks – cyber attacks in which the hackers encrypt and disable an organization’s computers and demand a ransom to provide the decryption key – continue to hit organizations throughout the country. Perhaps even...more

European Court of Justice Strikes Down Privacy Shield

The European Court of Justice (ECJ) struck down the Privacy Shield – the legal mechanism that allowed many small and medium sized companies to transfer personal data from the European Union to the United States without...more

Moving Forward to the New Normal: 10 Key Questions About Digital Contact Tracing Applications

Just as the terrorist attacks of September 11, 2001 fundamentally changed our approach to national security, the COVID-19 pandemic of 2020 will fundamentally alter our approach to public health. September 11th caused us to...more

Critical Privacy Law Update for Food and Beverage Brands: California Consumer Privacy Act Enforcement Begins on July 1

In the middle of a pandemic that has upended the food and beverage industry – causing surging demand for some products and devastating others – the last thing anyone wants to deal with is a new regulatory regime. However, the...more

The CCPA’s Enforcement Date is Fast Approaching – Are You Ready?

The California Attorney General will soon begin to fully implement the California Consumer Privacy Act of 2018 (“CCPA”), the most comprehensive privacy law in the United States. The CCPA grants California residents new...more

COVID-19 Security Alert: 10 Reminders for Employees Working Remotely

The security and confidentiality of a company’s data is paramount. As businesses grapple with the COVID-19 pandemic and the need for employees to work remotely, it is important to remain focused on ensuring the security and...more

The SHIELD Act: NY’s Expanded Security Requirements and Data Breach Notification Law Asks More of Businesses (and not just those...

Earlier this month the Stop Hacks and Improve Electronic Data Security Act (“SHIELD Act") went into effect. The law, which was signed in July of last year by Governor Andrew Cuomo, makes several important changes to New...more

COVID-19 and Its Impact on Data Privacy and Security

Organizations across the United States are preparing to respond to increasingly dire warnings from public health authorities and the need to take action to mitigate the spread of the coronavirus and the disease it causes,...more

Code Blue: Cybersecurity Vulnerabilities for Medical Device Makers Require Urgent Care

Q: How is the shift of medical devices moving to the Internet of Things affecting the health care industry? A: Connected medical devices routinely record sensitive health information about a patient. This critical...more

Preparing for the Inevitable: It’s Time to Begin Planning for the CCPA

The California Consumer Privacy Act of 2018 (“CCPA”), the most comprehensive privacy law in the United States, is scheduled to take effect on January 1, 2020. Though the CCPA protections only apply to California residents, it...more

Changes to Massachusetts Law on Security Breaches

On April 11, 2019, significant revisions to Massachusetts’ data breach law – Chapter 93H – take effect. The revised statute requires more detailed notifications to both the Commonwealth and affected consumers, and mandates...more

How to Structure Your Organization’s Cybersecurity Management

Q: Who in a company is vital for cybersecurity management? Seth Berman: Cybersecurity is everyone’s responsibility. The board and senior management must set the priorities and shape the culture, but even the lowest-level...more

Bringing the Fourth Amendment into the Digital Age: Implications of Carpenter v. United States

The Supreme Court announced a major decision interpreting the Fourth Amendment for the digital age in Carpenter v. United States. The case is a significant win for privacy advocates and a sea change in the Court’s...more

Happy GDPR Eve! Are You Ready?

Happy GDPR Eve! Tomorrow is the effective date of Europe’s extensive, new and much talked about regulation, the General Data Protection Regulation (GDPR). GDPR is an ambitious regulatory framework that seeks to rebalance the...more

Breaches and the Boardroom: How Directors Can Avoid Liability for Data Breaches

“Where was the Board?” is asked every time a major hacking causes yet another data breach. Data breaches and ransomware attacks occur every day, with massive impacts on companies’ finances, market value, and reputation. In...more

How Community Banks Can Overcome Cybersecurity Paralysis

Tom Curry, a partner in Nutter’s Corporate and Transactions Department and a co-leader of the firm’s Banking and Financial Services Group, and Seth Berman, a partner and leader of Nutter’s Privacy and Data Security practice...more

Meltdown and Spectre Vulnerabilities: New Year, New Cyber Threat

The first week of January 2018 brought disturbing news on the cyber security front – and for once it was not the result of corporate ineptitude or poorly designed software. Actually, it was far worse. Independent security...more

Cyber Criminals Take Uber for a Ride

The near-daily reports of massive hacking incidents continue to demonstrate a shocking level of corporate incompetence. In September, we learned of the Equifax breach, which was breathtaking both in its scope and in Equifax’s...more

The Intersection of Human Resources and Cybersecurity: How to Mitigate Threats from Within: Insights from Nutter’s Seth Berman

Seth Berman, a partner in Nutter’s Litigation Department and a leader of the firm’s Privacy and Data Security practice group, analyzed the intersection of cybersecurity and human resources in Nutter Insights. Seth outlined...more

GDPR Compliance: Think It Doesn’t Apply to You? Think Again: Insights from Nutter’s Seth Berman

Seth Berman, a partner in Nutter’s Litigation Department and a leader of the firm’s Privacy and Data Security practice group, addressed upcoming GDPR compliance standards in Nutter Insights. Seth discussed how broadly the...more

Wire Fraud Scams and Corporate Email Attacks: Beware of Tricks, Not Treats, During Cyber Security Awareness Month

The U.S. Department of Homeland Security named October “National Cyber Security Awareness Month,” and has given it the not-so catchy acronym of NCSAM. Though one might quibble with the choice of name, the many spectacular...more

27 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide