News & Analysis as of

Business Organization Privacy Consumer Protection

Read Business Organization updates, alerts, news, and legal analysis from leading lawyers and law firms:

Is Your Business Insured Against A Cyber Attack?

by Partridge Snow & Hahn LLP on

Your business has insurance coverage for flood and fire damage. You are protected if an employee gets into a car accident. But are you covered for a cyber attack?...more

NIST Small Business Cybersecurity Act Passes in the House

by Morgan Lewis on

On October 11, 2017, the House of Representatives passed bill H.R. 2105, the NIST Small Business Cybersecurity Act (NIST Act), which would require the US Department of Commerce’s National Institute of Standards and Technology...more

Privacy Tip #110 – Resources for Small Businesses to Stay Informed about Cyber Threats

The Federal Trade Commission (FTC) has concentrated on small businesses this year with the launch of www.FTC.gov/SmallBusiness , which provides data security awareness information to small businesses. The site includes...more

Windows 10 Fails to “Go Dutch” When it Comes to Protecting Privacy: Data Privacy Trends

by CloudNine on

According to Silicon (Windows 10 Data Collection Branded A Breach Of Dutch Privacy Law, written by Roland Moore-Colyer), the Dutch Data Protection Authority (DPA) has declared that Windows 10 breaches the data protection law...more

NERC Proposes to Reduce Cybersecurity Risks in CIP Supply Chains

by Morgan Lewis on

The proposed Reliability Standards focus on vulnerabilities in vendor products and services and would regulate the utility procurement process....more

Illinois Geolocation Privacy Protection Act Vetoed By Governor Rauner

by King & Spalding on

The Geolocation Privacy Protection Act, which passed the Illinois Senate and General Assembly earlier this year, was vetoed by Illinois Governor Bruce Rauner on September 22, 2017. The bill (HB-3449) was the first of its kind...more

Equifax Mea Culpa: Too Little, Too Late?

Equifax Inc.’s interim CEO, Paulino do Rego Barros Jr., issued the company’s second public apology this morning for the massive data breach that has affected as many as 143 million U.S. consumers....more

Common Cybersecurity Mistakes

by Nexsen Pruet, PLLC on

Data breaches result in massive economic and legal consequences for organizations. Ginni Rometty, IBM Corp.’s Chairman, President, and CEO stated last year...more

New Cybersecurity Report Asks the Private Sector to Join Forces with the Government

by McDermott Will & Emery on

The government is continuing to ask for more help from the private sector to defend against cyber attacks. The National Infrastructure Advisory Council (NIAC) recently published a report discussing current cyber threats and...more

With Big Data Comes Big Responsibility

by NAVEX Global on

Big data refers to the huge and ever-growing volume of data organizations mine to uncover opportunities for building deeper customer relationships and developing new strategies for growth. Gartner describes big data as having...more

Proposed Changes to Singapore Personal Data Protection Act 2012

by Morgan Lewis on

The Personal Data Protection Commission is holding a public consultation exercise on its proposed changes to the Personal Data Protection Act 2012....more

High Security: How to Minimize Marijuana Data Risks

As we’ve blogged in the past, the cannabis industry is particularly susceptible to cyberattacks. With threats like a federal crackdown and workplace drug testing, customers have a vested interest in keeping their information...more

Passwords Remain Important for Data Security, FTC Reminds Businesses

For the most recent installment in the Federal Trade Commission’s “Stick with Security” series, the agency’s blog post focused on passwords....more

Business, Partnership and Estate and Trust Tax Returns and Identity Theft

by Pessin Katz Law, P.A. on

In Fact Sheet 2017-10 issued by the Internal Revenue Service (“IRS”) on July 25, 2017, “Information on Identity Theft for Business, Partnerships and Estate and Trusts”, the IRS points out that business, partnerships and...more

Set Sensible Limits on Data Access, FTC Explains

In its third post in the “Stick with Security” series, the Federal Trade Commission (FTC) suggested that access to sensitive data should be sensibly limited....more

OCIE Provides Insight into Issues Identified in Recent Cybersecurity Sweep

by Morrison & Foerster LLP on

The National Exam Program of the SEC’s Office of Compliance Inspections and Examinations (OCIE) recently published its observations from the second generation of its Cybersecurity Initiative. It reported overall improvement...more

Patching Up Your Information Security Review

by Morgan Lewis on

In light of recent significant ransomware cyberattacks such as the one that originated in Ukraine and quickly spread to affect hundreds of thousands of computers in more than 150 countries, we wanted to provide a few pointers...more

And So It Begins: The First DFS Transition Period Comes to an End August 28

by King & Spalding on

In September 2016, the New York Department of Financial Services (“DFS”) introduced the first draft of its cybersecurity regulation, which is now in a position to lead a new trend in industry-specific cybersecurity...more

FTC and FBI Issue Compliance Reminder on Childrens Online Privacy Protection Act

by Morgan Lewis on

A recent update of the FTC’s COPPA compliance plan for businesses focuses on internet-connected toys and devices aimed at children; FBI issues a Public Service Announcement with a similar focus....more

The Evolution of the President’s Commission to Enhance National Cyber Security

by NAVEX Global on

Through a presidential commission and executive order, the presidencies of the former and current administrations have been linked in a shared effort to bolster our nation’s cyber security. ...more

The General Data Protection Regulation – Top 10 Considerations

by Goodwin on

The clock is ticking and in less than a year the European Union (EU) General Data Protection Regulation (GDPR) will be in full force. Companies should be getting ready now in order to avoid hefty fines for violations (up to...more

SEC Chairman Clayton Talks Cyber Threats And Responses

by King & Spalding on

On July 12, 2017, U.S. Securities and Exchange Commission Chairman Jay Clayton made his first public speech as head of the Commission, emphasizing the need for coordination between companies and regulators to thwart cyber...more

The Impact of the General Data Protection Regulation on Responses to Data Breaches Involving EU Personal Data

by McDermott Will & Emery on

The forthcoming General Data Protection Regulation will expand the legal obligations of companies that process EU personal data when they suffer a data breach. Every company faces the risk of a data breach that might trigger...more

Timely Reminder: Lawyers’ Ethical Obligations and Technology

by Morgan Lewis on

In June 2017, companies, government entities, and law firms faced a global ransomware attack from a type of malware where attackers lock certain data or components of a system and demand payment in exchange for returned...more

China’s Network Security Law Comes into Effect: What It Means for Your Company

by McDermott Will & Emery on

On June 1, 2017, China’s much anticipated Network Security Law comes into effect after two years of review, revisions over three drafts and a public commenting process. The law is a historical development for China’s...more

131 Results
|
View per page
Page: of 6
Cybersecurity

Follow Business Organization Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.